man ffingerd (Administration système) - secure and lightweight finger daemon
NAME
ffingerd - secure and lightweight finger daemon
DESCRIPTION
The ffingerd program is a drop-in replacement for the standard fingerd that comes with most systems today. Most finger daemons in use today support several features which are not acceptable for security-conscious system administrators, so many chose to disable the finger service completely. This version of the finger daemon is invoked by inetd, but it's not meant to be run as root. In fact, it should run as nobody. Ffingerd does not allow global finger queries (finger @host), indirect finger queries (finger foo@host.a@host.b), it does not give away valuable information like the shell, login directory and time of last login, and users can put a ".nofinger" file in their homes and then ffingerd will respond with "That user does not want to be fingered".
LOGGING
Requests that may indicate attacks are logged by ffingerd through the syslog(3) facility. The default facility is LOG_INFO, you can change that by editing config.h after running configure.
These requests are logged :
- empty finger attempts
finger @victim.com # find out who's logged in
- indirect finger attempts
finger root@victim.com@innocuous.edu # to victim.com this finger query comes from # innocuous.edu
- unwanted finger attempts
- Users can put .nofinger files in their home, and then attempts to
finger them will yield
That user does not want to be fingered
FILES
~/.nofinger, ~/.plan, ~/.project, ~/.pubkey
BUGS
When ffingerd is running as nobody and a user does not have world execute permission set for his home, then ffingerd can not check whether that user has a .nofinger file there and assumes it's not there.
SEE ALSO
http://www.fefe.de/ffingerd/
AUTHOR
Felix von Leitner (felix@fefe.de),