On 13 Aug 2004 at 8:41, Steffen Kaiser wrote:

> > It's an optional part of SMTP that doesn't have to be supported, and
> > does have some security issues.
> 
> Which ones?
> It simply triggers a queue run filtering mail for a target server.

Depending on the ability of your sendmail installation to determine 
spoofed connections, it *can* result in a DoS type of behavior.

Based on the "MinQueueAge" and "Timeout.hoststatus" in sendmail.cf, 
it's possible to use a spoofing system to keep e-mail from getting to 
the right place in a timely fashion.  Basically, you spoof to start the 
queue run and the server tries to send to the unconnected system.  This 
generates a "touch" of the queue and a refresh of the host status 
directory (to failure).

When the *real* place connects up to the Internet and calls to execute 
the ETRN, nothing gets sent because things had been tried sooner than 
the timeouts.  The system hangs up off the Internet assuming that there 
is no mail.  This could in theory go on long enough to result in a "non-
deliverable" e-mail.


--
Jeff Rife        | "You keep using that word.  I do not think it 
SPAM bait:       |  means what you think it means." 
[EMAIL PROTECTED] |  
[EMAIL PROTECTED]     |         -- Inigo Montoya, "The Princess Bride" 


_______________________________________________
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

Reply via email to