Hello,

    E-mail goes from server to server based upon DNS MX (mail exchange)
records.  On each server the message is whole and intact with additional
information attached.  I can't speak for how it's treated by anything other
than sendmail, but sendmail has a queue directory which has two files for
each message, one for the message (minus the header) and a second file with
the header and sender/sending/tracking information, etc..  I will get back
to MX records in a minute but each mail server first accepts the message and
writes it to some type of queue before trying to deliver it.  The admin of
these mail server can configure them anyway they want, even setting them
only to queue mail (and then after they copy them they can release them, or
they could automate this as simply as setting the server to queue only and
then automatically copy the message out of the spool file and shipping them
to the next mail server.  Now, back to MX records.  Each domain should
configure their DNS with a minimum of one MX record, usually 2 or three are
better...however these should be either mail server that they control
directly or mail servers that someone they trust are maintaining.  The only
other mail server that should handle the message is the one which is being
used by the sender of the message, which should be under control of someone
the sender trusts.  Grabbing e-mails off of a server is by far the easiest
way to steal them.

    Now, if you trust the IT department of your company and the IT
department of the company you are sending the message to, them the next
thing to consider is the route between your sending computer to your first
mail server, the connections between all the mail servers and finally the
connection from the final mail server to the receivers computer.  Here it's
a matter of bandwidth, in general pack sniffers can only handle so much data
which means someone targeting YOUR e-mail has a much much better chance the
closer they are to you and a person targeting e-mail sent to that SOMEONE
has a much much better chance the closer they are to that someone.  Let's
take a fictitious example, your company used Netcom for their connection and
the person you are sending the e-mail to used Vitts for their connection.
If the person sniffing is sniffing directly from some point between your
computer and your mail server then they can use filters to only look at
connections from your IP to the mail server's port 25 and probably fairly
easily see your e-mail (yes, I have seen lots of e-mails fly by a sniffer
when we had it unfiltered on a company's LAN, but without the filters you
see a little of this e-mail, then a little of that e-mail, etc... as the
packets all pass you by).  If the person sniffing is sniffing between your
mail server and the next mail server in the chain (let's assume they already
know what the next server is because otherwise they will see much more
e-mails) then they can filter on the IP address of your mail server and the
IP address of the destination mail server port 25 again.  This will net them
all the e-mails that pass from your mail server to the next mail server
which will probably be all e-mails between the two companies.  However, the
'if' of knowing the next mail server is moderate and the chance of getting
between the two servers is iffy because of dynamic routing and even with the
filters they still have to check the headers of ALL the IP packets going by
them which in the case would probably be all traffic processed by your
provider.   Fairly unlikely I would guess but, I have no experience.  Now,
if they are on the other side the situation again gets simpler when they are
between the final mail server and the receiving computer, here they filter
on the two IP address and (source port of 110 for POP3 {returning traffic
from the mail client's connection to port 110}).  Again, sniffing on a local
LAN I have seen lots of e-mail fly by on pop3 connections.

    Summary, if they are sniffing on either the sender or the receiver's LAN
then fairly easy, or if they have hacked either the senders or receivers
mail servers it's cake.  Otherwise I would say rather remote possibility,
but possible...as they say.... where there is a will there is a way.

Hope this helps,
Robert


----- Original Message -----
From: "Dave Bujaucius" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Friday, February 22, 2002 11:57 AM
Subject: Unencrypted Email


> It is common knowledge that unencrypted messages sent over an unsecured
> Internet connection *can* be viewed in clear text and thus the contents
> compromised.  My questions:
>
> 1.  Is it really easy?  How readily available are sniffing tools that
> can do this?
> 2.  Can it be done from a user's home dial up or DSL type connection?
> Can someone in California somehow be scanning mail leaving a New York
> location?
> 3.  Outside of government agencies that have access to selected ISP's,
> how likely is it that a company could be targeted by an outside person
> or organization?
>
> I realize that like most IT issues everything is relative.  I'm
> questioning the relative risk in sending confidential information over
> the Internet.  Real life experiences versus theory.
>
> Dave Bujaucius

Reply via email to