Subject: Re: localhost security hole
To: William Allen Simpson <wsimpson@greendragon.com>
From: Andrew Brown <atatat@atatdot.net>
List: current-users
Date: 06/28/2003 14:14:04
>Having proved beyond all shadow of a doubt that sending mail to
>root@localhost leaves a security leak a mile wide, what should be done?
no, it doesn't. you fail to understand what's going on.
>The zone administrator (or DNS spoofer) can redirect all root mail, by
>adding a zone entry "localhost.dom.ain." that points to some other
>place than 127.0.0.1. Is this considered a feature?
that doesn't matter. that will only be looked for if "localhost" by
itself is not found.
>I proposed PR install/21999, to modify the /etc/hosts file to include
>"localhost.dom.ain", right next to the "host.dom.ain host" line.
>
>So far, most commentators oppose this change.
>
>Alternatives?
sendmail knows to deliver to "localhost". it looks up "localhost" and
finds 127.0.0.1. when it attempts delivery there, it also looks up
1.0.0.127.in-addr.arpa so that it can put a canonicalized name in the
logs. in your case, that maps to "localhost.citi.umich.edu". you
need to fix that, but i don't believe it's a problem.
--
|-----< "CODE WARRIOR" >-----|
codewarrior@daemon.org * "ah! i see you have the internet
twofsonet@graffiti.com (Andrew Brown) that goes *ping*!"
werdna@squooshy.com * "information is power -- share the wealth."