- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: Why is root having a .forward file a "Big Secu...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-19-2002 01:58 PM
11-19-2002 01:58 PM
Why is root having a .forward file a "Big Security risk"
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-19-2002 02:31 PM
11-19-2002 02:31 PM
Re: Why is root having a .forward file a "Big Security risk"
Therefore it's critical that perms be locked down on this file if used.
Rgds,
Jeff
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-19-2002 02:40 PM
11-19-2002 02:40 PM
Re: Why is root having a .forward file a "Big Security risk"
"jkoonz@usco.com". Since only unixid root can change the file, I can't see where having the file is a security hole. If it's changed, I got much bigger problems.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-19-2002 02:45 PM
11-19-2002 02:45 PM
Re: Why is root having a .forward file a "Big Security risk"
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-19-2002 02:48 PM
11-19-2002 02:48 PM
Re: Why is root having a .forward file a "Big Security risk"
The thing is, if someone hacked into your system and changed the .forward so that it ran a script named xyz, which .forward can do, that did something nasty to your system in addition to forwarding the mail to you, would you know about it? Are you certain that you'd catch it before something nasty happened?
The fact that the script is read-only help, but is really irrelavent. If someone got into the root account, read-only isn't going to stop them.
There are MANY MANY things in the unix system that are large security risks (telnet, r* commands, ftp - all these send passwords across the net as clear text). The thing you have to do is determine if the risk is worth it in your particular instance.
The only way to have a truly secure system is to turn it off, which won't do you any good.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-19-2002 02:51 PM
11-19-2002 02:51 PM
Re: Why is root having a .forward file a "Big Security risk"
Remember that .forward MUST be owned by root:sys as well as 400 or 600 perms to be allowed to be accessed.
Jeff
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-19-2002 02:53 PM
11-19-2002 02:53 PM
Re: Why is root having a .forward file a "Big Security risk"
Jeff is correct, The contents of the 'forward' file can be altered if you're not careful. See here for more information:
http://ciac.llnl.gov/ciac/bulletins/h-11.shtml
Regards!
...JRF...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-19-2002 02:57 PM
11-19-2002 02:57 PM
Re: Why is root having a .forward file a "Big Security risk"
It is recommended to have /root instead, with permissions of 700 on the directory.
Have the .forward file as permissions 600
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-19-2002 07:27 PM
11-19-2002 07:27 PM
Re: Why is root having a .forward file a "Big Security risk"
Rather than use .forward, I would use /etc/mail/aliases to forward all the root email (not just root but all the admin logins and addresses too like hostmaster and webmaster and postmaster, etc) to a central location. Not doing this means loss of valuable notifications when root's email is not checked on each machine.
Bill Hassell, sysadmin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-20-2002 06:28 AM
11-20-2002 06:28 AM
Re: Why is root having a .forward file a "Big Security risk"
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-20-2002 06:28 AM
11-20-2002 06:28 AM
Re: Why is root having a .forward file a "Big Security risk"
The risk depends on the privileges used when running the .forward script. Various techniques can be used to reduce the risk including never running it as root. It depends on the software running it. The same risks apply to the aliases file, but it may be looked at more often than a .forward file.
Tools that replace the files from a central repository on a periodic basis can reduce the risk, as can tools that scan the contents for invalid commands. smrsh can also reduce the risk by limiting the programs that can be run.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-20-2002 06:33 AM
11-20-2002 06:33 AM
Re: Why is root having a .forward file a "Big Security risk"
Like
.nslookuprc
.forward
.netrc
etc.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-10-2002 11:19 AM
12-10-2002 11:19 AM
Re: Why is root having a .forward file a "Big Security risk"
Its can be safely forwarded to a regular user with /etc/aliases entries.
This script, designed for Linux, but quite usable will let you customize the mail profile and safely route mail where you need it to go.
Not that .forward is a problem, so long as the permissions on the file or directory is 700
#!/bin/sh
# A script designed to rebuild all relavent mail databases after a configuration
# change.
#
#
newaliases
cd /etc/mail
makemap -r -v hash access.db < access
makemap -r -v hash domaintable.db < domaintable
makemap -r -v hash genericstable.db < genericstable
makemap -r -v hash mailertable.db < mailertable
makemap -r -v hash virtusertable.db < virtusertable
cp /etc/sendmail.cf /root
m4 /etc/mail/sendmail.mc > /etc/sendmail.cf
echo "You need to edit the sendmail.cf file for localhost et al"
sleep 3
vi /etc/sendmail.cf
/etc/init.d/sendmail restart
My mamual mod is becasue I need to make a manual change to sendmail.cf to deal with some configuration idiosynchrasies on my servers.
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-08-2003 10:48 AM
01-08-2003 10:48 AM
Re: Why is root having a .forward file a "Big Security risk"
I like Bill Hassel's response best, next my own.
Pride of ownership.
Steve
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com