On Mon, 06 Jan 2003 22:11:49 +0000 [EMAIL PROTECTED] wrote: > All, > > Thanks for the input on this so far. To clarify, [EMAIL PROTECTED] is exactly > right in stating that I'm trying to stop the spoofing of my domain as the > sender to my own domain (e.g. helpdesk@xyz to johnSmith@xyz where helpdesk is > the spoofed sender). This is not an open relay server and the spam is not (as > far as I can tell) as a result of any viruses guessing at accounts. > > The primary concern is with stopping mail with my domain as the sender and my > domain as the recipient if the sender IP is not within networks which I > control. I don't want to give any "crackers" monitoring this mailing list any > ideas (most likely they've thought of this already) but this makes the > probability of someone opening up an email and executing an attachment much > greater. In some testing me and some other guys did, it was trivial to send an > email from an outside address with the sender spoofed to look like an internal, > trusted source (the spoofing is very easy but knowledge of the internal account > naming convention, etc. was a little bit more difficult to match). This would > make it much easier for me to send an email from [EMAIL PROTECTED] requesting > that [EMAIL PROTECTED] execute the attached file. Sure he might know not to > execute attachments from other untrusted domains but would he not open this > from his "own" helpdesk? The amount of knowledge to execute this attack would > be somewhat trivial to obtain - simple Google searches would most likely return > the email addresses for a targeted company. A very large % of typical users > would never think to check SMTP headers - they likely don't even know what > those are. > > I'm not sure that this problem can be resolved within sendmail config files but > if anyone knows differently, please let me know. > > Thanks again, > > Jim > > > I think the original sender and several of the respondents may be > > confusing 'spam with forged headers' with 'open relaying.' > > > > The original question was not about his relay being hijacked to send > > spam, it was about mail coming IN to his company xyz.com for [EMAIL PROTECTED] > > purporting to be from another sender at xyz.com when it really came from > > somewhere else. That's NOT open relaying, that's forging headers and > > there's not much you can do about it without breaking things (What if > > [EMAIL PROTECTED] wants to use her xyz.com return address when she's sending > > mail from home to [EMAIL PROTECTED] via her local ISP dialup -- Why would you > > want to block that?) What's the difference if incoming spam has one > > forged address or another anyway? It's still spam! > > > > 'Switching to Postfix', using a 'content security gateway,' or 'TLS' are > > not going to solve this problem (forging of email headers). > > > Hi,
Modern Sendmails have the concepts of milters (mail filters). Using these you can access mail at any stage and apply a filter to it. Hit up Google with "milter sendmail" and you'll get plenty of information. I use Spam Assassin with a milter and it catches ALOT of stuff, including forged headers. There are packages out there to allow you to write filters in C, C++, perl, and other languages. GB -- GB Clark II | Roaming FreeBSD Admin [EMAIL PROTECTED] | General Geek CTHULU for President - Why choose the lesser of two evils?