Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 21 Jun 2002 20:59:46 -0700 (PDT)
From:      Matthew Dillon <dillon@apollo.backplane.com>
To:        Brett Glass <brett@lariat.org>
Cc:        security@FreeBSD.ORG
Subject:   Re: Possible security liability: Filling disks with junk or spam
Message-ID:  <200206220359.g5M3xkSl066466@apollo.backplane.com>
References:   <200206220001.SAA26010@lariat.org>

next in thread | previous in thread | raw e-mail | index | archive | help
    This is rich.  I just checked my own system and guess what I found?

-rw-------   1 ftp     dillon    11244 Apr  3  2001 ftp
-rw-rw----   1 man     mail     765638 Jun 18 22:23 man
 
    ding ding ding ding!  Give that man a cigar!  All spam.

:Two years ago, at BSDCon, I reported on a form of abuse known as a
:"Rumplestiltskin attack," in which an attacker guessed names in rapid
:...
:mailed, cause the mail to be stored on the disk as if it were addressed to a
:real user. No one may ever read it, but it's possible to fill the partition
:and thereby wreak havoc.
:
:It seems to me that pseudo-users should be non-mailable, just as a basic
:security policy. Ideas for the best way to implement this in the default
:install?
:
:--Brett Glass

    I think for now the easiest thing to do is to adjust the default
    mail aliases file to /dev/null out pseudo users that come preinstalled
    in /etc/passwd.

					-Matt
					Matthew Dillon 
					<dillon@backplane.com>

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200206220359.g5M3xkSl066466>