[imp] Vulnerabilities in IMP/PHP
Chuck Hagenbuch
chuck@horde.org
Mon, 19 Aug 2002 12:35:49 -0400
Quoting Bjørn Ove Grøtan <bjorn.grotan@itea.ntnu.no>:
> Hmm - if you say so. My eyes didn't read so on Friday but.
But what? If you've found a bug in our code, _send a patch_. Don't claim
that you _think_ it does something it doesn't.
> Wouldn't you get a more reliable key if using the client hostname rather
> than the webserver hostname? A session-file may live quite long if one
> does not have automatic delete on old files in the chosen folder.
This is an option, but it's nearly as guessable, especially for people with
a proxy server (AOL); furthermore, it would make life hell for people on
dynamic DHCP connections; they get a new IP, boom, their password is wrong.
> experienced with securing webservers, it would be a good idea (in my
> opinion at least) to give some clues on how to secure it. A small paper
> on how to run a secure is by far better than having to browse through
> some slides that may or may not have a few qew-words on security-issues
Then WRITE IT, and write it to _help_ people. Scared people don't run more
secured servers; informed people do. Don't spout warnings of doom and gloom
that are half-baked and ignorant.
-chuck
--
Charles Hagenbuch, <chuck@horde.org>
"After a few minutes the most aromatic and nice smelling Italian coffee
will come out of the exhaustpipe." - Our stove-top espresso pot