Date: Thu, 21 Jul 2005 17:34:40 +1000 From: Peter Jeremy <PeterJeremy@optushome.com.au> To: "Eygene A. Ryabinkin" <freebsd@rea.mbslab.kiae.ru> Cc: hackers@freebsd.org Subject: Re: /etc/opiekeys permissions? Message-ID: <20050721073440.GA324@cirb503493.alcatel.com.au> In-Reply-To: <20050714101442.GI16608@rea.mbslab.kiae.ru> References: <20050714101442.GI16608@rea.mbslab.kiae.ru>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 2005-Jul-14 14:14:42 +0400, Eygene A. Ryabinkin wrote: > Playing with OPIE I've noticed that the /etc/opiekeys have mode 644. ... > But now it seems to be vulnurable again. Are there any programs that are >run in non-root mode and they do want to use OPIE? If there is no such >programs, why the permissions are so strange? Since an OPIE password can only be used once, any program that uses OPIE needs to be able to read and write /etc/opiekeys. There is no valid reason for a program to just want to read the file. -- Peter Jeremy
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050721073440.GA324>