[9851] in bugtraq

home help back first fref pref prev next nref lref last post

Re: SMTP server account probing

daemon@ATHENA.MIT.EDU (GvS)
Tue Mar 9 13:33:29 1999

X-Envelope-To: <BUGTRAQ@NETSPACE.ORG>
Date: 	Tue, 9 Mar 1999 20:58:25 +0300
Reply-To: GvS <gvs@RINET.RU>
From: GvS <gvs@RINET.RU>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <4.1.19990308115212.041b17b0@localhost>

Hi there!

On Mon, 8 Mar 1999, Brett Glass wrote:

 BG> In this attack, an SMTP server is probed for common names, presumably
 BG> so that spam can the be targeted at them. The attacking machine
 BG> connects and issues hundreds of RCPT TO: commands, searching a long
 BG> list of common user names (e.g. susan) for ones that don't cause
 BG> errors. It then compiles a list of target addresses to spam.

The most common protection method against this attack is to restrict
the number of recipients per message as defined in sendmail.cf:

O MaxRecipientsPerMessage=NN

It doesn't protect from name probing, but protects from overhead in
conjunction with O ConnectionRateThrottle and O MaxDaemonChildren
options.

 BG> I'm surprised that I haven't seen this one on the Bugtraq list yet.

I do not think it's bugtraq issue really. This attack can easily be
prevented with configuration methods.

SY, Seva Gluschenko, just stranger at the Road.
GVS-RIPE: Cronyx Plus / RiNet network administrator.

--- IRC: erra
 * Origin: Erra Netmale (gvs@rinet.ru) [http://gvs.rinet.ru/]

home help back first fref pref prev next nref lref last post