debian/rules: Use `git' potty wrapper.
[qmail] / forgeries.7
CommitLineData
2117e02e
MW
1.TH forgeries 7
2.SH "NAME"
3forgeries \- how easy it is to forge mail
4.SH "SUMMARY"
5An electronic mail message can easily be forged.
6Almost everything in it,
7including the return address,
8is completely under the control of the sender.
9
10An electronic mail message can be manually traced to its origin
11if (1) all system administrators of intermediate machines
12are both cooperative and competent,
13(2) the sender did not break low-level TCP/IP security,
14and
15(3) all intermediate machines are secure.
16
17Users of
18.I cryptography
19can automatically ensure the integrity and secrecy
20of their mail messages, as long as
21the sending and receiving machines are secure.
22.SH "FORGERIES"
23Like postal mail,
24electronic mail can be created entirely at the whim of the sender.
25.BR From ,
26.BR Sender ,
27.BR Return-Path ,
28and
29.BR Message-ID
30can all contain whatever information the sender wants.
31
32For example, if you inject a message through
33.B sendmail
34or
35.B qmail-inject
36or
37.BR SMTP ,
38you can simply type in a
39.B From
40field.
41In fact,
42.B qmail-inject
43lets you set up
44.BR MAILUSER ,
45.BR MAILHOST ,
46and
47.B MAILNAME
48environment variables
49to produce your desired
50.B From
51field on every message.
52.SH "TRACING FORGERIES"
53Like postal mail,
54electronic mail is postmarked when it is sent.
55Each machine that receives an electronic mail message
56adds a
57.B Received
58line to the top.
59
60A modern
61.B Received
62line contains quite a bit of information.
63In conjunction with the machine's logs,
64it lets a competent system administrator
65determine where the machine received the message from,
66as long as the sender did not break low-level TCP/IP security
67or security on that machine.
68
69Large multi-user machines often come with inadequate logging software.
70Fortunately, a system administrator can easily obtain a copy of a
71931/1413/Ident/TAP server, such as
72.BR pidentd .
73Unfortunately,
212b6f5d 74some system administrators fail to do this,
2117e02e
MW
75and are thus unable to figure out which local user
76was responsible for generating a message.
77
78If all intermediate system administrators are competent,
79and the sender did not break machine security or low-level TCP/IP security,
80it is possible to trace a message backwards.
81Unfortunately, some traces are stymied by intermediate system
82administrators who are uncooperative or untrustworthy.
83.SH "CRYPTOGRAPHY"
84The sender of a mail message may place his message into a
85.I cryptographic
86envelope stamped with his seal.
87Strong cryptography guarantees that any two messages with the same seal
88were sent by the same cryptographic entity:
89perhaps a single person, perhaps a group of cooperating people,
90but in any case somebody who knows a secret originally held
91only by the creator of the seal.
92The seal is called a
93.I public key\fR.
94
95Unfortunately, the creator of the seal is often an insecure machine,
96or an untrustworthy central agency,
97but most of the time seals are kept secure.
98
99One popular cryptographic program is
100.BR pgp .
101.SH "SEE ALSO"
102pgp(1),
103identd(8),
104qmail-header(8)