[3352] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

RE: www web security !

daemon@ATHENA.MIT.EDU (Alex Filacchione)
Wed Oct 23 20:29:48 1996

From: Alex Filacchione <alexf@iss.net>
To: "'hallam@ai.mit.edu'" <hallam@ai.mit.edu>,
        "www-security@ns2.rutgers.edu" <www-security@ns2.rutgers.edu>
Date: Wed, 23 Oct 1996 17:37:57 -0400
Errors-To: owner-www-security@ns2.rutgers.edu


>Re: Sendmail.  The latest, 8.8, is vulnerable.  The vulnerability was
>posted to bugtraq and BoS on the 17th.

Re sendmail, just do not use this piece of incompetent software. If
you must have a mailer on the machine at all run one that was
written by someone who is marginaly competent.


There are solutions.  TIS (Trusted Information Systems) has the FWTK 
(FireWall Toll Kit) which can be downloaded for free.  Even if you don't 
use the firewall itself, it comes with two programs, smap and smapd.  These 
interact with sendmail and act as a front end.  This disallows any direct 
contact with sendmail, making attacks such as the recent buffer overflow 
attacks essentailly useless from the hacker's point of view.  Smap is what 
the outsider talks to, and you can't really get any info from it.  It takes 
the mail and stores it somewhere on the machine.  Then smapd comes along 
(from the inside net) and grabs the mail from smap, and passes it to 
sendmail on the inside, which distributes it.  You are essentially proxying 
the email before it gets to sendmail.  This only leaves you open to mail 
reader specific types of attacks.  Products like MIMESweeper may help check 
MIME encoded mail, but I really don't know enough about MIMESweeper to 
comment on it further.  I don't know if it is freeware, shareware, or a 
commercial product, or who makes it or anything.  I just know that it 
exists.  If someone else knows more about it maybe they can post some info?

Alex F
alexf@iss.net
webmaster/security training


home help back first fref pref prev next nref lref last post