Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 11 Mar 2001 20:58:37 +1300
From:      "Dan Langille" <dan@langille.org>
To:        freebsd-security@freebsd.org
Subject:   Re: temp files for security/logcheck
Message-ID:  <200103110758.f2B7wcw05889@ns1.unixathome.org>
In-Reply-To: <20010310230843.A26101@greg.cex.ca>
References:  <20010310225345.A14180@mollari.cthul.hu>; from kris@obsecurity.org on Sat, Mar 10, 2001 at 10:53:46PM -0800

next in thread | previous in thread | raw e-mail | index | archive | help
On 10 Mar 2001, at 23:08, Greg White wrote:

> On Sat, Mar 10, 2001 at 10:53:46PM -0800, Kris Kennaway wrote:
> > On Sun, Mar 11, 2001 at 05:47:58PM +1300, Dan Langille wrote:
> > > AFAIK, the files disappear each time the script is run:
> > > 
> > > umask 077
> > > rm -f $TMPDIR/check.$$ $TMPDIR/checkoutput.$$ 
> > 
> > [...]
> > 
> > Blah, that's an insecure way to create files in $TMPDIR (which is
> > usually /tmp).  It needs to use mktemp(1).
> > 
> > Kris
> 
> It is in general, but not in this case. The script and the directory are
> mode 0700 -- this makes it difficult for it to be insecure. $TMPDIR is
> explicitly set.

Well, unless I hear otherwise, I'll leave the port as is.  Perhaps using 
/usr/local/var/tmp/logcheck/ is a better idea.  But until we come up with 
a formal policy, I'll leave this for a future improvement.

Thanks folks.

-- 
Dan Langille
pgpkey - finger dan@unixathome.org | http://unixathome.org/finger.php
got any work?  I'm looking for some.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200103110758.f2B7wcw05889>