summaryrefslogtreecommitdiffstats
path: root/usr.bin/keyinfo/keyinfo.pl
diff options
context:
space:
mode:
authorjoerg <joerg@FreeBSD.org>1996-04-26 21:33:18 +0000
committerjoerg <joerg@FreeBSD.org>1996-04-26 21:33:18 +0000
commit2d430f5746ff743957a88b3d67c2cb037327ad56 (patch)
tree7e6e5bd70e59bafc8d15db198b5eecdbf08cd9d9 /usr.bin/keyinfo/keyinfo.pl
parent6f11b21010882d6fedd9099d8da85e401bb0d642 (diff)
downloadFreeBSD-src-2d430f5746ff743957a88b3d67c2cb037327ad56.zip
FreeBSD-src-2d430f5746ff743957a88b3d67c2cb037327ad56.tar.gz
/etc/skeykeys was basically suffering from the same vulnerability
as any non-shadowed /etc/passwd. Ironically, all programs using S/Key have already been setuid root except keyinfo(1). This modification creates /etc/skeykeys with mode 0600 to prevent it from being examined by ordinary users.
Diffstat (limited to 'usr.bin/keyinfo/keyinfo.pl')
0 files changed, 0 insertions, 0 deletions
OpenPOWER on IntegriCloud