Date: Sun, 11 Mar 2001 20:58:37 +1300 From: "Dan Langille" <dan@langille.org> To: freebsd-security@freebsd.org Subject: Re: temp files for security/logcheck Message-ID: <200103110758.f2B7wcw05889@ns1.unixathome.org> In-Reply-To: <20010310230843.A26101@greg.cex.ca> References: <20010310225345.A14180@mollari.cthul.hu>; from kris@obsecurity.org on Sat, Mar 10, 2001 at 10:53:46PM -0800
next in thread | previous in thread | raw e-mail | index | archive | help
On 10 Mar 2001, at 23:08, Greg White wrote: > On Sat, Mar 10, 2001 at 10:53:46PM -0800, Kris Kennaway wrote: > > On Sun, Mar 11, 2001 at 05:47:58PM +1300, Dan Langille wrote: > > > AFAIK, the files disappear each time the script is run: > > > > > > umask 077 > > > rm -f $TMPDIR/check.$$ $TMPDIR/checkoutput.$$ > > > > [...] > > > > Blah, that's an insecure way to create files in $TMPDIR (which is > > usually /tmp). It needs to use mktemp(1). > > > > Kris > > It is in general, but not in this case. The script and the directory are > mode 0700 -- this makes it difficult for it to be insecure. $TMPDIR is > explicitly set. Well, unless I hear otherwise, I'll leave the port as is. Perhaps using /usr/local/var/tmp/logcheck/ is a better idea. But until we come up with a formal policy, I'll leave this for a future improvement. Thanks folks. -- Dan Langille pgpkey - finger dan@unixathome.org | http://unixathome.org/finger.php got any work? I'm looking for some. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200103110758.f2B7wcw05889>