[Subject Prev][Subject Next][Thread Prev][Thread Next][Subject Index][Thread Index]
re: [LI] Authentication in Sendmail.
Hi
> We are using sendmail 8.9.3-10 on RHL 6.0 as mail server. Can some
> body tell me how to configure sendmail to validate the user before
> accepting the mail for transfer. I want to use linux user names &
> passwords, just like reading POP3 mail boxes.
Sendmail uses check_rcpt tables to validate users / hosts allowed to
relay.
Sendmail admins can see
http://www.sendmail.org/tips/relaying.html which has quite a few
useful bits of information.
Redhat linux users check out ftp://admin.netus.com/sendmail/ and
download preconfigured, secure sendmail 8.9.3 rpms. Linuxconf
users beware! - Linuxconf was found to be generating faulty (old)
check_rcpt tables as recently as 20 July 1999. Make sure your
version is newer than this before using it to generate sendmail.cf
files.
Sun Admins may see http://sunsolve.sun.com/pub-
cgi/show.pl?target=patches/patch-access (url may wrap) for
updates to sendmail 8.9.x.
Consider trying the latest beta for sendmail (sendmail 8.10.0.Beta6)
which supports Authenticated SMTP. It also (amongst other things)
has built in support for multiple dns based blacklists (like the RBL).
When upgrading sendmail to secure versions: Always generate a
new sendmail.cf - continuing to use the sendmail.cf from a previous
version which had a relaying vulnerability will usually result in that
relaying vulnerability not being fixed.
If you are uncomfortable with M4 scripting, WIDE in Japan have a
.cf generator which may be useful. It can be downloaded from
ftp://ftp.jpcert.or.jp/pub/security/tools/CF/
If you need sendmail on a machine so that processes can send out
mail, but no inbound mail facilities are needed, all you need to do is
change sendmail's startup settings by removing the "-bd" flag. It's
the -bd flag (-bD if run in the foreground) which tells sendmail to
listen on port 25 and if that is deleted, it will only deliver locally
generated mail rather than acting as a full-blown mailserver.
Please note: this will only secure a server for as long as the -bd flag
is disabled, so should be regarded as a temporary measure.
Eventually, someone is bound to accidentally re-enable the -bd flag.
Wherever possible, please update to sendmail 8.9.3 or later.
For those using older Sendmail versions - here's a note
Sendmail builds lower than 8.8 are fundamentally insecure, and full
of security holes. Additionally all versions of sendmail prior to 8.8.9
are susceptable to a HELO buffer overflow attack - and most
recently, several thousand sendmail 8.8 installations have been
exploited by a spammer using RCPT TO:<"victim@target"> - with
the "" in the envelope.
If you have one of these sendmail versions, disable or update it
immediately and audit your machine's security. Sendmail Inc
describe version 8.6 and earlier as "Not supported, not secure and
should NOT be run on a network-connected computer."
If you are running Sendmail 8.8, see Claus Assmann's check_rcpt
Sendmail 8.8 antirelay patches, which fix relay vulnerablities using
"", %, ! and : vulnerabilties in 8.8.x sendmail. Visit his page at
http://www.sendmail.org/~ca/email/check.html for more details.
More useful information is available at
http://hexadecimal.uoregon.edu/antirelay/
Sendmail 8.8 is effectively unsupported and susceptible to a buffer
overflow attack (caused when a HELO of over 1024 characters is
sent). There are probably more relaying holes lurking in it.
Sendmail 8.9.0 and 8.9.1 are susceptable to relaying attacks using
the : pathing control character in the RCPT TO:<> header.
hope this helps
--s
Suresh Ramasubramanian
106D, Aditya Enclave, Ameerpet, Hyderabad 500038, India.
Phone: +(91-40)3736553/3745398 | eFax: +(1-603)590-5437
Suresh@xxxxxxxxxxx | Suresh@xxxxxxxx
http://www.kcircle.com | http://www.angen.net/~pegasus/
Having your back scratched is not the only reason to be married,
but it is a good one, especially for those spots that are so
hard to reach by yourself.
--------------------------------------------------------------------
The Linux India Mailing List Archives are now available. Please search
the archive at http://lists.linux-india.org/ before posting your question
to avoid repetition and save bandwidth.