Hi all,

    my apologies for jumping into the thread so late.

Paul Cockings wrote:
> [snip]
>> No. Barracuda normally sends quarantine messages to end users and they can 
>> then say if a mail is ham/spam by pressing a link inside the mail. The link 
>> has the username/password already encoded in the url (it's not the normal 
>> http://username:passw...@host/uri/ thing. It's more or less a hash that is 
>> already encoded in the url that automatically authenticates/validates the 
>> user). Pressing that link then triggers Barracuda to release the message 
>> from quarantine and learn. That's it. Retraining HAM as SPAM is still done 
>> by the admin.
>>
>>
>>    
>>     
> Arhhh, this sound interesting too.   This sounds like something that 
> could be added to dspam without much core change- right?
>
> Do you know how/when the quarantine messages are triggered?
> - per message?, per x number of message in quarantine?, time based?
>   

Even though a WebService Interface (SOAP) would be most convenient for
.NET-based addins to outlook or the like, you have yet another option:
use a "RESTful" interface to submit the results (ok, this is not exactly
REST, but no need for SOAP either)

Best of all, since the operation can be completed with a simple GET
request, the option to send e-mails with encoded links is still open.



So, the solution would look like this:

----------------------
*Train to Spam*
http://www.domain.tld/dspam/remote/spam?user=u...@domain1.tld&signatureID=100001,4b54909b399539992375514&key=DEADBEEFCAFEB00F

***Train to Ham*
http://www.domain.tld/dspam/remote/ham?user=u...@domain1.tld&retrain=innocent&signatureID=100001,4b54909b399539992375514&key=DEADBEEFCAFEB00F


* Outlook add-in (w/Button):   make a GET request to the URL
    - the "key" is an SHA1 of the user's username & password

* Thunderbird extension: likewise


* From a link in an e-mail
http://www.domain.tld/dspam/remote/spam?user=u...@domain1.tld&signatureID=100001,4b54909b399539992375514&auth=DEADBEEFCAFEB00F123456789

    (where the key is an HMAC keyed with the server's timestamp modulo
2h or so)

* Manually
    (since the "key" is not present, we need to authenticate the user)
    Send an HTTP 401 response, read username and password from the user.

-----------------

All of this is trivially implemented in PHP  on whatever webserver is
available.
It can be "overlaid" over DSPAM's url hierarchy as needed (since it
would be optional) using mod_rewrite or a simple alias. No need to even
include the logic for this into the main dspam executable.



Regards,
    J.L.


------------------------------------------------------------------------------
Throughout its 18-year history, RSA Conference consistently attracts the
world's best and brightest in the field, creating opportunities for Conference
attendees to learn about information security's most important issues through
interactions with peers, luminaries and emerging and established companies.
http://p.sf.net/sfu/rsaconf-dev2dev
_______________________________________________
Dspam-devel mailing list
Dspam-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/dspam-devel

Reply via email to