Stefano:
Great to hear from your experience. It sounds a lot of effort to become a
committer.
Here is the open relay testing site that I used:
http://www.abuse.net/relay.html
This appears to be pretty popular as it showed up as the top link on google
for "mail relay test". My james server failed the test case I mentioned
earlier in email (spoofing [EMAIL PROTECTED] to [EMAIL PROTECTED]).
I went ahead and tested a few other ISP and corporation's email. It seems
when SMTP authentication is not established, many directly reject any mail
with sender containing the designated domain name. Here are the servers I
tested that rejected all spoof:
Mail ISP:
Gmail: gsmtp183.google.com
Hotmail: mf4100beta1.solinus.com
Corporation email:
Google.com: smtp1.google.com
Amazon.com: smtp-fw-0101.amazon.com
Microsoft.com: mailb.microsoft.com
The test on Yahoo seems to have failed that it accepts a "fake" email from
[EMAIL PROTECTED] to [EMAIL PROTECTED] However, it is possible that yahoo
"drops" spoofed mails in spooling queue (like using the configuration similar
to what you posted earlier). I need to confirm this later. (I can't do the
spoofing testing at work at the moment because our corporate firewall blocks
all outgoing port 25 access)
Just to make sure that the code change won't violate the RFC, can you let me
know the RFC number and section number that mandates any email from @xyz.com
can be sent to [EMAIL PROTECTED] without SMTP authentication? I looked at the
following two RFCs from the IETF site and couldn't find this mandate:
SMTP RFC (821): http://www.ietf.org/rfc/rfc0821.txt
SMTP authentication RFC (2554): http://www.ietf.org/rfc/rfc2554.txt
Ken
Stefano Bagnara <[EMAIL PROTECTED]> wrote: Ken Lin wrote:
> Maybe this method of "spoofing" users has been overlooked. Even if James
> has SMTP turned on, I can impersonate any user of the server and send
> another user an email without any authentication. In a way, it seems to be a
> security hole open by default unless people apply your section of
> configuration.
You, anyway, will never stop people from using your email as sender
address and send messages around the world. There are solutions to stop
this behaviour (e.g. SPF) but not supported by all the SMTP server so I
don't think that we can consider this thing a "security hole" in james.
I'm not 100% sure, but I bet that most mail servers will not block
messages with a "from:" containing a local domain to be relayd (even
with authentication on).
> Well we check for recipient address in the first place. This checking is
> not explicitly mentioned in the RFC either, but is just implicitly allowed.
> By the same token, checking the sender address should be allowed too.
You'd be not RFC compliant because you MUST accept a mail "from:
[EMAIL PROTECTED]" "to: [EMAIL PROTECTED]" even without authentication.
I think that this is not specified in the RFC and is not even common
practice for SMTP servers and we should not make it the default.
Btw, if you want to write a patch to provide an option to enable this
behaviour I'll try to review it.
> What do you think? Actually, are you a software developer on the James team?
> How do I become one?
I'm a James committer. I've been "proposed" by other James committers
one year ago after many months of support here in the list and after
having submitted many patches to the issue tracker.
Stefano
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
---------------------------------
Yahoo! Mail
Bring photos to life! New PhotoMail makes sharing a breeze.