Summary | Root authentication should be deniable |
Queue | IMP |
Queue Version | 4.1.2 |
Type | Enhancement |
State | Rejected |
Priority | 1. Low |
Owners | |
Requester | saku (at) localeyes (dot) fi |
Created | 06/28/2006 (6982 days ago) |
Due | |
Updated | 06/29/2006 (6981 days ago) |
Assigned | |
Resolved | 06/28/2006 (6982 days ago) |
Milestone | |
Patch | No |
help bug for example)
to cover his track) to find the root password
I imagine the situation where IMP runs on the mail server, but POP is
limited to the internal network only is actually quite common, so
this is likely something that other users might be struggling with as
well.
then you prevent attacks from *any* application connecting to it, not
just POP.
Obviously, you can do whatever hacking you need to on your local
server, but there is absolutely no need for this kind of security
check in IMP or Horde. Completely redundant and unnecessary.
of accounts that are never allowed to login or some other way to
prevent trying an uncounted number of account/password pairs remotely.
via IMP does nothing to protect security - since an attacker could
just directly connect to the port and try username/password
combinations all day long and just bypass any restrictions in IMP.
the same server. The scenario that comes to my mind is:
1. Attacker finds an exploit to gain restricted access (the Horde help
bug for example)
2. Attacker uses IMP to remotely (possibly from different addresses to
cover his track) to find the root password
I imagine the situation where IMP runs on the mail server, but POP is
limited to the internal network only is actually quite common, so this
is likely something that other users might be struggling with as well.
I added the following code to _authenticate() in imp/lib/Auth/imp.php
to prevent this attack, but a more generic solution wouldn't hurt.
if( !strcasecmp( $userID, "root" ) )
{
mail( "admin@my_network", "WARNING!", "'$userID' login
attempt from $_SERVER[REMOTE_ADDR] in horde!", "From:
hordeadm@my_network" );
return false;
}
State ⇒ Rejected
of accounts that are never allowed to login or some other way to
prevent trying an uncounted number of account/password pairs remotely.
via IMP does nothing to protect security - since an attacker could
just directly connect to the port and try username/password
combinations all day long and just bypass any restrictions in IMP.
State ⇒ New
Priority ⇒ 1. Low
Type ⇒ Enhancement
Summary ⇒ Root authentication should be deniable
Queue ⇒ IMP
protection to prevent "root" authentication through a POP server. This
allows an attacker to try different root passwords remotely while
remaining quite anonymous. I think there should be a blacklist of
accounts that are never allowed to login or some other way to prevent
trying an uncounted number of account/password pairs remotely.