> I tend to disagree there. You need to trigger a buffer-overflow or
> something similar to trigger a SQL injection. Is that possible when
> there's a proxy in front? You'd have to break the proxy first, I
> think.

The question is rather "what happens in case of buffer overflow" or
"what happens when a rootkit is used" or "what happens if the server is
not well-configured" or "what happens if Mallet is working in the
datacenter where where DBMAIL is hosted".

A proxy will not stop attacks, on the converse it will make them easier.

A database proxy (= a database pool controller) manages several
connections at once and keeps them alive to pipeline all queries. The
superviser of the pool *may* inject SQL very easily. The proxy may be
well-written, if the server is not well configured, it can be
penetrated.

Again, the problem lies in a single database for several users. Try to
set-up a database with 1000 users and you understand my concern about
security.

With DBMAIL and schemas, you need to be root to penetrate the data (just
like in a normal Postfix installation relying on Unix users). Only
physical access will allow Mallet to penetrate your server.

With DBMAIL in the present design, a user with no special privilege may
read ALL emails. This is a question of design.

The next question is how valuable is the data from DBMAIL users. The
problem is that DBMAIL is used for large installations, store emails
(secrets) and therefore, given the current database design, it is likely
that you are a target.

Besides, Schema can be emulated with table prefix in MySQL. Schema is
only automatic prefixing. So nothing should stop us from using
schema/table prefix.

Kind regards,
Kellogs

_______________________________________________
Dbmail-dev mailing list
Dbmail-dev@dbmail.org
http://mailman.fastxs.nl/cgi-bin/mailman/listinfo/dbmail-dev

Reply via email to