On Fri, 2010-09-24 at 19:40 -0500, Chris wrote:
> On Sat, 2010-09-25 at 01:07 +0200, Karsten Bräckelmann wrote:
> > Ham!?  PBL, SORBS DUL. Are you trying to use whitelisting to protect
> > outgoing messages? Shouldn't you be using authenticated SMTP instead?
> 
> No Karsten, this is incoming mail to my machine. I don't run a server,
> this is straight from my ISP, picked up with fetchmail and processed
> through procmail.

Yeah, I was wondering about that like shorty after I sent the message.
The "ham" got me confused, thinking it really was ham.

> > Oh, and... Do you DKIM sign mail before scanning it with SA?
> 
> No, as you can see here, my ISP adds the DKIM signature.
> 
> http://pastebin.com/LqVtvjgM

OK, wait. That sample is really an example showing the DKIM headers,
sent by *you*. Right? It's authenticated.

So, yeah, DKIM signing that one looks right.

Begs the question why the phish that started this thread has been DKIM
signed by your ISP, too. Seriously.

Hmm, from your original pastebin:

 Authentication-Results:  smtp03.embarq.synacor.com smtp.user=thewhedbees;
  auth=pass (LOGIN)
 Received: from [201.216.4.186] ([201.216.4.186:4248] helo=User) by
  mailrelay.embarq.synacor.com (envelope-from <al...@embarqmail.com>)
  (ecelerity 2.2.2.40 r(29895/29896)) with ESMTPA id DB/9E-17249-7F22B9C4;
  Thu, 23 Sep 2010 05:54:58 -0400

So, this ALSO was an authenticated submission? And that's why your ISP
signed it. Which would explain why it got whitelisted, no?

Yup, *that* is how you do targeted phishing! Don't send from an outside
machine, but crack an account or otherwise send from internal, trusted
sources. It will make your phish look much more legit.


-- 
char *t="\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4";
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;i<l;i++){ i%8? c<<=1:
(c=*++x); c&128 && (s+=h); if (!(h>>=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}

Reply via email to