SSH .rhosts weak authentication

Risk Level: Medium risk vulnerability  Medium

Check or Attack Name: SshdRhosts

Platforms: Any
Description:

The SSH server on this machine supports Berkeley .rhosts style authentication. This form of authentication relies on trusted host names and is defeatable by DNS cache poisoning and IP spoofing.

Remedy:

If SSH is already installed, disable .rhosts authentication and use only RSA and RHOSTS-RSA.

References:

X-Force Logo
Know Your Risks