[10208] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Novell Pandora Hack

daemon@ATHENA.MIT.EDU (Iain P.C. Moffat)
Wed Apr 14 14:03:43 1999

Date: 	Tue, 13 Apr 1999 15:08:07 -0500
Reply-To: ipm@hp.ufl.edu
From: "Iain P.C. Moffat" <ipm@HP.UFL.EDU>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.BSF.4.05.9904131143170.6887-100000@shell.fastlane.net>

Yes this is why the console log (and any other log files for that
matter) should be redirected to a quota restricted directory or better
yet another volume "var" perhaps.  Hmmm...what a concept.  While
this is still less than ideal, it will at least minimize the impact.

-Iain

On 13 Apr 99, at 12:03, Simple Nomad wrote:

Much stuff Cut.....

> Of course spoofing the source of a Pandora attack can have other effects
> with these security measures in place, since you could fill up the SYS
> volume (stopping all server processing) with "invalid security signature"
> messages. There is no "last message repeated 200,000 times" log entry in
> Netware....
>
>     Simple Nomad    //
>  thegnome@nmrc.org  //  ....no rest for the Wicca'd....
>     www.nmrc.org    //


*******************************************
Iain P.C. Moffat
College of Health Professions
University of Florida
E-mail:  ipm@ufl.edu
Voice:   352.392.0965
Fax:     352.392.6529
*******************************************

home help back first fref pref prev next nref lref last post