Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 8 Jun 1998 18:09:58 -0700
From:      Don Lewis <Don.Lewis@tsc.tdk.com>
To:        Palle Girgensohn <girgen@partitur.se>, Wm Brian McCane <root@bmccane.maxbaud.net>
Cc:        isp@FreeBSD.ORG
Subject:   Re: nightly security run
Message-ID:  <199806090109.SAA19811@salsa.gv.tsc.tdk.com>
In-Reply-To: Palle Girgensohn <girgen@partitur.se> "Re: nightly security run" (Jun  7,  8:18pm)

next in thread | previous in thread | raw e-mail | index | archive | help
On Jun 7,  8:18pm, Palle Girgensohn wrote:
} Subject: Re: nightly security run
} Hello Brian,
} 
} Check out /etc/security. In there, there is a code snippet thar runs the
} find command:
} 
} MP=`mount -t ufs | grep -v " nosuid" | sed 's;/dev/;&r;' | awk '{ print
} $3 }'`
} set $MP
} while test $# -ge 1; do
} 	mount=$1
} 	shift
} 	find $mount -xdev -type f \
} 		\( -perm -u+x -or -perm -g+x -or -perm -o+x \) \
} 		\( -perm -u+s -or -perm -g+s \)  -print0
} done | xargs -0 -n 20 ls -lTd | sort +9 > $TMP
} 
} 
} I suggest adding | grep -v "mount point of news..." to the first line if
} you have news on it's own partition, which I suppose you do, considering
} the size... :)
} I guess there are a bunch of ways to do it.

I'd recommend mounting that filesystem (and any other filesystems that
shouldn't contain suid executables) nosuid.  Then you don't have to
tweak /etc/security and the security of your system is enhanced because
crackers have fewer places to hide suid executables.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-isp" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199806090109.SAA19811>