Re: another extortion email check

2020-05-05 Thread Loren Wilton
You can move the md5 generation into the SQL server. Of course, you'd want to be mindful of the communications channel between SpamAssassin and the SQL server. I was thinking that the database/whatever would be populated by feeding in lists of dsto=len passwords, since they seem to be more or l

Re: another extortion email check

2020-05-04 Thread John Hardin
On Tue, 5 May 2020, Martin Gregorie wrote: On Mon, 2020-05-04 at 16:25 -0600, Grant Taylor wrote: I think $DatabaseTechnology's main benefit is keeping the password data outside of the configuration files. Agreed, in this sort of corner case. select count(*) where log.key = md5(key);

Re: another extortion email check

2020-05-04 Thread John Hardin
On Mon, 4 May 2020, Grant Taylor wrote: On 5/4/20 2:51 PM, John Hardin wrote: *if* they are being actively used for authentication, either by the security system (which is a glaring flaw in the design of the security system) or as a reference for accessing the secured resource (e.g. a plainte

Re: another extortion email check

2020-05-04 Thread Martin Gregorie
On Mon, 2020-05-04 at 16:25 -0600, Grant Taylor wrote: > I think $DatabaseTechnology's main benefit is keeping the password > data outside of the configuration files. > Agreed, in this sort of corner case. > select count(*) where log.key = md5(key); > Neat. > You can move the md5 generation

Re: another extortion email check

2020-05-04 Thread Grant Taylor
On 5/4/20 3:59 PM, Martin Gregorie wrote: The list of such passwords might get rather long, so using a database both makes maintenance easier, as you spotted, and also keeps a lot of junk out of the rule sets. I absolutely agree. I like the idea of keeping data outside of configuration files.

Re: another extortion email check

2020-05-04 Thread Grant Taylor
On 5/4/20 3:09 PM, Jeff Mincy wrote: You will have to write a perl plugin for SpamAssassin that finds passwords in an email message and MD5 hashes those passwords and compares against a list of previously saved hashed passwords. The list of passwords could be stored in various ways. ACK Id

Re: another extortion email check

2020-05-04 Thread Grant Taylor
On 5/4/20 2:51 PM, John Hardin wrote: *if* they are being actively used for authentication, either by the security system (which is a glaring flaw in the design of the security system) or as a reference for accessing the secured resource (e.g. a plaintext passwords file on your desktop, which i

Re: another extortion email check

2020-05-04 Thread Martin Gregorie
On Mon, 2020-05-04 at 15:14 -0600, Grant Taylor wrote: > I see little benefit of an SQL database vs rules with the encrypted > (hashed) passwords (possibly salted with the usernames / email > address) > in the SpamAssassin config file. Well, save for possible ease of > administration in that SA

Re: another extortion email check

2020-05-04 Thread Grant Taylor
On 5/4/20 2:06 PM, Martin Gregorie wrote: Encrypt them and put them in a single column database table that's also the prime key for the table? Lookup by encrypting the item being checked before looking for an SQL hit count: select count(*) where log.key = key; 0=miss, 1=hit, 2+ = error. Sho

Re: another extortion email check

2020-05-04 Thread John Hardin
On Mon, 4 May 2020, Grant Taylor wrote: On 5/4/20 10:09 AM, Jeff Mincy wrote: If you are no longer using the exposed password then disclosing the previously used password further is not going to make any difference. I disagree. Storing any plain text passwords is a bad practice and should b

Re: another extortion email check

2020-05-04 Thread Martin Gregorie
On Mon, 2020-05-04 at 13:03 -0600, Grant Taylor wrote: > Which is why I have not. It's also why I asked if there was a way to > compare hashed text. To quote: > > "Is there any way to compare hashed strings of text?" > > I'll note that my question hasn't been answered. Instead, people > have

Re: another extortion email check

2020-05-04 Thread Grant Taylor
On 5/4/20 10:09 AM, Jeff Mincy wrote: The best practice is to not use common or continue to use exposed passwords. Scripts are probably trying to log into your ssh using those passwords. I completely agree on both accounts. I think you are worrying about the wrong thing. I obviously disagre

Re: another extortion email check

2020-05-04 Thread Grant Taylor
On 5/4/20 6:16 AM, John Wilcock wrote: In the context of a list of passwords known to be compromised, it is hopefully fair to assume that they are no longer in current use, and thus no longer of any importance. If it isn't fair to assume that, then the organisation has bigger issues in any case

Re: another extortion email check

2020-05-04 Thread John Wilcock
Le 03/05/2020 à 05:27, Grant Taylor a écrit : On 5/2/20 1:47 PM, Loren Wilton wrote: The compromised password is already in plain text in the subject of the message; there isn't much point in hiding it other than embarassment. What if the email server with the list of plain text passwords is

Re: another extortion email check

2020-05-02 Thread Grant Taylor
On 5/2/20 1:47 PM, Loren Wilton wrote: The compromised password is already in plain text in the subject of the message; there isn't much point in hiding it other than embarassment. What if the email server with the list of plain text passwords is compromised and said list of plain text passwor

Re: another extortion email check

2020-05-02 Thread Loren Wilton
That exact string occurs in a Vade Security header, X-ME-VSCause, added by Fastmail on a completely unrelated legitimate email I received. I think it's more like an obfuscated information header for Vade's own use. I guess I'm not surprised. I would say then that it is a useless header as a sp

Re: another extortion email check

2020-05-02 Thread RW
On Sat, 2 May 2020 12:47:12 -0700 Loren Wilton wrote: > Well, if you want to do it the hard way there may be a way. > > I notice that three recient examples I have all failed DKIM check. > They also all have a very long header line that appears to have been > inserted either by outlook.com or th

Re: another extortion email check

2020-05-02 Thread Loren Wilton
Well, if you want to do it the hard way there may be a way. I notice that three recient examples I have all failed DKIM check. They also all have a very long header line that appears to have been inserted either by outlook.com or the originating spamware: X-VadeSecure-Cause. This has a very lon

Re: another extortion email check

2020-05-02 Thread Grant Taylor
On 5/1/20 1:55 PM, Loren Wilton wrote: You should be able to catch these with a single custom rule along the lines of header    STOLEN_PASSWORD    Subject    =~ /old_password/ score    STOLEN_PASSWORD    10 I'd pondered doing such. But I dislike the fact that the (compromised) password is st

Re: another extortion email check

2020-05-02 Thread AJ Weber
Yes, noticed that as well and considered making it simple with that rule.  Probably best thing to do anyway. Thank you both. -AJ On 5/1/2020 5:08 PM, John Hardin wrote: On Fri, 1 May 2020, Loren Wilton wrote: Please help, apparently this person "knows everything about me" :) I got a rash

Re: another extortion email check

2020-05-01 Thread John Hardin
On Fri, 1 May 2020, Loren Wilton wrote: Please help, apparently this person "knows everything about me" :) I got a rash of these a year or two ago, and have started getting a few more reciently. I haven't looked at the body of the recient ones, so don't know if they are still using the stand

Re: another extortion email check

2020-05-01 Thread Loren Wilton
Please help, apparently this person "knows everything about me" :) I got a rash of these a year or two ago, and have started getting a few more reciently. I haven't looked at the body of the recient ones, so don't know if they are still using the standard text. However, the identiying feature

Re: another extortion email check

2020-05-01 Thread Kevin A. McGrail
On 5/1/2020 10:23 AM, AJ Weber wrote: > I am seeing a number of extortion emails where the hacker has gotten > my email address and an old password from "the dark web". (Probably > one of many lists that are out there from one of the many mega-hacks > that have occurred.) > > Is there a way to chec