Upaboveit wrote:
> I've recently had a security audit done through this place:
>
https://secure1.securityspace.com/sspace/index.htmlMany "security audits" reveal false positive results.
> Your MTA is vulnerable to the 'mailto files' attack
>
> *********************
>
> Any clues as to how one could remedy this?
You mail server is *not* vulnerable to the "mailto files" attack. As you saw, no file for written to your system, and the mail bounced.
> smtp (25/tcp)
> Remote SMTP server banner :
> 220 name.my-server.com mailfront ESMTP
>
> This detects the SMTP Server's type and version by connecting
> to the server and processing the buffer received.
> This information gives potential attackers additional
> information about the system they are attacking.
> Versions and Types should be omitted where possible.
True, but since there have never been any security vulnerabilities in mailfront, and due to its design, vulnerabilities are unlikely, and limited in the damage they could do, I don't think that's a significant problem.
> Solution: Change the login banner to something generic.
>
> Any idea how to change the banner?
Create /var/service/smtpfront-qmail/env/SMTPGREETING containing whatever you want.
> Further, there is this:
>
> smtp (25/tcp)
>
> The remote SMTP server seems to allow remote users to
> send mail anonymously by providing arguments that are
> too long to the HELO command (more than 1024 chars).
>
> This problem may allow malicious users to send hate
> mail or threatening mail using your server,
> and keep their anonymity.
>
> Clues?
False positive. To put it bluntly, the "test" is worth just what you paid for it.
> Finally, there is this:
>
> ftp (21/tcp)
> Remote FTP server banner :
> 220 diaboli.upaboveit.com FTP server ready.
>
> This detects the FTP Server type and version by connecting to
> the server and processing the buffer received.
So can you see the Version number and program name in that FTP banner? I can't.
> Solution: Change the login banner to something generic.
>
> Again, clues?
The test author(s) seems to have insufficient clue(s).

Regards
Charlie