-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 9 Mar 00, at 10:47, Claus Färber wrote:
> Well, the question here is, what's better: A security hole allowing
> remote attackers to find out which email address is valid without
> waiting for the bounce (and giving a valid return address in advance)
> or a security hole allowing remote attackers to start a DoS attack by
> sending messages which eventually double bounce?
>
> I believe it's better not to accept that mail in the first place.
Correction: It would be better if it was for free. Unfortunately,
checking whether a username exists (against large database) can
be arbitrarily slow; unless you're planning to overload your busy
box, forget it; qmail-smtpd just carries on the conversation,
qmail-queue writes down the message, fsync()es it and you're done.
Adding one zillion system calls to validate the username is a DoS
attack waiting to happen, too. Which one would you rather have?
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0.2 -- QDPGP 2.60
Comment: http://community.wow.net/grt/qdpgp.html
iQA/AwUBOMifCVMwP8g7qbw/EQI5HACg1gKjmLRMDMVxAs2RdS7lQHFjSFEAoOqK
KLsNxe2tK+N6gskkYeM2Pi/a
=Phrj
-----END PGP SIGNATURE-----