[Logcheck-devel] Bug#352337: please tighten permissions on /etc/logcheck

martin f krafft madduck at debian.org
Sat Feb 11 11:29:02 UTC 2006


Package: logcheck
Severity: wishlist

I see no reason why /etc/logcheck should have any more permissions
than 0750. Please consider removing access rights from 'other'.

-- System Information:
Debian Release: testing/unstable
  APT prefers stable
  APT policy: (700, 'stable'), (600, 'testing'), (98, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-1-686
Locale: LANG=en_GB, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

-- 
 .''`.     martin f. krafft <madduck at debian.org>
: :'  :    proud Debian developer and author: http://debiansystem.info
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP (sub)keys? Use subkeys.pgp.net as keyserver!
 
micro$oft windoze is like an air-conditioner:
it breaks down if you open a window.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature (GPG/PGP)
Url : http://lists.alioth.debian.org/pipermail/logcheck-devel/attachments/20060211/10e2f59b/attachment.pgp 


More information about the Logcheck-devel mailing list