[2664] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Not so much a bug as a warning of new brute force attack

daemon@ATHENA.MIT.EDU (Stefan Hudson)
Mon Jun 3 15:39:51 1996

Date:         Mon, 3 Jun 1996 09:49:34 -0700
Reply-To: Bugtraq List <BUGTRAQ@netspace.org>
From: Stefan Hudson <hudson@mbay.net>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@netspace.org>
In-Reply-To:  <Pine.SOL.3.93.960601104727.687A-100000@dazed.nol.net> from
              "Brett L. Hawn" at Jun 1, 96 10:52:28 am

> Using the pop3 mechanism to crack user passwords
>
> Given a file full of usernames and the standard 'dict file' one can
> currently connect to the pop3 daemon and effiecently try passwords for a
> user until the proper one is gotten or one runs out of passwords without any
> noticeable effects on the server. I've tested this method myself using
> several accounts and lots of random crap between valid passwords. A 3
> account userfile with a 20k dictfile took appx 2 minutes to generare the
> passwords for all 3 accounts.
>
> Solution:
>
> Implement random delay times, logging, and disconnection within the pop3
> daemom

qpopper, the POP server from Qualcom (makers of Eudora for PeeCees) does
a 10 second delay and disconnects on a bad password.  It also logs EVERYTHING
to a file and is very configurable.  We've been using it for a few months
now, and it's worked very well.  See ftp.qualcomm.com:/quest/unix/servers.

--
     /// Stefan Hudson <hudson@mbay.net>
__  /// Senior Network Administrator - Monterey Bay Internet
\\\/// http://www.mbay.net/  -  Email: info@mbay.net
 \XX/ Voice: 408-642-6100  Fax: 408-642-6101  Modem: 408-642-6102

home help back first fref pref prev next nref lref last post