Package: knockd
Version: 0.7-1
Severity: normal

Dear Maintainer,

after installation of knockd on Debian I discovered that /etc/knockd.conf has a 
file permission
of 644. This means the secret port knocking frequence is readable for all 
system users.

Additional, if an attacker can get read access to files (due to a flaw in a web 
app i. e.)
he can read the sequences and associated commands as well.

On Ubuntu 16.04 the file permission of /etc/knockd.conf is 640 after 
installation. I
would expect the same or 600 on Debian.

Please check an fix if appropriate.


Best regards from Germany

Tom Gries




-- System Information:
Distributor ID: Kali
Description:    Kali GNU/Linux Rolling
Release:        kali-rolling
Codename:       kali-rolling
Architecture: x86_64

Kernel: Linux 4.13.0-kali1-amd64 (SMP w/1 CPU core)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages knockd depends on:
ii  libc6       2.25-3
ii  libpcap0.8  1.8.1-5
ii  logrotate   3.11.0-0.1
ii  lsb-base    9.20170808

knockd recommends no packages.

knockd suggests no packages.

-- no debconf information

Reply via email to