Date: Fri, 21 Jun 2002 20:59:46 -0700 (PDT) From: Matthew Dillon <dillon@apollo.backplane.com> To: Brett Glass <brett@lariat.org> Cc: security@FreeBSD.ORG Subject: Re: Possible security liability: Filling disks with junk or spam Message-ID: <200206220359.g5M3xkSl066466@apollo.backplane.com> References: <200206220001.SAA26010@lariat.org>
next in thread | previous in thread | raw e-mail | index | archive | help
This is rich. I just checked my own system and guess what I found? -rw------- 1 ftp dillon 11244 Apr 3 2001 ftp -rw-rw---- 1 man mail 765638 Jun 18 22:23 man ding ding ding ding! Give that man a cigar! All spam. :Two years ago, at BSDCon, I reported on a form of abuse known as a :"Rumplestiltskin attack," in which an attacker guessed names in rapid :... :mailed, cause the mail to be stored on the disk as if it were addressed to a :real user. No one may ever read it, but it's possible to fill the partition :and thereby wreak havoc. : :It seems to me that pseudo-users should be non-mailable, just as a basic :security policy. Ideas for the best way to implement this in the default :install? : :--Brett Glass I think for now the easiest thing to do is to adjust the default mail aliases file to /dev/null out pseudo users that come preinstalled in /etc/passwd. -Matt Matthew Dillon <dillon@backplane.com> To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200206220359.g5M3xkSl066466>