Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SMTP Open Relay #261

Open
huwbart opened this issue Jan 26, 2024 · 4 comments
Open

SMTP Open Relay #261

huwbart opened this issue Jan 26, 2024 · 4 comments

Comments

@huwbart
Copy link

huwbart commented Jan 26, 2024

The PaperCut-SMTP software is being detected as an open SMTP relay by our security scanning software, doesn't appear to be a way to secure the connection with a username/password. Can an option be added to require a username/password to connect?

@Jaben
Copy link
Member

Jaben commented Apr 23, 2024

Papercut SMTP is designed to be used on LOCALHOST and bound to LOCALHOST:25. Why would it need security by default? I can look at supporting this but it's complex and gets outside the current scope of what the project is used for.

It's obviously NOT an open relay so you could just ignore that too.

@Jaben
Copy link
Member

Jaben commented Apr 23, 2024

Issue should be: support authentication on the SMTP

@huwbart
Copy link
Author

huwbart commented Apr 23, 2024 via email

@rwmnau
Copy link

rwmnau commented Aug 5, 2024

@huwbart It sounds like the "security vulnerability" here is some security scanning software that sees an open SMTP server and makes the assumption that an open relay will forward mail without authentication (which this application doesn't do - it only receives and doesn't forward). I could see how the scanning software would make that assumption, but since it's more a development tool and not really server software, could the security software be set up to ignore this vulnerability? I've had development tools register as false positives before because of situations like this one - sometimes that infosec team is okay accepting that it's not actually a problem, and sometimes they press that it needs to be fixed (and adding security to this tool would be complicated).

It's possible that the tool could be set up to prompt for login details and then not actually care what they are? Like a fake prompt of some kind that you can enable that satisfies the scanning tool but doesn't actually verify anything?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants