I only supply this sample patch because there is not one from the
author.  It is not designed to be in the same style of qmail code, for
instance, I included a comment.

Also, it is a great idea to impose the limitation on vpopmail aswell.


Thanks.
K2

PS. I dont believe there is a "sprintf()" in the patch code.

On 24 Jan 2000, Ian Lance Taylor wrote:

>    From: Russell Nelson <[EMAIL PROTECTED]>
>    Date: Sun, 23 Jan 2000 22:53:31 -0500 (EST)
> 
>     > 5. Recommendation
>     > 
>     > Impose the 40 character limitation specified by RFC1939 into qmail.
>     > Apply qmail-popup patch http://www.ktwo.ca/c/qmail-popup-patch
> 
>    I don't recommend applying that patch.  Every line of it is wrong.  It
>    makes qmail-popup less secure, by inserting a call to syslog(), which
>    is a security disaster. It also sucks in the string library, which
>    includes the well-known security hole sprintf().
> 
> Besides, unless I'm missing something, the patch is simply incorrect.
> It should set userlen to strlen(user) + 1, not just to strlen(user).
> Otherwise, qmail-popup won't write out the trailing null byte after
> the user name, breaking the protocol.
> 
> (And I agree with others that patching qmail is the wrong approach in
> any case: qmail is not violating the RFC, and vpopmail should not
> assume that its input is well-conditioned.)
> 
> Ian
> 

Reply via email to