lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <0FD9D979B9535D4890AE309799B6D1E55C5D49@lansingemail.seqnt.com> From: mlachniet at sequoianet.com (Lachniet, Mark) Subject: E-mail spoofing countermeasures (Was: Backdoor not recognized by Kaspersky) RE: Accepting mail from spoofed hosts This is really a very simple idea, and a hundred people smarter than me must have thought of it, but I have to wonder if yet another layer of e-mail security might not be in order as well - don't all email systems have a unique message ID on them? Sendmail certainly does. Why not set up some kind of system where the recipient email server does a kind of challenge-response to the originating domain, kind of like IDENT. Here the recipient is the recipient.com mail server, and has a MX record for recipient.com and sender is the sender.com mail server and has a MX record for sender.com Recipient ---> Sender : I got a message from joe@...der.com - is it a legit user? Sender ---> Recipient : Yes, that's one of my users Recipient ---> Sender : Do you have a record of email ID QF2341ASZF for this user? Sender ---> Recipient : Yes, that user sent the email Recipient ---> Sender : Thanks, party on Wayne (email accepted) Sender ---> Recipient : Party on Garth (super, thanks for asking) You might combine the first two dialogs in one, ie, "do you have message ID QF2341ASZF from user joe@...der.com" and provide non-descriptive error messages, so people couldn't easily harvest email addresses ala SMTP VRFY. Of course on the down side, you'd have to use your email server, with legit MX record as your smart host for all users (may be a hassle for home offices and POP clients, maybe requiring outgoing SMTP auth, but that's easy right?) Add to that a good RBL system, and you could cut down a boatload of spam. Mark Lachniet -----Original Message----- From: Aditya, ALD [Aditya Lalit Deshmukh] [mailto:aditya.deshmukh@...ine.gateway.technolabs.net] Sent: Wednesday, March 03, 2004 1:06 PM To: Bart.Lansing@...ls.com Cc: full-disclosure@...ts.netsys.com; full-disclosure-admin@...ts.netsys.com Subject: RE: [Full-Disclosure] Backdoor not recognized by Kaspersky > The zip's contents can > be seen without the password, just not unpacked...no cracking it required. now winrar has a option to encrypt file names with a password, me thinks pkzip with the 64 bit compression also has that feature... how are we going to deal with this ? by stopping all the compressed mail at the email gateway ? we do have one solutions: all the mail headers are spoofed so just stop accepting mail from spoofed host, this should solve your spam problem also > You should be blocking executables by policy anyway, yes? that is always being done by the all the people in this day and age, only now we seem to forget to add the compressed file format that are encrypted so that their file contects cannot be seen ? -aditya ________________________________________________________________________ Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com) _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists