Level 1 - Server Level 1 - Workstation
While the system administrator can establish secure permissions for users' .netrc files, the users can easily override these.
.netrc files may contain unencrypted passwords that may be used to attack other systems.
Run the following script and verify no results are returned:
#!/bin/bash
for dir in `cat /etc/passwd | egrep -v '(root|sync|halt|shutdown)' | awk -F: '($7 != "/usr/sbin/nologin") { print $6 }'`; do
for file in $dir/.netrc; do
if [ ! -h "$file" -a -f "$file" ]; then
fileperm=`ls -ld $file | cut -f1 -d" "`
if [ `echo $fileperm | cut -c5 ` != "-" ]; then
echo "Group Read set on $file"
fi
if [ `echo $fileperm | cut -c6 ` != "-" ]; then
echo "Group Write set on $file"
fi
if [ `echo $fileperm | cut -c7 ` != "-" ]; then
echo "Group Execute set on $file"
fi
if [ `echo $fileperm | cut -c8 ` != "-" ]; then
echo "Other Read set on $file"
fi
if [ `echo $fileperm | cut -c9 ` != "-" ]; then
echo "Other Write set on $file"
fi
if [ `echo $fileperm | cut -c10 ` != "-" ]; then
echo "Other Execute set on $file"
fi
fi
done
done
Making global modifications to users' files without alerting the user community can result in unexpected outages and unhappy users. Therefore, it is recommended that a monitoring policy be established to report user .netrc file permissions and determine the action to be taken in accordance with site policy.
While the complete removal of .netrc files is recommended if any are required on the system secure permissions must be applied.