Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 16 Jun 2001 16:10:03 -0700 (PDT)
From:      Brad Huntting <huntting@glarp.com>
To:        freebsd-bugs@FreeBSD.org
Subject:   Re: misc/28188: Cron is being started to early in /etc/rc (potential security hole) 
Message-ID:  <200106162310.f5GNA3O94054@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
The following reply was made to PR misc/28188; it has been noted by GNATS.

From: Brad Huntting <huntting@glarp.com>
To: "Crist Clark" <crist.clark@globalstar.com>
Cc: Dima Dorfman <dima@unixfreak.org>,
	Brad Huntting <huntting@glarp.com>, freebsd-gnats-submit@FreeBSD.ORG,
	security@FreeBSD.ORG
Subject: Re: misc/28188: Cron is being started to early in /etc/rc (potential security hole) 
Date: Sat, 16 Jun 2001 17:06:33 -0600

 > But you are right of course, the most secure way to go is raise 
 > securelevel as early as possible in the boot sequence (although
 > off of the top of my head, I can't think of anything besides cron(8)
 > that would run non-"trusted" code).[...]
 
 Sendmail (runs programs specified in .forward files), inetd (ftp,
 telnet, etc) sshd (user shells), httpd (cgi-bin's)....  Cron's
 @reboot is just the easiest one to exploit.
 
 
 brad

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200106162310.f5GNA3O94054>