KELEMEN Peter wrote:

* Peer Janssen ([EMAIL PROTECTED]) [20050908 15:53]:

...] I'm sending mail to root to an external network account.
I fail to see how this is arpwatch's problem.  Your reasoning
can be used for *every* application that sends mail to root.
Handling root's mail securely is *your* responsibility, not the
applications'.
I agree with this, but when I installed this root mail forwarding, I chose to do so, while arpwatch sent it's mails right away and immediately after the install, without giving me any choice. Since arpwatch discloses information about IPs and MACs of the internal network as well as hardware info, I consider this a security risk.

I learned about this behavior only from the mails I received. Then I read the man page and discovered my options, and changed the setup.

You might say that this is a non-secure way to approach an installation of a new program, and that I should have read the man-page and the sources before installing. Maybe, it a valid point of view. My point of view also is that the package is not secure out of the box, and I consider this as valid, too.

The solution would be:
- deactivate sending mail by default (simply logging in syslog, which arpwatch does do as well, seems perfect to me), and/or - asking the user a question at installation time if this is the desired behavior.

Btw, other than this, I'm quite satisfied with arpwatch, and I also appreciate the progress since woody's version.

Regards
Peer



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to