Bug#880905: exim4-config: Sender verification could be exploited for brute-force scan

2017-11-06 Thread Paul Graham
-Debian exim installations are vulnerable as well. What I am trying to say is, this issue should be reported and discussed with upstream _before_ we make this change. Paul, can you do that to make your point there? Greetings Marc -- Paul Graham Development Dept. http://Omega-Software.com

Bug#880905: exim4-config: Sender verification could be exploited for brute-force scan

2017-11-05 Thread Paul Graham
there? Yes of course. As moving sender verification is only useful if recipient verification is moved, I'll make my point for recipient verification first then. If they're receptive I'll bring up sender verification after that. -- Paul Graham Development Dept. http://Omega-Software.com/ Omega Software

Bug#880905: exim4-config: Sender verification could be exploited for brute-force scan

2017-11-05 Thread Paul Graham
at. If you want I can send a separate report (that was my initial intent). -- Paul Graham Development Dept. http://Omega-Software.com/ Omega Software --- 30_exim4-config_check_rcpt_sender 2017-11-05 15:06:25.839001108 +0100 +++ exim4-4.86.2-patched/debian/debconf/conf.d/acl/30_exim4-config_check_

Bug#880905: exim4-config: Sender verification could be exploited for brute-force scan

2017-11-05 Thread Paul Graham
Package: exim4-config Version: 4.90~RC1-1 Severity: normal Dear Maintainer, *** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? This recently came up in Exim logs: 2017-11-03 16:22:39 H=(ws2008) [10.20.30.40]