Clear questions and runnable code get the best and fastest answer |
|
PerlMonks |
securing a remailerby geektron (Curate) |
on Oct 11, 2005 at 21:17 UTC ( [id://499286]=perlquestion: print w/replies, xml ) | Need Help?? |
geektron has asked for the wisdom of the Perl Monks concerning the following question:
One of our ancient remailer scripts has finally been compromised. Someone discovered that it uses an ancient method to pass infomation to sendmail: a pipe directly to sendmail - the worst way to send email from a script.
I'm rewriting the thing with an extra eye for security and configurability (so that I can reuse it across our sites, if/when needed), and I want to make sure I've covered all the bases since the PHB keeps throwing "what if ...." scenarios at me. I've already come up with the following to secure this thing:
Does adding some form of key/ session_id buy any security? I think not, because it would be just another thing that needs to be passed in the form, and enough brute-force attacks would crack that too ... Any other suggestions for making this thing as locked down as possible?
Back to
Seekers of Perl Wisdom
|
|