On Donnerstag, 24. Mai 2007, you wrote: > >> I agree it confuses a bit (maybe because of the lack of docs), but other > >> other hand it is useful as it spears a lot of resources without any deep > >> knowledge from the user. Anyhow, what security issues do you see here? > > > > Haven't look deeper into the code, but if somebody spoof some 503 packets > > to the server (easy with UDP), then he could easily disable all outbound > > destinations. > > Well...I think this not something specific to blacklists, but to all > features/functionalities (like faking byes/replies to close or prevent > dialogs, etc ) :)
Sure, you're right. But inherent security issues from the protocol are more understandable and manageable then the automagically disabling of connections. It in my opionion not the right thing to simply disable connections for several minutes after one problem occured, especially in a production environment. The documentation in the wiki talks only about dns based blacklisting. Causes '503s' now also a blacklist entry? Then the documentation should be updated. :-) -- Henning _______________________________________________ Users mailing list [email protected] http://openser.org/cgi-bin/mailman/listinfo/users
