[Logcheck-devel] Bug#352337: please tighten permissions on /etc/logcheck
martin f krafft
madduck at debian.org
Sat Feb 11 11:29:02 UTC 2006
Package: logcheck
Severity: wishlist
I see no reason why /etc/logcheck should have any more permissions
than 0750. Please consider removing access rights from 'other'.
-- System Information:
Debian Release: testing/unstable
APT prefers stable
APT policy: (700, 'stable'), (600, 'testing'), (98, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-1-686
Locale: LANG=en_GB, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
--
.''`. martin f. krafft <madduck at debian.org>
: :' : proud Debian developer and author: http://debiansystem.info
`. `'`
`- Debian - when you have better things to do than fixing a system
Invalid/expired PGP (sub)keys? Use subkeys.pgp.net as keyserver!
micro$oft windoze is like an air-conditioner:
it breaks down if you open a window.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature (GPG/PGP)
Url : http://lists.alioth.debian.org/pipermail/logcheck-devel/attachments/20060211/10e2f59b/attachment.pgp
More information about the Logcheck-devel
mailing list