Mate Wierdl wrote:
> 
> On Wed, Nov 15, 2000 at 08:48:31AM +0100, Andre Oppermann wrote:
> > Another possible qmail attack is it's late bouncing for non-existent
> > users. Using a false envelope sender address you could fill up the
> > queue with double bounces. I consider this a more serious problem.
> > The decision to handle bouncing this way was appearently part of the
> > security and modularity concept of qmail.
> 
> Vietse's attack was (modified a bit):
> 
> while true; do
>       qmail-queue&
>       kill $!
> done
> 
> This creates 0 length files in /var/qmail/queue/mess until inodes get
> exhausted.  And manual intervention/recovery certainly seems needed.

Yes, unless qmail-clean would clean them up (as well as in queue/pid).

> Dan's response was that this is not completely anonymous since people
> are supposed to do process accounting.  (On RH Linux, btwy, the user
> is easy to catch since users have their own group).
> 
> My question is why is not it better for qmail-queue *immediately* write
> the "received" line identifying the user?

In theory this could be done. The problem is, you'll see this when you
look at the code, a race condition. A pid file is being created, then
inode number is taken and then the whole thing is linked/unlinked
(transaction) from queue/pid to queue/mess. I can't imagine a fix
other than cleaning up with qmail-clean.

-- 
Andre

Reply via email to