-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello Justin,

Friday, June 27, 2003, 7:21:47 PM, you wrote:

JM> BTW, I have seen spam using a real person's PGP sig, cut and pasted
from
JM> one of their messages.

Yes, and that's why just having a syntactically correct PGP sig shouldn't
get any significant negative score. It's too easy to put
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
at the beginning of a message, and
> -----BEGIN PGP SIGNATURE-----
> Version: PGP 8.0
>
> iQA/AwUBPvzyvpebK8E4qh1HEQKOogCfbLNsP2wT8cFIgN4L/ktnqv5I30cAn259
> y1tJ540sGzsrY3zJrkexff8V
> =wf1J
> -----END PGP SIGNATURE-----
at the end.

That's why I'd suggest actually calling PGP and getting verification that
the signature is valid (its internal checksum matches the contents of the
message signed) before giving the message any negative score.

And, since a spammer could then create a valid PGP key, create a spam,
sign the spam, and send it out, that score should be low, not very
strong. (Identical messages would trip other tests, as pointed out in
another message, but spammers apparently don't mind sending out 10 or 15
versions of the same message, hoping some will bypass tests others fail.)

The only strong negative would be for validated *and*identified* senders.

>> If we added the ability to include lines in local.cf or user_prefs
>> like 
>> > validpgp 0x38AA1D47
>> (a list of space-separated hex numbers), then THOSE specific
>> signatures could score strong negatives, similar to a whitelist. (I'd
>> like to see the ability for each user to set their score, perhaps with
>> a
>> > SCORE VALIDPGP -2.0
>> line in local.cf or user_prefs.

JM> Would you (or anyone else) really edit your config for each new
JM> correspondent who sends you a PGP-signed message?   I doubt it,
JM> I'm afraid.

No, I wouldn't edit for each and every new PGP correspondent. But I would
for my major ones, six or seven people from whom I always want to receive
messages without delay. If they send me messages no matter how spammy,
their PGP signature would let the message through, without my putting
them into a whitelist.

JM> For PGP/GPG to be useful as an unforgeable bonus-points mechanism, it
JM> needs key distribution.  We can no longer just say "it has *some*
JM> PGP signature" -- because spammers are actively forging them, cutting
JM> them from other mails, etc.   as far as I know the only way to really
JM> validate the sig is to (a) ensure the public key is on the keyring
JM> and (b) run pgp/gpg at that point.

The emphasis is to *really* validate the sig.  Just getting a checksum
(which can be done by using PGP without having the public key) is
sufficient to identify the great majority of bogus PGP signatures.

And yes, that should be only a small negative score.

I probably won't care about having the public key on a public keyring --
all I need is to know the hex codes of the few people I want to register
as "always valid" -- a whitelist which is harder for a spammer to work
through.

Bob Menschel

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQA/AwUBPvz+a5ebK8E4qh1HEQLjnQCePV75jMetUgmXWd8m9t4EZWO5k+0AoK5o
+yqhN3ALnZ8yJwsdkuzkIx/I
=9OT7
-----END PGP SIGNATURE-----




-------------------------------------------------------
This SF.Net email sponsored by: Free pre-built ASP.NET sites including
Data Reports, E-commerce, Portals, and Forums are available now.
Download today and enter to win an XBOX or Visual Studio .NET.
http://aspnet.click-url.com/go/psa00100006ave/direct;at.asp_061203_01/01
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to