On Thu, Mar 11, 2004 at 11:59:50AM -0500, Caleb Epstein wrote: > Here is a sample message: > http://bklyn.org/~cae/mailman-stumper.txt
OK, I've found out a little bit more about the exploit. The message is sent with an envelope-from (I think thats the right term) of an actual list subscriber, one who has permission to post to the list, but the From: header is one of these made-up official addresss: From my mail server's logs (subscriber's address mangled): 2004-03-11 16:31:44 1B1T5z-0009zY-00 <= [EMAIL PROTECTED] H=(srr2) [192.168.100.17] P=smtp S=17730 [EMAIL PROTECTED] from <[EMAIL PROTECTED]> for [EMAIL PROTECTED] From mailman's "post" log: Mar 11 16:32:20 2004 (98296) post to announce from [EMAIL PROTECTED], size=2189, message-id=<[EMAIL PROTECTED]>, success Any suggestions on how to catch this forgery? -- Caleb Epstein | bklyn . org | BOFH excuse #260: cae at | Brooklyn Dust | bklyn dot org | Bunny Mfg. | We're upgrading /dev/null ------------------------------------------------------ Mailman-Users mailing list [EMAIL PROTECTED] http://mail.python.org/mailman/listinfo/mailman-users Mailman FAQ: http://www.python.org/cgi-bin/faqw-mm.py Searchable Archives: http://www.mail-archive.com/mailman-users%40python.org/