On Thu, Mar 11, 2004 at 11:59:50AM -0500, Caleb Epstein wrote:

> Here is a sample message:
> http://bklyn.org/~cae/mailman-stumper.txt

        OK, I've found out a little bit more about the exploit.  The
        message is sent with an envelope-from (I think thats the right
        term) of an actual list subscriber, one who has permission to
        post to the list, but the From: header is one of these made-up
        official addresss:

        From my mail server's logs (subscriber's address mangled):

2004-03-11 16:31:44 1B1T5z-0009zY-00 <= [EMAIL PROTECTED] H=(srr2) [192.168.100.17] 
P=smtp S=17730 [EMAIL PROTECTED] from <[EMAIL PROTECTED]> for [EMAIL PROTECTED]

        From mailman's "post" log:

Mar 11 16:32:20 2004 (98296) post to announce from [EMAIL PROTECTED], size=2189, 
message-id=<[EMAIL PROTECTED]>, success

        Any suggestions on how to catch this forgery?

-- 
Caleb Epstein |  bklyn . org  |           BOFH excuse #260:
    cae at    | Brooklyn Dust |
bklyn dot org |   Bunny Mfg.  |           We're upgrading /dev/null

------------------------------------------------------
Mailman-Users mailing list
[EMAIL PROTECTED]
http://mail.python.org/mailman/listinfo/mailman-users
Mailman FAQ: http://www.python.org/cgi-bin/faqw-mm.py
Searchable Archives: http://www.mail-archive.com/mailman-users%40python.org/

Reply via email to