procmail
[Top] [All Lists]

Re: Bcc and it's pit falls

2003-07-01 11:07:35
At 13:57 2003-07-01 +0530, Shashank V. Kolhatkar did say:

How many of you would like to agree with me that 'BCC' getting deleted from "sendmail", an MTA, is a real head-ache for Email Administrators as they have to keep watch on Enterprise-data and its forwarding to others for "consideration"?

I don't follow what you're saying. As written, it looks like you're saying that sendmail IS removing BCC capability, and that this would be a headache (I would agree that it'd be a headache, but since no such change is happening with sendmail, so there's nothing to agree to). Are you saying that the SMTP protocol shouldn't allow for BCC? If that's what you're arguing, you need to spend more time evaluating how email is used by the rest of the world, rather than by your individual organization.

For one, I'd have absolutely ZERO interest in seeing a mailing-list message (such as on procmail) showing hundreds to thousands of email addresses in a cleartext To: or Cc: field. If I was on an outbound-only list (i.e. one which users do not post to), I'd be very annoyed to see my address out there available to every idiot who can't manage to keep viruses off of their machine, or who realizes that they can harvest spammable addresses simply by subscribing to a few large distribution lists.

If instead, you mean that because the email arrived RCPT to your address that sendmail should add it into the To:/Cc: headers of your message, that's just plain wrong - if the message wasn't addressed To: you, then it shouldn't be rewritten to appear that way. Further, if a message was received for multiple recipients at your domain, the MTA should not create a Bcc: header and dump all those addresses into it - that'd be stupid beyond belief, since BCC stands for *BLIND* Carbon Copy - it isn't very blind if it's exposing the (local) addresses the message was delivered to. There are MANY legitimate uses of BCC, ranging from security (sending a notice to someone, and a copy to someone else so that they're aware that the notice was sent), and privacy (similar, but the object is that each recipient needn't know the details of all the other recipients), to simple avoidance of autoreplies (vacation messages shouldn't be sent in response to messages which you are not a cleartext recipient of).

If you read the SMTP RFCs, you'll find that once a message is sent around via SMTP, the MTA doesn't look to the headers of the message for where it is being delivered to - the MTA uses the _envelope_ data.

Don't you think we all should request the "great people" who maintain sendmail/procmailrc

Procmail developmen has _NOTHING_ to do with sendmail. Further, procmail is an LDA, not an MTA, so if you're moaning about Bcc: not existing with all the local (or even remote, but that's not going to happen) recipients identified in it, then you shouldn't even be posting here, because procmail doesn't HAVE that information in the first place - that's all handled at the MTA level.

Incase any one of you have overcome this problem, I shall be grateful to you if you passon the methods to control thru 'bcc', what we call in today's world, "Industrial Espionage".

Methinks if you have industrial espionage within your organization, you need to tighten use of internet services and perform body cavity searches of employees on entering and exiting your facility (and even then, you can't do anything about what they have in their heads and then go send someone at home).

Screwing with email protocols IS NOT going to fix your problem.

All competent email administrators know that all the recipients of a message are logged in the mail logs (such as /etc/maillog. All competent email administrators, running worthwhile software also know that they can easily redirect specific external domains such that email cannot be sent to certain domains if you wish to block contact. This is a function of the MTA, not of procmail. HOWEVER, through simple configuration of your MTA, you cannot block users from sending mail directly to remote SMTP servers - do do that, you should properly configure a FIREWALL (and you should consider blocking all services from all stations, and enable only those which need to be enabled). It's a trivial matter for someone to transfer data to a remote host via a telnet/ssh session, ftp, or even via IRC or a yahoo/AOL/MSN "messenger" service, all of which will go unlogged by your MTA.

Please deal with your security problem in a sensible fashion, rather than suggesting that the rest of the world change to meet your needs.

[snip]
Why on earth did you quote this message for inclusion in your unrelated post?

---
 Sean B. Straw / Professional Software Engineering

 Procmail disclaimer: <http://www.professional.org/procmail/disclaimer.html>
 Please DO NOT carbon me on list replies.  I'll get my copy from the list.


_______________________________________________
procmail mailing list
procmail(_at_)lists(_dot_)RWTH-Aachen(_dot_)DE
http://MailMan.RWTH-Aachen.DE/mailman/listinfo/procmail

<Prev in Thread] Current Thread [Next in Thread>