On Mon, 06 Jan 2003 22:11:49 +0000
[EMAIL PROTECTED] wrote:

> All,
> 
> Thanks for the input on this so far.  To clarify, [EMAIL PROTECTED] is exactly 
> right in stating that I'm trying to stop the spoofing of my domain as the 
> sender to my own domain (e.g. helpdesk@xyz to johnSmith@xyz where helpdesk is 
> the spoofed sender).  This is not an open relay server and the spam is not (as 
> far as I can tell) as a result of any viruses guessing at accounts.
> 
> The primary concern is with stopping mail with my domain as the sender and my 
> domain as the recipient if the sender IP is not within networks which I 
> control.  I don't want to give any "crackers" monitoring this mailing list any 
> ideas (most likely they've thought of this already) but this makes the 
> probability of someone opening up an email and executing an attachment much 
> greater.  In some testing me and some other guys did, it was trivial to send an 
> email from an outside address with the sender spoofed to look like an internal, 
> trusted source (the spoofing is very easy but knowledge of the internal account 
> naming convention, etc. was a little bit more difficult to match).  This would 
> make it much easier for me to send an email from [EMAIL PROTECTED] requesting 
> that [EMAIL PROTECTED] execute the attached file.  Sure he might know not to 
> execute attachments from other untrusted domains but would he not open this 
> from his "own" helpdesk?  The amount of knowledge to execute this attack would 
> be somewhat trivial to obtain - simple Google searches would most likely return 
> the email addresses for a targeted company.  A very large % of typical users 
> would never think to check SMTP headers  - they likely don't even know what 
> those are.  
> 
> I'm not sure that this problem can be resolved within sendmail config files but 
> if anyone knows differently, please let me know.
> 
> Thanks again,
> 
> Jim
> 
> > I think the original sender and several of the respondents may be
> > confusing 'spam with forged headers' with 'open relaying.'
> > 
> > The original question was not about his relay being hijacked to send
> > spam, it was about mail coming IN to his company xyz.com for [EMAIL PROTECTED]
> > purporting to be from another sender at xyz.com when it really came from
> > somewhere else. That's NOT open relaying, that's forging headers and
> > there's not much you can do about it without breaking things (What if
> > [EMAIL PROTECTED] wants to use her xyz.com return address when she's sending
> > mail from home to [EMAIL PROTECTED] via her local ISP dialup -- Why would you
> > want to block that?) What's the difference if incoming spam has one
> > forged address or another anyway? It's still spam!
> > 
> > 'Switching to Postfix', using a 'content security gateway,' or 'TLS' are
> > not going to solve this problem (forging of email headers).
> > 
> 
Hi,

Modern Sendmails have the concepts of milters (mail filters).  Using these you can
access mail at any stage and apply a filter to it.  Hit up Google with "milter 
sendmail"
and you'll get plenty of information.  I use Spam Assassin with a milter and it 
catches ALOT
of stuff, including forged headers.  There are packages out there to allow you to 
write filters
in C, C++, perl, and other languages.

GB

-- 
GB Clark II             | Roaming FreeBSD Admin
[EMAIL PROTECTED] | General Geek 
           CTHULU for President - Why choose the lesser of two evils?

Reply via email to