[31748] in bugtraq
Re: Privacy leak in VeriSign's SiteFinder service #2
daemon@ATHENA.MIT.EDU (Marco Ivaldi)
Wed Sep 24 15:43:48 2003
Date: Wed, 24 Sep 2003 21:00:52 +0200 (CEST)
From: Marco Ivaldi <raptor@0xdeadbeef.info>
To: Mark Coleman <markc@uniontown.com>
Cc: "Richard M. Smith" <rms@computerbytesman.com>,
"BUGTRAQ@SECURITYFOCUS. COM" <BUGTRAQ@securityfocus.com>,
incidents@securityfocus.org
In-Reply-To: <3F71DBC7.9060405@uniontown.com>
Message-ID: <Pine.BSO.4.58.0309242048360.24545@anarch0.rewt.mil>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
On Wed, 24 Sep 2003, Mark Coleman wrote:
> TELNET YYAAHHOO.COM 25
>
> 220 sitefinder.verisign.com VeriSign mail rejector (Postfix)
> mail from:source@yahoo.com
> 250 Ok
> rcpt to:user@yyaahhoo.com
> 550 <unknown[198.252.172.254]>: Client host rejected: The domain you are
> trying
> to send mail to does not exist.
>
> They could (AND SHOULD) REJECT from the initial connection, but instead
> ALLOW the TO and FROM fields of the SMTP negotiation to happen.
Moreover, they're still working on this SMTP server. Just one week ago,
they were running another Postfix-like MTA, with completely different
behaviour:
root@anarch0:~# telnet kjashfjhshghgfddg.com 25
Trying 64.94.110.11...
Connected to kjashfjhshghgfddg.com.
Escape character is '^]'.
220 snubby1-wcwest Snubby Mail Rejector Daemon v1.3 ready
helo foo
250 OK
mail from:test@test.com
250 OK
rcpt to:nospam@0xdeadbeef.info
250 OK
data
221 snubby1-wcwest Snubby Mail Rejector Daemon v1.3 closing transmission
channelConnection closed by foreign host.
What if Verisign is planning to open more similar TCP/IP services on that
host? What if they're going to further modify the existing ones, to better
invade individuals' privacy?
:raptor
--
Marco Ivaldi
Antifork Research, Inc. http://0xdeadbeef.info/
3B05 C9C5 A2DE C3D7 4233 0394 EF85 2008 DBFD B707