Dave Bujaucius wrote:
> It is common knowledge that unencrypted messages sent over an unsecured
> Internet connection *can* be viewed in clear text and thus the contents
> compromised. My questions:
>
> 1. Is it really easy? How readily available are sniffing tools that
> can do this?
Very easy. mailsnarf which is part of the dsniff tools does this.
> 2. Can it be done from a user's home dial up or DSL type connection?
> Can someone in California somehow be scanning mail leaving a New York
> location?
Two ways it can be done. dsniff acts as a sniffer so it must be
installed somewhere in the network path that the target e-mail transits.
That may or may not be easy for an attacker to do. Another
possibility is to compromise one of the mailhosts that relays the target
e-mail from its source to destination. This is no longer a network
attack, but a host attack. Nevertheless, the result is the same.
If the goal is to view all e-mail leaving or entering a particular
network, the sniffer or compromised mailhost would need to be right at
that network's POP. If the attacker is only interested in a small
subset of your e-mail then this can be done anywhere in the path the
e-mail typically takes from source to destination.
You can decide for yourself how easy it would be to accomplish this in
your environment.
-paul