]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/commit
/etc/skeykeys was basically suffering from the same vulnerability
authorJoerg Wunsch <joerg@FreeBSD.org>
Fri, 26 Apr 1996 21:33:18 +0000 (21:33 +0000)
committerJoerg Wunsch <joerg@FreeBSD.org>
Fri, 26 Apr 1996 21:33:18 +0000 (21:33 +0000)
commit711e38f8ed0a78cbe86f57d7a59d31eebb7d67c3
tree7e6e5bd70e59bafc8d15db198b5eecdbf08cd9d9
parent68ba25409fa535b0d883b0695034888859c66977
/etc/skeykeys was basically suffering from the same vulnerability
as any non-shadowed /etc/passwd.  Ironically, all programs using S/Key
have already been setuid root except keyinfo(1).

This modification creates /etc/skeykeys with mode 0600 to prevent it
from being examined by ordinary users.
lib/libskey/skeylogin.c