From owner-freebsd-current Tue Apr 9 23:48:12 1996 Return-Path: owner-current Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id XAA04050 for current-outgoing; Tue, 9 Apr 1996 23:48:12 -0700 (PDT) Received: from GndRsh.aac.dev.com (GndRsh.aac.dev.com [198.145.92.241]) by freefall.freebsd.org (8.7.3/8.7.3) with SMTP id XAA04043 for ; Tue, 9 Apr 1996 23:48:05 -0700 (PDT) Received: (from rgrimes@localhost) by GndRsh.aac.dev.com (8.6.12/8.6.12) id XAA15909; Tue, 9 Apr 1996 23:47:23 -0700 From: "Rodney W. Grimes" Message-Id: <199604100647.XAA15909@GndRsh.aac.dev.com> Subject: Re: /var/mail default permissions?? To: peter@jhome.DIALix.COM (Peter Wemm) Date: Tue, 9 Apr 1996 23:47:23 -0700 (PDT) Cc: current@freebsd.org In-Reply-To: <199604100556.NAA03118@jhome.DIALix.COM> from Peter Wemm at "Apr 10, 96 01:56:20 pm" X-Mailer: ELM [version 2.4ME+ PL11 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-current@freebsd.org X-Loop: FreeBSD.org Precedence: bulk > I thought /var/mail was supposed to be mode 1777 on BSD systems?? Not according to the Sendmail BAT book... Also see revsions 1.10 and 1.11 of src/etc/mtree/BSD.var.dist... > mail.local was designed to work in that scenario and has specific code to make > sure it's secure.. (granted, the net-2 mail.local may not have been solid, but > the 4.4BSD mail.local has been secure since the encumbered release and later > in the Lite releases) Though mail.local can be sure it does safe things in there, making this world writeable allows a very easy denial of service attack: cat /dev/zero >/var/mail/bigone (no noone can get mail on the system :-(). Which then would probably stop syslogd logging... (but then, they could do this with /var/tmp too (a good reason to move /var/tmp out of the /var partition if you want to make sure your logging can not easily be defeated by filling /var up.) -- Rod Grimes rgrimes@gndrsh.aac.dev.com Accurate Automation Company Reliable computers for FreeBSD