Dave Bujaucius wrote:

> It is common knowledge that unencrypted messages sent over an unsecured
> Internet connection *can* be viewed in clear text and thus the contents
> compromised.  My questions:
> 
> 1.  Is it really easy?  How readily available are sniffing tools that
> can do this?


Very easy.  mailsnarf which is part of the dsniff tools does this.


> 2.  Can it be done from a user's home dial up or DSL type connection?
> Can someone in California somehow be scanning mail leaving a New York
> location?


Two ways it can be done.  dsniff acts as a sniffer so it must be 
installed somewhere in the network path that the target e-mail transits. 
    That may or may not be easy for an attacker to do.  Another 
possibility is to compromise one of the mailhosts that relays the target 
e-mail from its source to destination.  This is no longer a network 
attack, but a host attack.  Nevertheless, the result is the same.

If the goal is to view all e-mail leaving or entering a particular 
network, the sniffer or compromised mailhost would need to be right at 
that network's POP.    If the attacker is only interested in a small 
subset of your e-mail then this can be done anywhere in the path the 
e-mail typically takes from source to destination.

You can decide for yourself how easy it would be to accomplish this in 
your environment.


-paul


Reply via email to