dgbaker

Well-Known Member
PartnerNOC
Sep 20, 2002
2,576
9
343
Toronto, Ontario Canada
cPanel Access Level
DataCenter Provider
The .rhosts files contains names of systems on which you have an account.

When you use TELNET to log in to a system, the system checks its .rhosts file and if your machine name is found, it gives you access without the need for a password.
 

Website Rob

Well-Known Member
Mar 23, 2002
1,504
1
318
Alberta, Canada
cPanel Access Level
Root Administrator
It is also used a common backdoor entry point for someone trying to crack into a Server. Even with using SHH instead of Telnet, the backdoor is harder to open, but might still present an opportunity. This is why it's best to disable it -- period.

It's easy to do, like everything when one knows how. ;)

/etc/pam.d/rlogin

Replace
auth sufficient /lib/security/pam_rhosts_auth.so

With
auth required /lib/security/pam_rhosts_auth.so no_rhosts


Just one less thing to worry about.