Petr Novotny wrote:
>BTW, you can still be the "tool", even without this amplification. 
>Let's denote "A" attacker, "B" "tool" and "C" victim. Suppose that 
>A and B are "stronger" (faster, or just on a faster line) than C (you 
>can attack only someone weaker). A connects to B's SMTP and 
>starts sending undeliverable messages with C as the fake sender 
>at a fast rate; only one RCPT TO per message; B sends the 
>bounces to C at the same rate, overwhelming C and its connection.
>
>"B" can be any SMTP server which doesn't immediatelly check the 
>recipient; any secondary MX falls into this category, as many large 
>SMTPs (with many local users, I mean) like (maybe - I don't know) 
>aol.com, hotmail.com etc.
>
>
>Please note that this attack already has nothing to do with qmail at 
>all: It just shows that SMTP is an inherently weak protocol, due to 
>lack of authentication. Should we blame qmail from SMTP's 
>weaknesses? It's an odd thing to do, isn't it?

It is indeed, which is why I wonder why you bring it up.  I wasn't blaming
qmail for one of SMTP's shortcomings, I was blaming it for the initial
attack in question, the way that it manages outgoing SMTP sessions, and by
extension, the way that it makes it relatively simple to amplify a single
message into multiple bounces.  The point is that SMTP allows for many bad
practices that can and should be avoided in implementations.  This is one of
them.  I apologize if I was unclear.

Mark

-- 
Do not reply directly to this e-mail address
--
Mark Mentovai
UNIX Engineer
Gillette Global Network

Reply via email to