Marty Landman <[EMAIL PROTECTED]> writes:

>>* Hardcode multiple addresses in the script, and have a token in the
>>   form specify which address to mail to.  For example, if the form
>>   says address=FOO, you look it up $addresses[FOO] to get
>>   "[EMAIL PROTECTED]".

> What's the advantage here? Security through obscurity?

The reason formmail became so popular was that you could use one form
on the server from different pages sending to different people.
Specifying a token in the form which maps to an address in the script
allows this.  It's not security through obscurity, it's security.
Someone from the outside can only use the script to send emails to
the addresses that are specified in the script -- no others.

>>* Just discontinue the script, and have people use formmail.  That
>>   way, the security burden is on someone else
>
> Heh, you think the situation's really that bad huh Alan?

Google for formmail security and look at the insane list of
problems, and the list of programs which have sprung up to try to fix
the problems.  Why add another to the list?

> BTW, how do server side ENV vars get spoofed? 

$ENV{HTTP_REFERER} is set by the HTTP server to be the value the
client specifies in the Referer: header.  The client is able to send
no value, or any arbitrary value.  So it's just like the user agent:
not to be trusted.


-- 
Alan Shutko <[EMAIL PROTECTED]> - I am the rocks.
Don't follow in my footsteps. I think I stepped in something.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to