home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!spool.mu.edu!agate!usenet.ins.cwru.edu!ncoast!prism1!dmw
- From: dmw@prism1.UUCP (David Wright)
- Newsgroups: comp.unix.admin
- Subject: Re: How to write a "turnin" utility??
- Message-ID: <83@prism1.UUCP>
- Date: 30 Dec 92 13:47:24 GMT
- References: <0291H&pdqb@atlantis.psu.edu> <Dec29.212116.55124@yuma.ACNS.ColoState.EDU> <l0b1Hz+mqb@atlantis.psu.edu>
- Organization: Prism Computer Applications, Inc.
- Lines: 41
-
- In article <l0b1Hz+mqb@atlantis.psu.edu> barr@pop.psu.edu (David Barr) writes:
- >In article <Dec29.212116.55124@yuma.ACNS.ColoState.EDU> dan@lamar.ColoState.EDU (Danilo Silva) writes:
- >>What do you mean by e-mail being trivially spoofed??
- > Exactly that. The majority of implementations of mail on UNIX platforms
- >have no authentication whatsoever. What's more it is trivially possible
- >to forge mail such that it appears to come from anyone at all.
- > Taking the Internet RFC-822+SMTP mail specification and transport system
- >as an example, you'd need some kind of two-way public-key encryption in order
- >to start calling it truely "secure".
- > If you really want to learn how, just read up on RFC 822 and RFC 821.
-
-
- But what I think the original poster meant by "secure" was NOT that
- other people could see/intercept it, but rather that it was not possible to
- damage the system (as would be possible with a set UID shell script). I would
- agree that "normal" email is not secure, but there are things you could do.
- First, the "Elm" mail system allows you to encrypt portions of the
- letters, and the recipient must know the key to read them. Of course, unless
- the teacher had seperate keys for each student to use, there are again
- ways for other people to get at/change the info.
- Next, there are freely distributable DES filters that could be used
- to encrypt the data, though again with the same problems as with the "Elm"
- solution.
- As you said, a public key system would really be required to make
- sure that the data was the real thing, maybe with internal/external MD4
- signatures as well.
- But how would email be spoofed in the situation that was being
- asked about? You have to assume that this is on a University somewhere, and
- that students are NOT going to have admin/root abilities. I would sincerely
- DOUBT that any University would route mail through off-site systems, and
- so no "normal" user would ever be able to create/change aliases that would
- give them the ability to intercept the mail at all. Or is there something I
- have missed?
-
- Dave
-
- --
- ____________________________________________________________________________
- | /\ / | Prism Computer Applications | David Wright |
- | -/--\-- | 14650 Detroit Ave, Suite LL40 | dmw@Prism1.COM |
- | /____\ | Lakewood, OH 44107 USA | 216-228-1400 |
-