TNEF problem
Julian Field
jkf at ecs.soton.ac.uk
Mon Sep 10 19:59:34 IST 2001
At 18:28 10/09/2001, you wrote:
>Right now I've kludged in a solution which makes tnef abort if any
>expansion would require more than 20 megabytes of memory (since we
>limit the maximum size of our email messages to 20 megabytes we can be
>sure than no genuine TNEF should ever extract to more than this).
>That circumvents the immediate problem on our site.
>
>If anybody experiences problems with odd winmail.dat files causing
>TNEF to eat up processor and memory out of all proportion to the real
>file sizes and requires the kludge, I'll happily pass it on.
If you could up the limit to 100Mbytes (enough for most sites), and pass it
on to me, I will happily put it in the standard MailScanner distribution
until you get a new version from the original author.
Also, is the problem actually that it runs out of memory, or that it takes
a very long time to run (or both)? If it could be killed after running for,
say, 2 minutes, then the same DoS attack prevention mechanism I am
intending to write for Sophos could be wrapped round the tnef decoder as well.
--
Julian Field Teaching Systems Manager
jkf at ecs.soton.ac.uk Dept. of Electronics & Computer Science
Tel. 023 8059 2817 University of Southampton
Southampton SO17 1BJ
More information about the MailScanner
mailing list