This file is indexed.

/usr/lib/tiger/doc/network.txt is in tiger 1:3.2.3-10.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
%netw001f
The listed file is world writable.  chmod -ow file to correct.
%netw002f
The listed file is not owned by an 'administrative' account.
Change the ownership, or add your admin user to 'Tiger_Admin_Accounts'
list of valid administrative users.
%netw003f
The inetd daemon is not configured with login enabled.  If xinetd
based, add the 'filelog' or 'syslog' options in /etc/sysconfig/xinetd
configuration file.
%netw004f
The syslogd daemon should be executing to log system events.  Please
add the appropriate start link to /etc/rc.d/rc[RUNLEVEL].d to the
/etc/rc.d/init.d/syslog script, or install syslog if it isn't.
%netw005f
Omniback is installed, but there is no cell server specified.  Please
put the IP address of your cell server in /usr/omni/config/cell/cell_server
%netw006f
Please specify the cell server by IP address in /usr/omni/config/cell/cell_server
to prevent DNS spoofing.
%netw006f
Disable fingerd in inetd's config file and restart inetd.  If you're
running fingerd as a standalone daemon, please disable.
%netw007f
Disable identd in inetd's config file and restart inetd.  If you're
running identd as a standalone daemon, please disable.
%netw008f
The listed service should be disabled in inetd's config file.
%netw009f
The listed routing daemon should be disabled.
%netw010f
/etc/securetty does not exist.   Please create it!  
%netw011f
/etc/securetty contains an invalid entry.
%netw012f
/etc/securetty is not OWNED by an admin user.
%netw013f
/etc/securetty is not OWNED by an admin group.
%netw014f
/etc/securetty has world write permissions.
%netw015f
IP Forwarding is not permitted.  Please disable ip forwarding.
%netw016f
Your version of BIND is old, update to a more secure version.
%netw017f
Your version of wu-ftpd is old, update to a more secure version.
%netw018f
There is an administrative user (low UID) which can access the
local FTP server. If the local FTP server is enabled and a user
with administrative rights can access it remotely this might lead
to a security compromise of the system. It is recommended for 
administrative users to be added into /etc/ftpusers
if you have a FTP server installed.
%netw019w
The sendmail configuration file (sendmail.cf) has the default
sendmail banner. This means that when the mail server is active
it publishes the version you are currently running. Attackers can use this 
information to determine if you are running a vulnerable version.
%netw020f
There is no ftpusers configuration file. In some systems this might
enable all administrative users (low UID) to access the local FTP 
server if it is enabled (some other systems might deprecate its use). 
It is recommended that administrative users are added into /etc/ftpusers
if you have a FTP server installed.
%netw021w
There is a restricted user (uses a restricted shell) which can access the
local FTP server. If the local FTP server is enabled and a restricted user
can access it remotely this might lead to a security compromise of the
system. It is recommended for restricted users to be added into
/etc/ftpusers if you have a FTP server installed.