[Mailman-Users] How hard is it to spoof an email?

Jim Popovitch jimpop at yahoo.com
Sun Jan 29 22:31:07 CET 2006


Jp Possenti wrote:
> How hard would it be for someone to maliciously start sending all the users
> in my list emails or start deleting people from it by sending bounce errors

It's not hard at all.  In fact it's quite easy.  This is because the raw 
archive data is available to the public.  See this FAQ: 
http://www.python.org/cgi-bin/faqw-mm.py?req=show&file=faq04.066.htp

> or by spoofing the admin email and start emailing everyone on the list?

That's not hard at all either, although you probably shouldn't have your 
admin email as a list member.  Of course, the spammer could just use any 
of your subscribers email addresses including the valid ones that 
haven't posted in 4 years (*cough*, *cough*).  See the recent "Verifying 
posts" thread.

> Is this a common problem, or is mailman secure about it? What are some ways
> to help avoid any problems?

Use an MTA that supports DKIM and/or SPF.  These standards help to 
verify who the sender is.  So if bob at aol.com posts to your list, SPF 
will verify that the email came from an approved aol.com server, not 
something like 24.16.8.101-home.dsl.cox.net.  DKIM takes it a step 
further and adds an encrypted email header "key" that is carried with 
the email during it's entire journey through multiple servers.  This key 
enables every "hop" to validate the email, whereas SPF is just 
point-to-point validation based on email header info (which can very 
easily be modified in transit).

> Please explain carefully and with plenty of details as I am still figuring
> things out.

Heck, that should be SOP for everyone.  ;-)

-Jim P.





More information about the Mailman-Users mailing list