On Tue, 28 Jun 2011 07:30:15 +0200
Elias Oltmanns <e...@nebensachen.de> wrote:

Guten Morgen Elias,

> Stevan Bajić <ste...@bajic.ch> wrote:
> > On Sun, 26 Jun 2011 13:26:11 +0200
> > Elias Oltmanns <e...@nebensachen.de> wrote:
> >
> > I fail to see why the maintenance script should leak passwords? Can you 
> > provide a scenario in which the password would be leaked?
> 
> Sorry, the changelog entry turns out to be rather less informative than
> I had intended. Anyone who manages to execute
> $ ps ax
> at the right time (tm) can get hold of the db access password used in
> the mainenance script; it will appear in the argument list to one of the
> script's subprocesses.
> 
> Admittedly, the chance is very slim, especially when /tmp is on shm, and
> the attacker would need access to a user account on the machine running
> dspam. All the same, we needn't rely on chances and this is a cronjob,
> after all.
> 
okay. I will look after work at that issue. IMHO exposing the password to 
everyone with 'ps ax' is not good. We should, no! We must avoid that.


> Regards,
> 
> Elias
> 
-- 
Kind Regards from Switzerland,

Stevan Bajić

------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security 
threats, fraudulent activity, and more. Splunk takes this data and makes 
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
Dspam-devel mailing list
Dspam-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/dspam-devel

Reply via email to