[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: How to use procmail
Adam Shostack wrote:
> :0
> * From [email protected]
> {
> :0 h
> * >10000
> /dev/null
>
> :0 h
> *^Subject:.*no keys match
> /dev/null
>
> :0:
> *Subject: Your command, ADD
> $DEFAULT
>
>
> :0E
> | pgp +batchmode -fka
Isn't this vulnerable to "deadbeef" attacks? I can also see an attack when
someone sends you an email with the spooofed "From " address and a user
name that is the same (or almost the same) as that of your trusted parties.
Suppose that you correspond with [email protected] and you use encryption
command
pgp -eaf mrx
Then I can send you a bogus email containing a key for [email protected]
and next time you encrypt something for your friend [email protected],
you will actually encrypt it with the wron key. If I intercept your
email, your message to mrx can be compromised.
> # basic file server. Only sends whats in .outbound
> :0
> * ^Subject: (SEND|get) [0-9a-z][-_/0-9a-z.]+$
> * !^Subject:.*[ /.]\.
> * !^FROM_DAEMON
> {
> # FILE=`formail -x Subject: | sed 's/.* //'`
> FILE=`sed -n -e '/Subject:/s/.* //p' -e '/^$/q'`
>
> :0c
> | (formail -rt -A"Precedence: junk";\
> cat $HOME/.outbound/$FILE) | $SENDMAIL -t
*If* .outbound has some subdirectories (say subdir), How about this email:
From: [email protected]
Subject: GET subdir/../../../../etc/passwd
Reply-To: [email protected]
xxx
- Igor.