Re: HTML email "bug", of sorts.

From: Bear Giles (bearat_private)
Date: Mon Aug 20 2001 - 14:33:26 PDT

  • Next message: Roman Drahtmueller: "Re: Multiple-Vendor-FTP-Vuln. (old?)"

    > On Sun, 19 Aug 2001, David F. Skoll wrote:
    > 
    > What I was more interested in finding out is how admins and people who
    > *are* technically adept can filter these types of things out on a massive
    > scale (on their mailservers, for example) *without* affecting the delivery
    > of legitimate mail.  
    
    Here's a simple solution if you can run your inbound mail (or web
    pages) through a filter.
    
    1) run them through a simple filter for image tags.  With regex,
    the pattern could be as simple as "<img ([^>]+)>", case insensitive.
    You might need to include some backslash quotes.
    
    For everything that matches, look for any height and width attributes
    for the image.  If it's 1, you have a web bug.  Even if it's 2-8 or so,
    it's probably still a web bug.
    
    Either comment it out or delete it.  The latter may be preferable
    if don't want to break scripts.
    
    Of course, this basic can also be used to knock out scripts,
    uuencoded HTML content (which I've also noticed recently - a lot of
    filters don't seem to bother checking for scripts or webbugs within
    a uuecoded HTML block, even though many readers will automatically
    unpack, load and execute them.)
    
    2) on a related note, if you see anything like 
    <img src="http://spammer.com/images/foo.gif?some-random-string-here">
    you can snip the "?some-random-string-here" part.  Their logs may
    still show your IP address, but they won't show a unique identifier
    string.
    
    3) if you want to be a bit more forceful, you could take the presence
    of a small image as presumptive proof that the message is spam and treat
    it as such.
    
    > The problems I see with this approach are:
    > 
    > 1) how do you determine what's legitimate HTML email and what isn't?  Can
    > pattern-matching of web bugs be as easy as "*.gif\?.*" or something
    > similar?
    
    It's impossible to be 100% certain, but you can certainly answer with
    broad strokes.  Is there ever a legitimate reason to use a 1x1 image?
    If not, what is the harm in deleting them immediately?
    
    > 2) where is this type of filter ethically the right thing to do?  on a
    > server at work?  (I would think "yes".)   What if you work at an ISP?  (I
    > would be less inclined to think "yes" if I might somehow be restricting
    > the experience of paying customers.)  
    
    What about an ISP that decides to filter executable attachments?
    Should the ISP offer an opt-out choice on that, or is it something
    where they can legitimately say that it's a matter of "public hygiene"?
    If the city can force homeowners to remove trash and mow tall grass
    that provides a haven to vermin, then it seems that an ISP could take
    similar actions again e-vermin like executable attachments or
    web bugs used to validate spam lists.
    
    --
    Bear Giles
    bgiles+bqtat_private
    



    This archive was generated by hypermail 2b30 : Mon Aug 20 2001 - 17:02:06 PDT