home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.unix.admin
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!wupost!uwm.edu!psuvax1!atlantis.psu.edu!barr
- From: barr@pop.psu.edu (David Barr)
- Subject: Re: Where can I find a "fingerd" that fingers the person back?
- Message-ID: <-kg1H1m849@atlantis.psu.edu>
- Sender: news@atlantis.psu.edu (Usenet)
- Organization: Penn State Population Research Institute
- References: <1992Aug22.225032.637@csus.edu>
- Distribution: usa
- Date: Sun, 23 Aug 92 03:04:10 GMT
- Lines: 16
-
- In article <1992Aug22.225032.637@csus.edu> tching@target.water.ca.gov (Tracy Ching <SysAdmin>) writes:
- > True... fingering someone is an innocent act. No argument there.
- >One comment - internally finger must work for other employees to see.
- >I do have a question regarding that. Does anyone in net-land remotely
- >agree that the finger is a possible security hole for a well seasoned
- >unix guru? (that which I am obviously not and admit it)
-
- Running fingerd is a double-edged sword. On the one hand it does provide
- login names for hackers to try, but on the other hand it does provide
- invaluable information in tracking down crackers. I find the latter
- a more important feature. Besides, a system without a fingerd is a
- very unfriendly one, IMHO. For the average hacker, fingerd is not a
- serious obstacle. If you're paranoid about it, run tcp_wrapper around
- it and log it (along with the rest of your tcp services in inetd.conf).
-
- --Dave
-