SSH .rhosts weak authentication |
---|
Risk Level: | Medium | Check or Attack Name: SshdRhosts |
---|---|---|
Platforms: | Any | |
Description: | The SSH server on this machine supports Berkeley .rhosts style authentication. This form of authentication relies on trusted host names and is defeatable by DNS cache poisoning and IP spoofing. |
|
Remedy: | If SSH is already installed, disable .rhosts authentication and use only RSA and RHOSTS-RSA. |
|
References: |
Know Your Risks |