Current File : //var/qmail/man/cat7/forgeries.0


Device and Network Interfaces                        forgeries(7)



NNNNAAAAMMMMEEEE
     forgeries - how easy it is to forge mail

SSSSUUUUMMMMMMMMAAAARRRRYYYY
     An electronic mail message can  easily  be  forged.   Almost
     everything  in  it,  including  the  return address, is com-
     pletely under the control of the sender.

     An electronic mail message can be  manually  traced  to  its
     origin  if  (1)  all  system  administrators of intermediate
     machines are both cooperative and competent, (2) the  sender
     did  not break low-level TCP/IP security, and (3) all inter-
     mediate machines are secure.

     Users of _c_r_y_p_t_o_g_r_a_p_h_y can automatically ensure the integrity
     and  secrecy  of their mail messages, as long as the sending
     and receiving machines are secure.

FFFFOOOORRRRGGGGEEEERRRRIIIIEEEESSSS
     Like postal mail, electronic mail can be created entirely at
     the  whim  of  the  sender.   FFFFrrrroooommmm, SSSSeeeennnnddddeeeerrrr, RRRReeeettttuuuurrrrnnnn----PPPPaaaatttthhhh, and
     MMMMeeeessssssssaaaaggggeeee----IIIIDDDD can all contain whatever information  the  sender
     wants.

     For example, if you inject a  message  through  sssseeeennnnddddmmmmaaaaiiiillll  or
     qqqqmmmmaaaaiiiillll----iiiinnnnjjjjeeeecccctttt  or  SSSSMMMMTTTTPPPP, you can simply type in a FFFFrrrroooommmm field.
     In fact, qqqqmmmmaaaaiiiillll----iiiinnnnjjjjeeeecccctttt lets you set  up  MMMMAAAAIIIILLLLUUUUSSSSEEEERRRR,  MMMMAAAAIIIILLLLHHHHOOOOSSSSTTTT,
     and  MMMMAAAAIIIILLLLNNNNAAAAMMMMEEEE  environment variables to produce your desired
     FFFFrrrroooommmm field on every message.

TTTTRRRRAAAACCCCIIIINNNNGGGG FFFFOOOORRRRGGGGEEEERRRRIIIIEEEESSSS
     Like postal mail, electronic mail is postmarked when  it  is
     sent.  Each machine that receives an electronic mail message
     adds a RRRReeeecccceeeeiiiivvvveeeedddd line to the top.

     A modern RRRReeeecccceeeeiiiivvvveeeedddd line contains quite a bit of  information.
     In  conjunction with the machine's logs, it lets a competent
     system administrator determine where  the  machine  received
     the  message  from, as long as the sender did not break low-
     level TCP/IP security or security on that machine.

     Large multi-user machines often come with inadequate logging
     software.   Fortunately,  a  system administrator can easily
     obtain a  copy  of  a  931/1413/Ident/TAP  server,  such  as
     ppppiiiiddddeeeennnnttttdddd.   Unfortunately, some system administrators fail to
     do this, and are thus unable to figure out which local  user
     was responsible for generating a message.

     If all intermediate system administrators are competent, and
     the  sender  did  not  break  machine  security or low-level
     TCP/IP security, it is possible to  trace  a  message  back-
     wards.    Unfortunately,   some   traces   are   stymied  by



SunOS 5.11                Last change:                          1






Device and Network Interfaces                        forgeries(7)



     intermediate system administrators who are uncooperative  or
     untrustworthy.

CCCCRRRRYYYYPPPPTTTTOOOOGGGGRRRRAAAAPPPPHHHHYYYY
     The sender of a mail message may place his  message  into  a
     _c_r_y_p_t_o_g_r_a_p_h_i_c  envelope stamped with his seal.  Strong cryp-
     tography guarantees that any two messages with the same seal
     were  sent by the same cryptographic entity:  perhaps a sin-
     gle person, perhaps a group of cooperating  people,  but  in
     any case somebody who knows a secret originally held only by
     the creator of the seal.  The seal is called a _p_u_b_l_i_c _k_e_y.

     Unfortunately, the creator of the seal is often an  insecure
     machine, or an untrustworthy central agency, but most of the
     time seals are kept secure.

     One popular cryptographic program is ppppggggpppp.

SSSSEEEEEEEE AAAALLLLSSSSOOOO
     pgp(1), identd(8), qmail-header(8)



































SunOS 5.11                Last change:                          2