Sahil Tandon wrote:
On Mon, 23 Mar 2009, jeffs wrote:
There is the slight potential for abuse by these logged in users that
one or two may figure out a way to send spam through this system by
forging (not login) credentials that the database uses to sort out
outbound email.
This is really shady. Why can't you secure the system?
I'm developing a system that examines the apache logs for a particular
string of characters, which only occasionally are present in the URLs --
very rarely. Actually, the presence of those strings, is the mechanism
that kicks off a script that sends email to an email address. Now, it is
difficult but not impossible for someone to calculate what those strings
may be. If they guess right, they could flood my apache logs with those
strings and thereby kick off a flurry of alerts to an email address.
Sorry if I'm sounding cryptic here but this is a development project and
I'm not free to completely divulge all aspects of how it works. What's
important, is that postfix handles the outbound alerts and could
possibly be tricked into sending out a bunch of email alerts to an email
address and I don't want that to happen because then my legitimate
system is marked as a spam generator when it is not.
Now I could run an sql query that counts the number of times the URLs
are present in the logs (the logs are actually saved in a MySQL
database) within a specified window of time, and stop the script from
kicking of the alerts that way. However, rather than building (for me)
a difficult query I thought there might be a mechanism in Postfix which
could be used to stop a sudden increase of outbound emails.