On Thu, Nov 14, 2002 at 10:03:49AM -0500, Theo Van Dinter wrote:
> On Wed, Oct 30, 2002 at 02:16:28PM -0500, Michael Stenner wrote:
> >   1) use ident: spamc connects, spamd asks ident if spamc is who it
> >      says it is, then proceeds.  
> >  
> >      BAD: This is slowish (although probably not compared to the
> >           spam-checking itself).
> > 
> >      BAD: Not portable.
> > 
> >      BAD: You'd need to restrict the server to accept connections only
> >           form ident-able machines, the you're probably already
> >           restricting anyway.
> 
> you forgot:
>       BAD: The default on a lot of systems is to do encrypted ident,
>       so you just get a string like '[aTOhw4XvZQD6kO5C0jqERAw87rIngQRq]'
> 
>       I can decode that (timestamp uid source_ip source_port 
>             dest_ip dest_port)
>       but spamd would have no way of doing it.  Even if it did, it'd
>       have to figure out uid->username.

I didn't forget it.  At the time I wrote this message, I didn't KNOW
it :)  I discovered that later, and the auth-ident patch I submitted
blissfully ignores it.  Basically, it's up to the admin to make their
ident server send usernames in plaintext.  Perhaps I should have put
that in the docs.

I don't think it's an unreasonable requirement.
 1) it reduces computation considerably
 2) ident is likely to be running on the same machine as spamd anyway
 3) ident is likely to be set up specifically for this purpose

> > Anyway, I'm interested in what people think would be the best way to
> > address this and whether there would be enough interest to warrant
> > patch-acceptance.  If it's just us, I probably won't spend the time on
> > it, but if it's likely to be incorporated, I probably will.
> 
> I still don't see the purpose of authentication in spamd.  Unless you
> enable user rules, the only things I can think of that could happen
> maliciously is tainting the AWL and generating lots of log entries with
> the other user's name.

Well, we are going to be deploying it in a situation where (about) 200
people will be using it, we want to enable user rules, and we don't
want to restrict executables that can be run from procmail.  I agree
that the threat is not major, but it's also avoidable at a cost we're
willing to pay.

> So far, I think authentication has more negatives (namely added complexity
> and time) than positives (limiting who can run through spamd with your
> config).

I understand your point, and think that for most (probably 90% or
more) cases, I would agree with you.  There are some cases (namely
ours) where I don't.  I certainly don't think it should authentcate by
default.  As the patch is written, it's EXTREMELY lightweight if you
don't use --auth-ident (*), and the (code) complexity is rather small.

I guess all I'm saying is that I think some people (few perhaps) will
find the tradeoff worthwhile.  I know we do.

                                        -Michael

(*) At start-up time, it must compile about 20 lines of code, but
    loads no modules.  For each message, it does one "if" on a hash
    value.

-- 
  Michael Stenner                       Office Phone: 919-660-2513
  Duke University, Dept. of Physics       [EMAIL PROTECTED]
  Box 90305, Durham N.C. 27708-0305


-------------------------------------------------------
This sf.net email is sponsored by: To learn the basics of securing 
your web site with SSL, click here to get a FREE TRIAL of a Thawte 
Server Certificate: http://www.gothawte.com/rd524.html
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to