Date: Mon, 8 Jun 1998 18:09:58 -0700 From: Don Lewis <Don.Lewis@tsc.tdk.com> To: Palle Girgensohn <girgen@partitur.se>, Wm Brian McCane <root@bmccane.maxbaud.net> Cc: isp@FreeBSD.ORG Subject: Re: nightly security run Message-ID: <199806090109.SAA19811@salsa.gv.tsc.tdk.com> In-Reply-To: Palle Girgensohn <girgen@partitur.se> "Re: nightly security run" (Jun 7, 8:18pm)
next in thread | previous in thread | raw e-mail | index | archive | help
On Jun 7, 8:18pm, Palle Girgensohn wrote:
} Subject: Re: nightly security run
} Hello Brian,
}
} Check out /etc/security. In there, there is a code snippet thar runs the
} find command:
}
} MP=`mount -t ufs | grep -v " nosuid" | sed 's;/dev/;&r;' | awk '{ print
} $3 }'`
} set $MP
} while test $# -ge 1; do
} mount=$1
} shift
} find $mount -xdev -type f \
} \( -perm -u+x -or -perm -g+x -or -perm -o+x \) \
} \( -perm -u+s -or -perm -g+s \) -print0
} done | xargs -0 -n 20 ls -lTd | sort +9 > $TMP
}
}
} I suggest adding | grep -v "mount point of news..." to the first line if
} you have news on it's own partition, which I suppose you do, considering
} the size... :)
} I guess there are a bunch of ways to do it.
I'd recommend mounting that filesystem (and any other filesystems that
shouldn't contain suid executables) nosuid. Then you don't have to
tweak /etc/security and the security of your system is enhanced because
crackers have fewer places to hide suid executables.
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-isp" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199806090109.SAA19811>
