As dave said I think that this will break stuff - but I also remember 
there is  a way to get the passwd file used (served) by the ftp 
daemon to be a dummy passwd file with just your ftp user(s) in there, 
rather than your real users...

not a massive problem because the passwords are stored in the shadow 
file - but it is a problem if you have lusers on your system choosing 
weak passwords...

I can't remember where I read about the dummy passwd file for ftp 
though - I solved our ftpd vulnerabilities a year or two back by 
using:

rpm --erase

on whatever package wuftpd is in - see - it's been so long I don't 
even remember that! ;)

- dan.


At 12:25 PM -0400 18/9/00, Scott wrote:
>Dan,
>
>
>Couldn't he just chmod /etc/passwd to 600?  Thus disallowing viewing of this
>file. What are the problems that may arise from this change?
>
-- 

        Nitro - 3D Visualisation, Graphics & Animation
                Ph (+61 2) 9810 5177 - Fx (+61 2) 9810 0199
                        http://www.nitro.com.au/



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to