[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: How to use procmail



Adam Shostack wrote:
> :0
> * From [email protected]
> {
>    :0 h
>    * >10000
>    /dev/null
> 
>    :0 h
>    *^Subject:.*no keys match
>    /dev/null
> 
>    :0:
>    *Subject: Your command, ADD
>    $DEFAULT
> 
> 
>    :0E
>    | pgp +batchmode -fka

Isn't this vulnerable to "deadbeef" attacks? I can also see an attack when 
someone sends you an email with the spooofed "From " address and a user
name that is the same (or almost the same) as that of your trusted parties.

Suppose that you correspond with [email protected] and you use encryption
command 

pgp -eaf mrx

Then I can send you a bogus email containing a key for [email protected] 
and next time you encrypt something for your friend [email protected],
you will actually encrypt it with the wron key. If I intercept your
email, your message to mrx can be compromised.

> # basic file server.  Only sends whats in .outbound
> :0 
> * ^Subject: (SEND|get) [0-9a-z][-_/0-9a-z.]+$
> * !^Subject:.*[ /.]\.
> * !^FROM_DAEMON
> {
>    # FILE=`formail -x Subject: | sed 's/.* //'`
>    FILE=`sed -n -e '/Subject:/s/.* //p' -e '/^$/q'`
> 
>   :0c 
>   | (formail -rt -A"Precedence: junk";\
>      cat $HOME/.outbound/$FILE) | $SENDMAIL -t

*If* .outbound has some subdirectories (say subdir), How about this email: 

From: [email protected]
Subject: GET subdir/../../../../etc/passwd
Reply-To: [email protected]

xxx


	- Igor.