On Thu, Jun 15, 2006 at 03:18:11PM +0200, Jan-Pieter Cornet wrote:
> Also: I have a patch against MIME::Parser to support a max_depth
> limit

I promised to get back on this. The patch is now available at:
http://www.xs4all.nl/~johnpc/MIME-tools-5.420-maxdepth.patch

This includes a test to test for both max_parts and max_depth.
max_parts was previously untested.

The patch adds a simple $parser->max_depth() method to the MIME::Parser
class, which can subsequently be invoked from MD. For example, a simple
patch (against MIMEDefang 2.57 :) is here:

http://www.xs4all.nl/~johnpc/mimedefang-maxmimedepth-2.57.patch

Note that this latter patch is pretty much untested, use at your
own risk. You'd at least need to set "$MaxMIMEDepth = 20;" in your
mimedefang-filter.

Based on code reviews of sendmail 8.13.6, 8.13.7 and the mime-nesting
milter release by sendmail, I believe that the above patches offer
you a suitable protection against the DoS attack for sendmail 8.13.6,
and very likely also for earlier versions.

However, there's no real replacement for upgrading to the latest and
greatest, of course. Also be aware that this patch is different from
the sendmail 8.13.7 behaviour. Sendmail 8.13.7 will pass deeply nested
MIME structures unaltered, while the proposed MIMEDefang and MIME-Tools
patches will reject such deeply nested messages.

-- 
Jan-Pieter Cornet <[EMAIL PROTECTED]>
!! Disc lamer: The addressee of this email is not the intended recipient. !!
!! This is only a test of the echelon and data retention systems. Please  !!
!! archive this message indefinitely to allow verification of the logs.   !!
_______________________________________________
NOTE: If there is a disclaimer or other legal boilerplate in the above
message, it is NULL AND VOID.  You may ignore it.

Visit http://www.mimedefang.org and http://www.roaringpenguin.com
MIMEDefang mailing list [email protected]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

Reply via email to