Stefan `Sec` Zehl writes:
> Hi,
> 
> On Tue, Feb 26, 2008 at 15:56 +0000, Justin Mason wrote:
> > The fix would be to implement support for IPv6 trust paths:
> > 
> > http://issues.apache.org/SpamAssassin/show_bug.cgi?id=4503
> > http://issues.apache.org/SpamAssassin/show_bug.cgi?id=4964
> 
> Ok, so you're telling me that not only is this bug known, but it went
> unfixed fot over a year?

Unfortunately, nobody who's bothered by it, has bothered fixing it
and sending us a patch.  I'll omit any comments about IPv6 users ;)

> I must admit that I don't know much of SAs internals or how hard it is
> to fix this "the correct way".
> 
> However a bug like that should have been fixed -- or at least worked
> around by now.

yes, we know that ;)  If we had infinite time, it'd be fixed by now.

> A simple workaround would be to hardcode a fake IP (like "0.0.0.0") for
> IPv6.
> 
> But the bigger problem remains, and it is not the IPv6 stuff. The main
> problem here is, that if the first Received header is (for what reason
> ever) unparsable, all the other (spammer-controlled) headers are
> trusted if they have an "auth" part.  I would say the default here is
> definitely the wrong way round.

it's a bug.  It needs fixing... the right way is to parse IPv6 headers.
So far it hasn't been a significant problem, since I think yours is
the first example I've seen of spam traversing IPv6 networks to arrive
at a trusted network.

> But then, I'm only a stupid user and who cares about those %)

Hardly representative of our attitude.

--j.

> CU,
>  Sec
> -- 
> Not a perfect solution, but far cheaper than one.

Reply via email to