This file is indexed.

/usr/lib/tiger/doc/anonftp.txt is in tiger 1:3.2.3-10.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
%ftp001i
There doesn't appear to be an anonymous ftp setup on this machine,
and hence there is nothing to check.
%ftp002a
There is a .rhosts file in the top level of the anonymous ftp
directory.  This can allow unauthorized 'rlogin's or 'rsh's to
occur to the ftp account. This indicates a possible intrusion.
The contents of the file are listed immediately following the message.
The machine should be checked for other signs of intrusion and should
be cleaned up.  The .rhosts file should be removed.
%ftp003w
The etc/passwd file in the anonymous ftp directory appears to
contain valid entries in the password field.  If these are valid,
then the file can be retrieved and a password cracking program
run against it.  The etc/passwd file in the anonymous ftp directory
should simply have a '*' in the password field, and should only
include entries for the 'ftp' and 'root' accounts.

See CERT advisory CA-93:10 for information on setting up an anonymous
FTP server.
%ftp004w
Anonymous ftp appears to be setup on this machine, but the directory
field in the password field is empty.  This exposes the entire machine
to anonymous users, allowing them to browse looking for security
problems.  A specific (not /) directory should be specified.

See CERT advisory CA-93:10 for information on setting up an anonymous
FTP server.
%ftp005f
The anonymous ftp directory is set to the root directory (/).  This
exposes the entire machine to anonymous users, allowing them to browse
looking for security problems.  The directory should be set to a
hierarchy that doesn't allow access to system or user files.

See CERT advisory CA-93:10 for information on setting up an anonymous
FTP server.
%ftp006w
Anonymous ftp appears to be setup, but the directory indicated as
the ftp directory does not exist.  This indicates either a misconfiguration
or an old setup.  This should be corrected by either correcting the
directory name, or deleting the ftp account.

See CERT advisory CA-93:10 for information on setting up an anonymous
FTP server.
%ftp007f
The indicated file is owned by the 'ftp' account and is writable.  This
may allow unauthorized access to the machine.  The indicated file should
be owned by 'root' and not writable by group or world.

See CERT advisory CA-93:10 for information on setting up an anonymous
FTP server.
%ftp007w
The indicated file is owned by the 'ftp' account and is writable.  This
allows anonymous ftp users to modify this file, possibly compromising
the system.  The indicated file should be owned by 'root' and not writable
by group or world.

See CERT advisory CA-93:10 for information on setting up an anonymous
FTP server.
%ftp008f
The indicated file is owned by the 'ftp' account, but is not currently
writable.  Since it is often possible to change the permissions through
ftp, it may still be possible to modify the file, possibly allowing
an intruder to gain unauthorized access.  The indicated file should
be owned by 'root' and not writable by group or world.

See CERT advisory CA-93:10 for information on setting up an anonymous
FTP server.
%ftp008w
The indicated file is owned by the 'ftp' account, but is not currently
writable.  Since it is often possible to change the permissions through
ftp, it may still be possible to modify the file, possibly compromising
the system.  The indicated file should be owned by 'root' and not writable
by group or world.

See CERT advisory CA-93:10 for information on setting up an anonymous
FTP server.
%ftp009w
The indicated file is not owned by root.  This may allow unauthorized
access to the system.  The owner of the file should be root and the
group and write permissions removed.

See CERT advisory CA-93:10 for information on setting up an anonymous
FTP server.
%ftp010f
The indicated file is writable by the 'ftp' account.  This may allow
an intruder to gain unauthorized access.  The group and write permissions
should be removed.

See CERT advisory CA-93:10 for information on setting up an anonymous
FTP server.
%ftp010w
The indicated file is writable by the 'ftp' account.  This may allow
the system to be compromised.  The group and write permissions should be
removed.

See CERT advisory CA-93:10 for information on setting up an anonymous
FTP server.
%ftp011w
The 'ftp' account appears to have a valid shell.  A valid shell is not
required for the 'ftp' user and can be safely set to /bin/false,
/sbin/nologin, etc.