From owner-freebsd-ports@freebsd.org Thu Aug 11 05:05:15 2016 Return-Path: Delivered-To: freebsd-ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BFDEFBB5631; Thu, 11 Aug 2016 05:05:15 +0000 (UTC) (envelope-from ohartman@zedat.fu-berlin.de) Received: from outpost1.zedat.fu-berlin.de (outpost1.zedat.fu-berlin.de [130.133.4.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 857E31C07; Thu, 11 Aug 2016 05:05:15 +0000 (UTC) (envelope-from ohartman@zedat.fu-berlin.de) Received: from inpost2.zedat.fu-berlin.de ([130.133.4.69]) by outpost.zedat.fu-berlin.de (Exim 4.85) with esmtps (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (envelope-from ) id <1bXiB6-000JeY-MK>; Thu, 11 Aug 2016 07:05:12 +0200 Received: from p578a69f9.dip0.t-ipconnect.de ([87.138.105.249] helo=freyja.zeit4.iv.bundesimmobilien.de) by inpost2.zedat.fu-berlin.de (Exim 4.85) with esmtpsa (TLSv1.2:AES256-GCM-SHA384:256) (envelope-from ) id <1bXiB6-000WkZ-DP>; Thu, 11 Aug 2016 07:05:12 +0200 Date: Thu, 11 Aug 2016 07:05:05 +0200 From: "O. Hartmann" To: freebsd-current , freebsd-ports Subject: Passwordless accounts vi ports! Message-ID: <20160811070505.2c1a1466@freyja.zeit4.iv.bundesimmobilien.de> Organization: FU Berlin X-Mailer: Claws Mail 3.14.0 (GTK+ 2.24.29; amd64-portbld-freebsd12.0) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Originating-IP: 87.138.105.249 X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 11 Aug 2016 05:05:15 -0000 I just checked the security scanning outputs of FreeBSD and found this surprising result: [...] Checking for passwordless accounts: polkitd::565:565::0:0:Polkit Daemon User:/var/empty:/usr/sbin/nologin pulse::563:563::0:0:PulseAudio System User:/nonexistent:/usr/sbin/nologin saned::194:194::0:0:SANE Scanner Daemon:/nonexistent:/bin/sh clamav::106:106::0:0:Clamav Antivirus:/nonexistent:/usr/sbin/nologin bacula::910:910::0:0:Bacula Daemon:/var/db/bacula:/usr/sbin/nologin [...] Obviously, some ports install accounts but do not secure them as there is an empty password. I consider this not a feature, but a bug. Regards, Oliver