Date: Fri, 21 Jun 2002 20:59:46 -0700 (PDT) From: Matthew Dillon <dillon@apollo.backplane.com> To: Brett Glass <brett@lariat.org> Cc: security@FreeBSD.ORG Subject: Re: Possible security liability: Filling disks with junk or spam Message-ID: <200206220359.g5M3xkSl066466@apollo.backplane.com> References: <200206220001.SAA26010@lariat.org>
next in thread | previous in thread | raw e-mail | index | archive | help
This is rich. I just checked my own system and guess what I found?
-rw------- 1 ftp dillon 11244 Apr 3 2001 ftp
-rw-rw---- 1 man mail 765638 Jun 18 22:23 man
ding ding ding ding! Give that man a cigar! All spam.
:Two years ago, at BSDCon, I reported on a form of abuse known as a
:"Rumplestiltskin attack," in which an attacker guessed names in rapid
:...
:mailed, cause the mail to be stored on the disk as if it were addressed to a
:real user. No one may ever read it, but it's possible to fill the partition
:and thereby wreak havoc.
:
:It seems to me that pseudo-users should be non-mailable, just as a basic
:security policy. Ideas for the best way to implement this in the default
:install?
:
:--Brett Glass
I think for now the easiest thing to do is to adjust the default
mail aliases file to /dev/null out pseudo users that come preinstalled
in /etc/passwd.
-Matt
Matthew Dillon
<dillon@backplane.com>
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200206220359.g5M3xkSl066466>
