Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/CISOfy/lynis.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSimon Biewald <simon@fam-biewald.de>2020-06-20 18:08:56 +0300
committerSimon Biewald <simon@fam-biewald.de>2020-06-20 18:08:56 +0300
commitb7b132721e166d9809e081e4c082a9e843b2d345 (patch)
treef862ef8163879ed1faccbc92c3c38438493e4dca /SECURITY.md
parentbd29a3e4e790d9825521ae9e9a04ffb3c01721d0 (diff)
check permissions of files used by rsh
The old rsh (remote shell) grants access to users and hosts in the files /etc/hosts.equiv and ~/r(login|hosts). If attackers can write to those files, he can logon as a different user or even root (in case of roots .r(login|hosts) only) to the system. While the rsh daemon usually checks for non-root owners or write permissions, this may not be the case on any system. Those files might affect other services as well (rlogin, rcp, ...). As hostnames and usernames are not verified securely, the use of rsh and similar commands discouraged. It may still be in use on legacy systems even today, so it should be secured as much as possible if not possible to remove/replace.
Diffstat (limited to 'SECURITY.md')
0 files changed, 0 insertions, 0 deletions