[Mailman-Developers] bugtraq submission warning: email address harvesting exploit

Chuq Von Rospach chuqui at plaidworks.com
Thu Nov 27 12:17:33 EST 2003


On Nov 27, 2003, at 9:08 AM, Terri Oda wrote:

> On Tue, Nov 25, 2003 at 11:07:39AM -0800, Chuq Von Rospach wrote:
>> Fails ADA and accessibility requirements badly. I'd argue against any
>> solution that fails such basic needs without any real way to fix it.
>
> What about reverse turing tests that aren't graphics-based?

if it can be made accessible, I have no problem with it. But I think 
it's solving the wrong problem, because the data is still accessible to 
a motivated person. you're not fixing the issue, simply raising the bar 
and hoping they give up. It won't stop the spammer who hires a dozen 
temps to surf web sites and authenticate their bots through, right?

So the REAL answer, IMHO, is to not make that information available. 
Cloak it programattically. If you want to have an authenticated mode 
for subscribers to keep it uncloaked, that's fine by me. But the public 
archives should simply recognize significant pieces of information and 
elide them from the output. That way, no matter what a spammer or other 
nasty person does, they can't get the information. It's not there.

my definition of significant pieces of information: email addresses, 
phone numbers, social security nubmers (and if there are global 
equivalents to this US number, those, too). Simply replace them in the 
text with [[email address omitted]] as you deliver the archive. Then 
you stop playing this arms war with spambots completely, by removing 
the target they're after. No need to, two years from now, rip out the 
work you did and come up with a new temporary fix because spammers got 
around to implementing new OCR techniques.

Remember challenge/response? When everyone thought it was the solution 
to all of our problems? Took the spammers under six weeks to crack it 
once they decided to try. (answer: send spam as being "From:" you, 
"To:" you. Most C/R systems have the user's email address whitelisted. 
end of story.

>> Better is to simply teach the archives not to distribute sensitive
>> information at all. And a lot easier to implement, actually.
>
> So, is anyone working on this *within* pipermail?

that would be the answer, or throw it out (I'm not a huge fan of 
pipermail; it's only advantage to mailman is it's written in Python) 
and do something else. Or leave pipermail alone, and write a CGI that 
all archives exit through that does the filtering, which is IMHO, how 
you ought to do it. That way, you can authenticate via that CGI to a 
level of access, change the filtering on the fly, and leave the 
archives unedited (as I think they ought to be).





More information about the Mailman-Developers mailing list