Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 18 Feb 1997 10:52:09 +0100
From:      regnauld@deepo.prosa.dk (Philippe Regnauld)
To:        pst@shockwave.com (Paul Traina)
Cc:        freebsd-hackers@freebsd.org
Subject:   Popd as security weakness (Was: Re: looking for QualComm qpopper testers to try new patch)
Message-ID:  <Mutt.19970218105209.regnauld@deepo.prosa.dk>
In-Reply-To: <199702172216.OAA28519@precipice.shockwave.com>; from Paul Traina on Feb 17, 1997 14:16:27 -0800
References:  <199702172216.OAA28519@precipice.shockwave.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Paul Traina (pst) ecrit/writes:

> I've got a patch to QualComm's QPOP 2.2 that generates Return-Path: lines

	[patch]

	Say, I haven't looked at QPOP for some time, but if I remember
	correctly, it doesn't implement an optional delay between PASS
	attempts, right ?

	The reason I'm saying this is that for people who have POP accounts
	with valid login shell passwords, POPd becomes a nice crypt engine.

	Like login, but without having to wait 5 seconds each time.
-- 
							-- Phil

-[ Philippe Regnauld   /   Systems Administrator   /    regnauld@prosa.dk ]-
-[ Location.: +55.4N +11.3E       PGP Key: finger regnauld@deepo.prosa.dk ]-




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Mutt.19970218105209.regnauld>