Date: Tue, 18 Feb 1997 10:52:09 +0100 From: regnauld@deepo.prosa.dk (Philippe Regnauld) To: pst@shockwave.com (Paul Traina) Cc: freebsd-hackers@freebsd.org Subject: Popd as security weakness (Was: Re: looking for QualComm qpopper testers to try new patch) Message-ID: <Mutt.19970218105209.regnauld@deepo.prosa.dk> In-Reply-To: <199702172216.OAA28519@precipice.shockwave.com>; from Paul Traina on Feb 17, 1997 14:16:27 -0800 References: <199702172216.OAA28519@precipice.shockwave.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Paul Traina (pst) ecrit/writes: > I've got a patch to QualComm's QPOP 2.2 that generates Return-Path: lines [patch] Say, I haven't looked at QPOP for some time, but if I remember correctly, it doesn't implement an optional delay between PASS attempts, right ? The reason I'm saying this is that for people who have POP accounts with valid login shell passwords, POPd becomes a nice crypt engine. Like login, but without having to wait 5 seconds each time. -- -- Phil -[ Philippe Regnauld / Systems Administrator / regnauld@prosa.dk ]- -[ Location.: +55.4N +11.3E PGP Key: finger regnauld@deepo.prosa.dk ]-
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Mutt.19970218105209.regnauld>