On Fri, 2011-03-18 at 20:58 -0700, jdow wrote:
> On 2011/03/18 19:08, Karsten Bräckelmann wrote:
> > Or, tell your users to *never* write down their password or any other
> > account details in mail -- by policy, violation warrants getting fired
> > next day.
> 
> Bingo, you've hit on an outgoing anti-phish filter trick. Filter

Unfortunately, no. That's not original work, someone else stated it
years ago.

> all email sent from any account on the system for, at the very
> least, the passwords to several critical accounts. (Run the words
> through the password hash and look for patches to root, admin group
> members, CEO, etc and specifically the sender's account.) Reflect
> messages containing a match to CEO, root, CIO, and the user with
> big nasty red words up front about sending passwords.
> 
> It's not fool proof. It will eat machine time in retail bulk lots.
> And it might drive a message home.

Hah! Yeah, I thought about that, though hashing any possible word in
mails (which might include spaces, thus needs to cover multi-words, too)
really would require quite a rack of beefy hardware.

> Other obvious information to be filtered would include SSNs. For
> privacy reasons filter for numbers that look like SSNs, reflect to
> user with a were you sure wrapper, and if the user responds yes send
> it out in the original format.

The SSN trick already has been included in ClamAV, I believe. And no, it
doesn't cover internationalization.


-- 
char *t="\10pse\0r\0dtu\0.@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4";
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;i<l;i++){ i%8? c<<=1:
(c=*++x); c&128 && (s+=h); if (!(h>>=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}

Reply via email to