Date: Mon, 10 Jun 1996 22:26:13 -0400 (EDT) From: Brian Tao <taob@io.org> To: Ade Barkah <mbarkah@hemi.com> Cc: security@freebsd.org Subject: Re: FreeBSD's /var/mail permissions Message-ID: <Pine.NEB.3.92.960610222129.24396I-100000@zap.io.org> In-Reply-To: <199606100214.UAA29892@hemi.com>
index | next in thread | previous in thread | raw e-mail
On Sun, 9 Jun 1996, Ade Barkah wrote:
>
> Maybe I'll try out this washington.edu daemon. Any security concerns
> with it ?
I don't see any explicity warnings about it in CERT's archives,
although it is vulnerable to a brute force attack (e.g., you can use
it to quickly check many user/passwd combinations without it breaking
the connection or logging the failed attempts).
I've got qpopper 2.2 running now and it doesn't seem to have any
of the problems I recall with 2.1.4. It logs failed authentication
attempts and refuses to accept any more commands on a bad login.
--
Brian Tao (BT300, taob@io.org, taob@ican.net)
Systems and Network Administrator, Internet Canada Corp.
"Though this be madness, yet there is method in't"
help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.NEB.3.92.960610222129.24396I-100000>
