On 12/6/2017 4:27 AM, Frido Otten wrote:
Yesterday I saw this message that a bug in mailclients allow sender
spoofing which bypasses SPF/DKIM/DMARC mechanisms. Maybe you've read
about it. More information about it here: https://www.mailsploit.com/index
I was thinking that there might be a possiblity to detect this in
spamassassin to protect our users against this. Something with the
newline character or null byte in the FROM header, but I'm not that
handy with it. Someone of you maybe already created a rule?
My understanding of it was from Jan-Pieter Cornet's post on the
MIMEDefang list. In short, it involves RFC2047 MIME encoding of headers
with control characters. The demo shows issues with Nul but that's not
the only control character.
Something like this:
header __KAM_MAILSPLOIT1 From =~ /[\0]/
describe __KAM_MAILSPLOIT1 RFC2047 Exploit
https://www.mailsploit.com/index
And a paired rules for \n looking for maxhits. Beyond that, what's a
good control character regex?
https://www.regular-expressions.info/nonprint.html tells me that it's
complicated so for now, we know null is a real world issue that causes
user visual issues.
Give me a few, I'm looking at this more.
Can anyone take a look if there are other mailsploit issues that should
have rules? I think it has good merit.
I can't seem to get their system to send me payloads. I'm Bcc'ing Sabri
Haddouche for his input.
Regards,
KAM
--
Kevin A. McGrail
Asst. Treasurer & VP Fundraising, Apache Software Foundation
Chair Emeritus Apache SpamAssassin Project