Re: HTML email "bug", of sorts.

From: Curt Sampson (cjsat_private)
Date: Tue Aug 21 2001 - 01:33:43 PDT

  • Next message: 3APA3A: "Re: Lotus Domino DoS"

    On Mon, 20 Aug 2001, Bear Giles wrote:
    
    > For everything that matches, look for any height and width attributes
    > for the image.  If it's 1, you have a web bug.  Even if it's 2-8 or so,
    > it's probably still a web bug.
    > ...
    > 2) on a related note, if you see anything like
    > <img src="http://spammer.com/images/foo.gif?some-random-string-here">
    > you can snip the "?some-random-string-here" part.  Their logs may
    
    Nah. My first thought, when asked about the technical details of e-mail
    bugs at a certain company whose name I won't mention to protect the
    guilty, was, "How do we make sure it doesn't look like a bug?"
    
    So you insert this:
    
    <img src="http://www.example.com/imgs/18465485943/foo.gif" width=400 height=90>
    
    as your company logo in the newsletter or whatever you're sending out.
    
    That invokes a servlet or whatever called /imgs which looks at the
    remainder of the path as a parameter, logs a hit from 18465485943 in
    your database (we would have associated this with a particular piece of
    mail that went out) and returns your company logo. You make sure that
    the header specifies that it expires instantly, of course, so you get
    information that the message has been forwarded or re-read or whatever.
    
    I really don't see any way to protect against these bugs, except not
    to retrieve external images. And that, as others have mentioned, is not
    likely to go over so well with a lot of users out there.
    
    cjs
    -- 
    Curt Sampson  <cjsat_private>   +81 3 5778 0123   http://www.netbsd.org
        Don't you know, in this new Dark Age, we're all light.  --XTC
    



    This archive was generated by hypermail 2b30 : Tue Aug 21 2001 - 10:09:57 PDT