home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.sys.sgi
- Path: sparky!uunet!stanford.edu!bcm!tamsun.tamu.edu!bpb9204
- From: bpb9204@tamsun.tamu.edu (Brent)
- Subject: Net Services and backdoors
- Message-ID: <1992Nov18.162916.12717@tamsun.tamu.edu>
- Organization: Institute for Scientific Computation
- Date: Wed, 18 Nov 1992 16:29:16 GMT
- Lines: 27
-
- Hello, all.
-
- We have a lab with SGIs, RS6Ks, and Suns, and some of the machines
- have subtle network software problems. Fortunately, I've been
- able to track down all the problems (except for mail).
-
- One minor problem was that you could not "finger @machine" because
- finger would print "connection refused." This simple problem boiled
- down to "machine" (an SGI) running fingerd as user "guest." Guest
- was a nonexistent user on the system. I edited /usr/etc/inetd.conf
- to change the finger entry to run as root.
-
- Now my main question. Which of these network services do you NOT
- want to run as root? Does finger have any backdoors or other holes
- into the system?
-
- Is there documentation someplace about which network services can
- spawn shells or otherwise allow somebody access to your system
- (by not using telnet/rlogin)?
-
- I'd appreciate any comments you may think of.
-
- -Brent
- --
- ------------------------------------------------------------------------------
- Brent P. Burton, N5VMG
- bpb9204@tamsun.tamu.edu
-