Re: Email marketing company gives out questionable security advice

2003-07-12 Thread D. J. Bernstein
the system-specific suggestions that people have sent to me. Further contributions are welcome. ---D. J. Bernstein, Associate Professor, Department of Mathematics, Statistics, and Computer Science, University of Illinois at Chicago

Re: Email marketing company gives out questionable security advice

2003-07-07 Thread D. J. Bernstein
done anyway. Typical picture-generating programs can be isolated in the same way. ---D. J. Bernstein, Associate Professor, Department of Mathematics, Statistics, and Computer Science, University of Illinois at Chicago P.S. It's hard for a portable chroot tool to cut off a program's network access

Re: Remote buffer overflow in resolver code of libc

2002-07-04 Thread D. J. Bernstein
client libraries really can be protected by the BINDv9 cache (or by dnscache). But I haven't seen the analysis necessary to justify this claim. At this point it isn't even clear whether the BIND company is making that claim. ---D. J. Bernstein, Associate Professor, Department of Mathematics, Statistics

Re: Multiple vendors FTP denial of service

2001-03-19 Thread D. J. Bernstein
The FTP specification doesn't require servers to support .. and *. In fact, it doesn't even mention .. and *. Naturally, publicfile's ftpd treats * as just another character, and converts . to : after slashes. FTP does, however, include an NLST command that lists all files in the current

Re: analysis of auditable port scanning techniques

2001-01-16 Thread D. J. Bernstein
Dan Harkless writes: Theo de Raadt just informed me via email that OpenBSD fixed their identd to only report SS_CONNECTOUT sockets in 1996. The MTA and the FTP server and many other daemons will make outgoing TCP connections upon request. This bogus ``fix'' does not achieve the stated goal of

The 200 trusted .com servers

2000-01-24 Thread D. J. Bernstein
Would you trust *.com DNS information from a computer that's running BIND 8.2.1 and Sendmail 8.8.5 today, sitting on an open network in the electrical engineering department at a large Australian university? ``Of course not,'' you say. ``Top-level DNS servers can't use versions of BIND with

Re: vpopmail/vchkpw remote root exploit

2000-01-23 Thread D. J. Bernstein
This ``qmail-pop3d security advisory'' is fraudulent. There are no security problems in the qmail package. There are some serious security problems in the vpopmail/vchkpw package. But vpopmail/vchkpw is not part of qmail. I didn't write it. I haven't reviewed it. I don't distribute it. I don't

Re: BIND bugs of the month (spoofing secure Web sites?)

1999-11-14 Thread D. J. Bernstein
Let's say an attacker wants to intercept your ``secure'' transactions with hugebank.com. Here's what happens: (1) The attacker obtains two IP addresses, say 1.2.3.4 and 9.8.7.6. He also obtains a domain name, say secure-banking.dom. (2) The attacker sets up a DNS record for

Re: BIND bugs of the month (spoofing secure Web sites?)

1999-11-14 Thread D. J. Bernstein
Gary Gaskell says that an attacker shouldn't be able to get a certificate for ``HugeBank Secure Banking.'' Why not? Do you think that the only HugeBank in the world is the one that you have an account with? What if you're trying to communicate securely with ``Joe's Auto Parts,'' or (to take a