Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 21 Jul 2005 17:34:40 +1000
From:      Peter Jeremy <PeterJeremy@optushome.com.au>
To:        "Eygene A. Ryabinkin" <freebsd@rea.mbslab.kiae.ru>
Cc:        hackers@freebsd.org
Subject:   Re: /etc/opiekeys permissions?
Message-ID:  <20050721073440.GA324@cirb503493.alcatel.com.au>
In-Reply-To: <20050714101442.GI16608@rea.mbslab.kiae.ru>
References:  <20050714101442.GI16608@rea.mbslab.kiae.ru>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 2005-Jul-14 14:14:42 +0400, Eygene A. Ryabinkin wrote:
> Playing with OPIE I've noticed that the /etc/opiekeys have mode 644.
...
> But now it seems to be vulnurable again. Are there any programs that are
>run in non-root mode and they do want to use OPIE? If there is no such
>programs, why the permissions are so strange?

Since an OPIE password can only be used once, any program that uses OPIE
needs to be able to read and write /etc/opiekeys.  There is no valid reason
for a program to just want to read the file.

-- 
Peter Jeremy



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050721073440.GA324>