STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215432

CAT II (Medium)

There must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files on the AIX system.

Rule ID

SV-215432r991591_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-000366

Discussion

Trust files are convenient, but when used in conjunction with the remote login services, they can allow unauthenticated access to a system.

Check Content

Check for the existence of the files using: 
# find / -name .rhosts 
# find / -name .shosts 
# find / -name hosts.equiv 
# find / -name shosts.equiv 

If ".rhosts", ".shosts", "hosts.equiv", or "shosts.equiv" are found, this is a finding.

Fix Text

Remove the ".rhosts", ".shosts", "hosts.equiv", and/or "shosts.equiv" files.