[plug] email message formats

Christian christian at amnet.net.au
Sun Dec 24 11:48:42 WST 2000


On Sun, Dec 24, 2000 at 10:04:02AM +0800, Bret Busby wrote:
 
> Warnings have been broadcast, about browsers that wiew attachments
> inline, automatically running executable files that are included as
> inline attachments, and, similarly, the executable files being run, when
> clicked on. Transmission of viruses, etc...

Executable files?  If your browser will execute any sort of program
(with Java being a possible exception) then you have a real problem that
has nothing to do with viewing attachments inline.  For memory one of
the questions in the Web Security FAQ is "Should I set up /bin/csh as
the helper application for the MIME type for C-shell scripts?"  The
answer is obviously an emphatic "no".  I really don't think Netscape
under Linux will execute any sort of program (except JavaScript if you
have this switched on for mail messages -- which you shouldn't have)
unless it is specifically configured that way.

 
> I took your advice, and, enabled cookies to visit the Amway site (and,
> only that site). Only problem is that, when I have visited the site,
> since I made that decision, their server has been down on each occasion.
> Hmmm...

I never advised you to do that.  I only said I didn't think you had much
to be worried about.

 
> Sorry; wrong, Christian. If I get an inline attachment, I only click on
> it, if it is in an email from one of a select few people.

Do you only ever browse web sites from those select few people?
Netscape won't do anything magical with attachments in a mail message
that it won't also do with objects on a web page.

> > Seems like a small degree of
> > protection to me.
> 
> Every small measure helps, does it not? A stone wall is made up of many
> small stones, and, a fort is built out of many small rocks...

Absolutely.  But since there is virtually no difference in risk in
automatically opening inline attachments and browsing the web, I don't
see how I can say that one is reasonably safe and one is not.  If there
is a difference I'm not aware of then someone please point it out!

 
> I believe, from memory, that warnings have been posted, by CERT, or
> someone, about inline attachments, which are disguised, and which
> contain mailicious code.

It may be different in Internet Explorer.  I have a feeling it is but I
wouldn't know.

 
> If a cookie can identify a visitor to a website, and, result in the
> visitor being sent unsolicited email from various sources, one of which
> emails happens to contain malicious code, is that not a security
> violation?
> 

The cookie will not result in you getting spammed.  You obviously have
NO idea how cookies work.



More information about the plug mailing list