To Eli and y'all
well, I got my answer from www.sarc.com

It turns out that when it infects someone's computer, it goes over the address book 
and Randomly choose an email address as the from field.
This new technique is Highly disturbing, since it represents more than loss of hours! 
it mess up your business public relations.
hmm...., add it to the things we can't solve on the internet without fixing every 
faulting server.

On the other hand, the only viable solution I can think of from a practical POV:
You could add a 1 click .cab/installed link to your signature, that urges your 
contacts to click on it.
This .cab file is an authentication mechanism of a 3rd party, or, created by you(its 
very simple to do).
p.s: please note that pgp sig may not be adequate because you need more operations 
than 1 click to install a 3rd party(because u defined most users to be dummies ;), or 
that it is too public to trust it to perform like you want it, which is to convince 
your customers that this email was received from you and you only. Plus, they also get 
a kind of certificate that they received it from you, and you get a copy of that 
certificate. 
Think of it like the Secureclick.com service for visa cards. every time you will send 
an email a (auto number like) unique certificate will be issued that can't be faked 
since you are the only one who will confirm/deny certificates.

A scenario that comes to my mind is as follow:
1)A new contact receives an email from you, then reads at the bottom that you urge him 
to click on a certain link, lets say 
"http://www.yoursite.com/verificationplugin_quick_install"; and after about 30 sec you 
are secured from email spoofing for this particular user.
2) your not so new now contact, receives another email from you to his outlook mailbox 
the plugin quickly checks the header of the message and reads the serial number 
(hiddenly) attached to your from address, contacts your webserver xml/php whatever web 
application and verify the message to your address and confirms or denies the 
signature.

All is well in contact land :)

TO: Eli Marmor
ok, now to get back to the real world ;)! I am not certain you have the will and the 
knowlege to create (although its not so difficult) this kind of plugin. I would 
suggest another alternative.
1) create a web page using php that generates a signature which includes an http 
address with the included details: 
http://www.yoursite.com/verify_this_message.html?emailaddress=xxx&message_serial 
number&one time hash password=xxxhashxxx (u can do that using perl, for example when 
unix creates passwords it give you the hash and not the real password. for your case 
store the random password and give the generated hash from the passwords to users).
2) using outlook, whatever, create your email as you regularly would, and copy/paste 
the new signature to your email.
3) when the user will get your email, he will click on the veryification address which 
will contact your site .php/whatever page which will very him.

That should protect you from most forms of email spoofing. Please note though that 
this method is vulnerable to web redirection, though i am doubtful that someone will 
generate a virus just to hurt your organization + its your only choice if your users 
will not install some kind of verification mechanism. also, note that this method is 
platform free so it can run on any user client.
and last, its free :)!

Tell me if it helps.

* - * - *
Tzahi Fadida
[EMAIL PROTECTED]
Fax (+1 Outside the US) 240-597-3213
* - * - * - * - * - * - * - * - * - *

WARNING TO SPAMMERS:  see at http://members.lycos.co.uk/my2nis/spamwarning.html

> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf 
> Of Oleg Goldshmidt
> Sent: Wednesday, April 24, 2002 9:19 AM
> To: [EMAIL PROTECTED]
> Cc: [EMAIL PROTECTED]
> Subject: Re: OT: The Heaviest Wave of Viruses
> 
> 
> Tzahi Fadida <[EMAIL PROTECTED]> writes:
> 
> > Just for the sake of curiosity, this virus that everybody talks
> > about that impersonate someone without even infecting that someone.
> > How exactly does it get your email address?
> 
> A couple of ideas: a) web harvesting; b) grabbing it from someone's
> Outlook contact list. Inserting it into the from field when sending
> itself to someone else from your friend's contact list is, I assume,
> rather trivial.
> 
> -- 
> Oleg Goldshmidt | [EMAIL PROTECTED] 
> [Lisp] is the only computer language that is beautiful. 
>                       - Neal Stephenson 
> 
> =================================================================
> To unsubscribe, send mail to [EMAIL PROTECTED] with
> the word "unsubscribe" in the message body, e.g., run the command
> echo unsubscribe | mail [EMAIL PROTECTED]
> 
> 
> 
> 
> 




================================================================To unsubscribe, send 
mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to