<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: World writeable manpages in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033706#M133095</link>
    <description>Thanks, guys.  If neither you three nor Clay knows why this happens, it would probably take the source code to figure out.&lt;BR /&gt;&lt;BR /&gt;There are all kinds of workarounds that come to mind, and it's not really a security problem, it just rings bells for auditors (who ought to have something better to do anyway).  Of course, my boss might get upset if she found out that the grep manpage was now about "Gratuitously Rectum Ejected Projectiles".  ;)</description>
    <pubDate>Fri, 25 Jul 2003 15:57:21 GMT</pubDate>
    <dc:creator>W.C. Epperson</dc:creator>
    <dc:date>2003-07-25T15:57:21Z</dc:date>
    <item>
      <title>World writeable manpages</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033702#M133091</link>
      <description>Doing a "man" on our 11.0 systems for a command not previously "man"-ed results in a world writeable manpage, e.g. "man man" for the first time results in:&lt;BR /&gt;-rw-rw-rw-   1 root       root          9287 Jul 25 11:05 ./share/man/cat1.Z/man&lt;BR /&gt;.1&lt;BR /&gt;&lt;BR /&gt;This trips audit alarms, but we have not been able to track down the cause yet.  Anyone know the culprit?  I was guessing a umask for a setuid executable somewhere in the process, but can't find one.</description>
      <pubDate>Fri, 25 Jul 2003 14:14:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033702#M133091</guid>
      <dc:creator>W.C. Epperson</dc:creator>
      <dc:date>2003-07-25T14:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: World writeable manpages</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033703#M133092</link>
      <description>W.C.,&lt;BR /&gt;&lt;BR /&gt;Check Clay's final answer in this thread:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x3cc2506d69a7d711abdc0090277a778c,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x3cc2506d69a7d711abdc0090277a778c,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Pete&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 25 Jul 2003 14:18:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033703#M133092</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2003-07-25T14:18:58Z</dc:date>
    </item>
    <item>
      <title>Re: World writeable manpages</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033704#M133093</link>
      <description>That is the default permission for man pages.&lt;BR /&gt;&lt;BR /&gt;They are owned by root and are read/write.&lt;BR /&gt;&lt;BR /&gt;This does not really present a huge security hazard because they are not programs that do anything.&lt;BR /&gt;&lt;BR /&gt;I suppose someone could mess with them and lead a sysadmin to do something stupid.&lt;BR /&gt;&lt;BR /&gt;Manually change the permissions and move on.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Fri, 25 Jul 2003 14:19:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033704#M133093</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-07-25T14:19:30Z</dc:date>
    </item>
    <item>
      <title>Re: World writeable manpages</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033705#M133094</link>
      <description>Hi:&lt;BR /&gt;&lt;BR /&gt;I prefer to have (keep) pre-formatted pages anyway.  Why not run 'catman -m' to create all pages; change the security as you see fit (auditors are a gross pain) and be done with this?&lt;BR /&gt;&lt;BR /&gt;BTW, in keeping with my preference for pre-formatted pages, after any patch upgrade, Ignite upgrade, etc. I do:&lt;BR /&gt;&lt;BR /&gt;# catman -m&lt;BR /&gt;&lt;BR /&gt;Regards!&lt;BR /&gt;&lt;BR /&gt;...JRF...&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 25 Jul 2003 14:20:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033705#M133094</guid>
      <dc:creator>James R. Ferguson</dc:creator>
      <dc:date>2003-07-25T14:20:26Z</dc:date>
    </item>
    <item>
      <title>Re: World writeable manpages</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033706#M133095</link>
      <description>Thanks, guys.  If neither you three nor Clay knows why this happens, it would probably take the source code to figure out.&lt;BR /&gt;&lt;BR /&gt;There are all kinds of workarounds that come to mind, and it's not really a security problem, it just rings bells for auditors (who ought to have something better to do anyway).  Of course, my boss might get upset if she found out that the grep manpage was now about "Gratuitously Rectum Ejected Projectiles".  ;)</description>
      <pubDate>Fri, 25 Jul 2003 15:57:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033706#M133095</guid>
      <dc:creator>W.C. Epperson</dc:creator>
      <dc:date>2003-07-25T15:57:21Z</dc:date>
    </item>
    <item>
      <title>Re: World writeable manpages</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033707#M133096</link>
      <description>W.C.,&lt;BR /&gt;&lt;BR /&gt;I thought Clay had a pretty good supposition as to why:  "I suspect the reason for the 666 mode setting is so that when a change to a man page is needed, anyone can format and replace it from the manX.Z originals" and I thought James had a pretty good solution "run 'catman -m' to create all pages; change the security as you see fit".&lt;BR /&gt;&lt;BR /&gt;Works for me anyway!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Pete&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 25 Jul 2003 16:02:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033707#M133096</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2003-07-25T16:02:15Z</dc:date>
    </item>
    <item>
      <title>Re: World writeable manpages</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033708#M133097</link>
      <description>OK, Pete, I bumped JRFs points.  I was asking for explanation, not workaround, but it's viable.&lt;BR /&gt;&lt;BR /&gt;As to having wide-open permissions so anyone can replace a manpage, it's not a very good reason.  Everyone can change their passwords, but they don't have write on /etc/passwd.  A setgid executable would seem to make more sense to me.  As noted, this is not a serious security problem, but it's a gratuitous opportunity for mischief.  And I'm paranoid by nature--was ISSO before they made me chief systems engineer.</description>
      <pubDate>Fri, 25 Jul 2003 16:31:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033708#M133097</guid>
      <dc:creator>W.C. Epperson</dc:creator>
      <dc:date>2003-07-25T16:31:52Z</dc:date>
    </item>
    <item>
      <title>Re: World writeable manpages</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033709#M133098</link>
      <description>W.C.,&lt;BR /&gt;&lt;BR /&gt;I agree - it's a lousy reason and a nagging security issue that *probably* would never come back to bite you, but . . . &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Pete "Rampant Paranoia" Randall</description>
      <pubDate>Fri, 25 Jul 2003 16:37:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033709#M133098</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2003-07-25T16:37:19Z</dc:date>
    </item>
    <item>
      <title>Re: World writeable manpages</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033710#M133099</link>
      <description>No culprint here. World writable man page directories are designed for the man page tools (man, catman, fixman).  The /usr/share/man directory contains cat* directories that are 777, normally a big security issue. (it is curious that security scanners supposedly Unix-aware will hiccup on these legacy directories).  You can certainly lock down the cat directories to 755 and the contents to 644, but then a new man page will not be created when an ordinary user uses man.&lt;BR /&gt;&lt;BR /&gt;So the schools of thought are:&lt;BR /&gt;&lt;BR /&gt;1. remove the cat directories and force *every* man page to be formatted *every* time. No security issues, just a burn of CPU and disk time. On a system with a 50Mhz CPU, this might be a meaningful delay.&lt;BR /&gt;&lt;BR /&gt;2. change permissions on the cat* directories to 755 and contents to 644. root can format (and auto-save) man pages to the cat directories, while ordinary users will either read an pre-existing page or wait for the formatting message to disappear. A possible fix is to run catman in cron to regularly format/update the cat directories.&lt;BR /&gt;&lt;BR /&gt;3. leave the permissions at 777 (666 for formatted man pages) and ask your security specialists to define the potential risk(s).</description>
      <pubDate>Sat, 26 Jul 2003 00:16:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/world-writeable-manpages/m-p/3033710#M133099</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2003-07-26T00:16:16Z</dc:date>
    </item>
  </channel>
</rss>

