On Mon, 25 Jan 2010 00:04:52 +0100
José Luis Tallón <jltal...@adv-solutions.net> wrote:

> Hi all,
> 
Hello,


>     my apologies for jumping into the thread so late.
> 
> Paul Cockings wrote:
> > [snip]
> >> No. Barracuda normally sends quarantine messages to end users and they can 
> >> then say if a mail is ham/spam by pressing a link inside the mail. The 
> >> link has the username/password already encoded in the url (it's not the 
> >> normal http://username:passw...@host/uri/ thing. It's more or less a hash 
> >> that is already encoded in the url that automatically 
> >> authenticates/validates the user). Pressing that link then triggers 
> >> Barracuda to release the message from quarantine and learn. That's it. 
> >> Retraining HAM as SPAM is still done by the admin.
> >>
> >>
> >>    
> >>     
> > Arhhh, this sound interesting too.   This sounds like something that 
> > could be added to dspam without much core change- right?
> >
> > Do you know how/when the quarantine messages are triggered?
> > - per message?, per x number of message in quarantine?, time based?
> >   
> 
> Even though a WebService Interface (SOAP) would be most convenient for
> .NET-based addins to outlook or the like, you have yet another option:
> use a "RESTful" interface to submit the results (ok, this is not exactly
> REST, but no need for SOAP either)
> 
> Best of all, since the operation can be completed with a simple GET
> request, the option to send e-mails with encoded links is still open.
> 
> 
> 
> So, the solution would look like this:
> 
> ----------------------
> *Train to Spam*
> http://www.domain.tld/dspam/remote/spam?user=u...@domain1.tld&signatureID=100001,4b54909b399539992375514&key=DEADBEEFCAFEB00F
> 
> ***Train to Ham*
> http://www.domain.tld/dspam/remote/ham?user=u...@domain1.tld&retrain=innocent&signatureID=100001,4b54909b399539992375514&key=DEADBEEFCAFEB00F
> 
> 
> * Outlook add-in (w/Button):   make a GET request to the URL
>     - the "key" is an SHA1 of the user's username & password
> 
> * Thunderbird extension: likewise
> 
> 
> * From a link in an e-mail
> http://www.domain.tld/dspam/remote/spam?user=u...@domain1.tld&signatureID=100001,4b54909b399539992375514&auth=DEADBEEFCAFEB00F123456789
> 
>     (where the key is an HMAC keyed with the server's timestamp modulo
> 2h or so)
> 
> * Manually
>     (since the "key" is not present, we need to authenticate the user)
>     Send an HTTP 401 response, read username and password from the user.
> 
> -----------------
> 
That is +/- how Barracuda is doing it. Barracuda only sends the hash and no 
username. They encode/include the username into the hash.


> All of this is trivially implemented in PHP  on whatever webserver is
> available.
> It can be "overlaid" over DSPAM's url hierarchy as needed (since it
> would be optional) using mod_rewrite or a simple alias. No need to even
> include the logic for this into the main dspam executable.
> 
That's right. Who is going to do that? Anyone?


> Regards,
>     J.L.
> 
-- 
Kind Regards from Switzerland,

Stevan Bajić

------------------------------------------------------------------------------
Throughout its 18-year history, RSA Conference consistently attracts the
world's best and brightest in the field, creating opportunities for Conference
attendees to learn about information security's most important issues through
interactions with peers, luminaries and emerging and established companies.
http://p.sf.net/sfu/rsaconf-dev2dev
_______________________________________________
Dspam-devel mailing list
Dspam-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/dspam-devel

Reply via email to