Hi *, 

Going through the Debian bug reports on tcpdump I found this one:

On Mon, Mar 05, 2001 at 07:19:46PM -0600, Debian Bug Tracking System wrote:
> 
>                         Debian Bug report logs - #81335
>                  tcpdump: tcpdump -w file should be mode 0600

> Date: Fri, 5 Jan 2001 21:45:20 +0100
> From: Marek Michalkiewicz <[EMAIL PROTECTED]>
> Subject: tcpdump: tcpdump -w file should be mode 0600
> To: [EMAIL PROTECTED]
> 
> Package: tcpdump
> Version: 3.4a6-6
> Severity: wishlist
> 
> The file created with the tcpdump -w option is mode 0644 by default.
> While it is possible to work around it (umask 077), I think the file should
> be created with mode 0600 unconditionally, as it might contain sensitive
> information (only root can sniff network traffic for the same reason).
> 
> This is a feature request, but may be considered a security hole too...

What do you think? I wanted to attach a simple patch but since fopen is
used for opening the file and since there is a windows port of libpcap
it is not quite that easy. One could as well invoke umask in tcpdump's
main if available.

Comments?

Thanks

        Torsten

PGP signature

Reply via email to