[1147] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: mail port

daemon@ATHENA.MIT.EDU (Ong Guan Sin)
Thu Nov 9 11:51:44 1995

To: rfjimen@tesuque.cs.sandia.gov (Ross F. Jimenez)
Date: Thu, 9 Nov 1995 21:56:08 +0800 (SST)
From: "Ong Guan Sin" <cceonggs@leonis.nus.sg>
Cc: www-security@ns2.rutgers.edu
In-Reply-To: <Pine.SUN.3.91.951108221322.16290B-100000@tesuque.cs.sandia.gov> from "Ross F. Jimenez" at Nov 8, 95 10:17:51 pm
Errors-To: owner-www-security@ns2.rutgers.edu

-----BEGIN PGP SIGNED MESSAGE-----

> I have a question... you can telnet to a mail port (25) and send mail 
> from it,,to any person, and put it's from anybody you want, are you not 
> suppose to do this,, or can anybody do this, can the mail be tracked ?? 
> It would seem like a big security flaw if you could send false mail so 
> easily... ??? 

Yes, you could fool the sendmail by setting From: field to anything you 
want, but sendmail would make an IDENT request (port 113) to your host to 
find out who actually make the port 25 request and put that piece of 
information into the mail header. So, if you receive a piece of mail 
whose mail header says "From: clinton@whitehouse.gov" but with info 
like "badguy@badhost.com", then you know what it is ... (If your host has 
ident port shut, you will still at least get "@badhost.com" in the header.)

Anyway, the route in which a mail has gone thru is always recorded in the 
mail header. 

- --
GS

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2i
Comment: Go for PGP!

iQCVAwUBMKIIceM1L92l84PBAQFaHgP/WlbAbmox4Bo1JQSZgqpYmq8crsNMZSVT
tfAHM+DbFXHWzLDR146m4kWpiyHIVeHS9Vzng4VxIyeffUrkuvGUXcUaKuRFD9Qa
uj2DwZhoiZCoHJaZs0G6LjxEgyempHy2Sl4pWBrS8GAbs9Z0csuFsTqeOLpCOFUZ
Vl+uua9ypkE=
=w84m
-----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post