Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 16 Feb 1996 10:46:52 -0500 (EST)
From:      Brian Tao <taob@io.org>
To:        James FitzGibbon <james@else.net>
Cc:        FREEBSD-SECURITY-L <freebsd-security@freebsd.org>
Subject:   Re: Temporary passwd files in /etc?
Message-ID:  <Pine.BSF.3.91.960216104352.24676C-100000@zip.io.org>
In-Reply-To: <Pine.LNX.3.91.960215202232.30726B-100000@else.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 15 Feb 1996, James FitzGibbon wrote:
> 
> I didn't see an answer to this in the list, but they are created by 
> chpass/vipw type utilities.  I've never seen one get mode 666 though.  

    We tracked it down a while ago.  We have a perl script that
massages password files, pretending to be the "editor" that vipw
calls.  The umask in the perl script was set incorrectly.
--
Brian Tao (BT300, taob@io.org)
Systems Administrator, Internex Online Inc.
"Though this be madness, yet there is method in't"




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.960216104352.24676C-100000>