Provided by: qmail_1.06-6.2~deb10u1build0.18.04.1_amd64 bug

NAME

       forgeries - how easy it is to forge mail

SUMMARY

       An  electronic  mail message can easily be forged.  Almost everything in it, including the
       return address, is completely under the control of the sender.

       An electronic mail message can be  manually  traced  to  its  origin  if  (1)  all  system
       administrators of intermediate machines are both cooperative and competent, (2) the sender
       did not break low-level TCP/IP security, and (3) all intermediate machines are secure.

       Users of cryptography can automatically ensure the integrity and  secrecy  of  their  mail
       messages, as long as the sending and receiving machines are secure.

FORGERIES

       Like  postal  mail,  electronic  mail  can  be created entirely at the whim of the sender.
       From, Sender, Return-Path, and Message-ID can all contain whatever information the  sender
       wants.

       For  example,  if  you  inject a message through sendmail or qmail-inject or SMTP, you can
       simply type in a From field.  In fact, qmail-inject lets you set  up  MAILUSER,  MAILHOST,
       and MAILNAME environment variables to produce your desired From field on every message.

TRACING FORGERIES

       Like  postal  mail,  electronic  mail  is  postmarked  when it is sent.  Each machine that
       receives an electronic mail message adds a Received line to the top.

       A modern Received line contains quite a bit  of  information.   In  conjunction  with  the
       machine's  logs,  it  lets  a  competent  system administrator determine where the machine
       received the message from, as long as the sender did not break low-level  TCP/IP  security
       or security on that machine.

       Large  multi-user  machines  often  come with inadequate logging software.  Fortunately, a
       system administrator can easily obtain a copy of  a  931/1413/Ident/TAP  server,  such  as
       pidentd.   Unfortunately,  some system administrators fail to do this, and are thus unable
       to figure out which local user was responsible for generating a message.

       If all intermediate system administrators are competent, and  the  sender  did  not  break
       machine  security  or  low-level  TCP/IP  security,  it  is  possible  to  trace a message
       backwards.  Unfortunately, some traces are stymied by intermediate  system  administrators
       who are uncooperative or untrustworthy.

CRYPTOGRAPHY

       The  sender  of a mail message may place his message into a cryptographic envelope stamped
       with his seal.  Strong cryptography guarantees that any two messages with  the  same  seal
       were  sent  by  the same cryptographic entity: perhaps a single person, perhaps a group of
       cooperating people, but in any case somebody who knows a secret originally  held  only  by
       the creator of the seal.  The seal is called a public key.

       Unfortunately,  the  creator of the seal is often an insecure machine, or an untrustworthy
       central agency, but most of the time seals are kept secure.

       One popular cryptographic program is pgp.

SEE ALSO

       pgp(1), identd(8), qmail-header(8)

                                                                                     forgeries(7)