Welcome to the home page of the Procmail Email Sanitizer.
The Sanitizer is a tool for preventing
attacks on your computer's security
via email messages. It has proven to be very effective against the
Microsoft Outlook email worms that have gotten so much attention in the
popular press and that have caused so much trouble.
The Sanitizer's intended audience is administrators of mail systems. It is not generally intended for end users, unless they administer their own mail systems rather then simply telling their mail program to retrieve messages from a mail server administered by someone else. If you are here because you've gotten a message saying that a piece of mail you sent has been rejected, or because the URL for this website appears in a piece of mail you've received, or because you're wondering why your email attachments are suddenly named DEFANGED, please read this introduction to the Sanitizer - it should answer your questions. Let me know if it doesn't. Please note that the sanitizer is NOT a traditional virus scanner. It does not rely on "signatures" to detect attacks and does not have the "window of vulnerability" problems that signature-based security always has; rather it lets you enforce policies like "email should not be scripted", and "macros in Microsoft Office document attachments should not access the Windows registry", and "email should not have Windows executable file attachments", and quarantines messages that violate those policies. |
Site Index:
This procmail ruleset is specifically designed to "sanitize" your email on the mail server, before your users even attempt to retrieve their messages. It is not intended for end users to install on their Windows desktop systems for personal protection.
The
current version of the html-trap.procmail ruleset is:
1.150
It is recommended you update your copy if your version is older, as bugfixes and filtering for newer exploits will have been added. See the history of changes for details. I am working on moving the mailing lists from spconnect.com to my hosted server. I have the archives up, but restoring mail access will take a bit longer. Thanks to Michael Ghens for his generous hosting of the lists for five years! An announce list for email security issues has been set up. It will primarily carry information on new exploits and updates of the sanitizer. To subscribe, send a message with the subject "subscribe" to esa-l-request@impsec.org. This is a strongly moderated list for announcements only, not general discussion. If you want to join the discussion mailing list, send a message with the subject "subscribe" to esd-l-request@impsec.org. This is a members-only list; to post to it you must join. There is also an archive of messages available. |
|
1.142 fixes a minor bug in 1.141 that makes zipfile filename matching too greedy.
1.141 now permits scanning of ZIP archive contents. NOTICE: if you do not explicitly specify a ZIPPED_EXECUTABLES policy file, the sanitizer will default to your POISONED_EXECUTABLES policy file for processing ZIP archive contents. This is probably more paranoid than you wish to be. See the Configuring the Sanitizer page for more details.
If you have downloaded and are using the 1.139 sanitizer, here is a patch to make it ignore the forged part of NovArg/MyDoom Received: headers and stop notifying nonexistent sender addresses about the attack. Please apply this patch to your sanitizer using the instructions below and help reduce the insane amount of traffic this monster is generating...[ HTTP Mirror 1 (US: WA) | HTTP Mirror 2 (US: FL) | HTTP Mirror 3 (EU: NO) | HTTP Mirror 4 (EU: NL) | HTTP Mirror 5 (AU) | HTTP Mirror 6 (AU) | HTTP Mirror 7 (US: WA) | FTP Mirror 1 (US: UT) ]
Installation instructions:
Copy the .diff file to the directory where your sanitizer lives and run the following commands:
cp html-trap.procmail html-trap.procmail.old patch < smarter-reply.diff
The 1.139 Sanitizer includes detection of Microsoft Office VBE buffer overflow attacks. See the EEye alert for more details.
SoBig.F rules for direct attacks and bounces are in the sample local-rules file now.
Please see the sample local-rules file for a rule that should detect and quarantine messages designed to attack the Sendmail header parsing remote-root bug. IMPORTANT: This rule will NOT protect the machine it is installed on. You must still update your sendmail. It may, however, protect vulnerable machines behind the machine it is running on, giving you time to update them.
If you are getting errors like "sendmail: illegal option -- U" see the configuration page for how to fix it.
If you are experiencing the "Dropped F" problem (where the
"F" in the leading "From" in the message is being
deleted), please note: this is a known problem in procmail. It may be fixed
in the current release, you may want to upgrade. The problem occurs when a
filter action returns an error. In that situation procmail may lose the
first byte of the message. MAKE SURE your log file has 622 permissions.
Also, here is a short rule that
will help clean it up, add it to the end of your
/etc/procmailrc
file.
(Planning for) development of the 2.0 sanitizer has begun. The planned feature list looks something like this:
I can be contacted at <jhardin@impsec.org> - you could also visit my home page.
Several people have asked me why I don't charge for this
package. I suppose this is primarily due to the fact that I don't
think anybody should be exposed to these attacks simply because they
don't want to or can't afford to buy something to protect themselves,
but it also has to do with the fact that I view this as an interesting
intellectual challenge, a way to gain recognition, and a way to give
back to the community.
However, if you feel like paying for receiving something of
value that has improved your life, then feel free to
visit my personal wish
list or
my Amazon wish
list, or send me a donation via PayPal and lament that
nobody's done TequilaPal yet.
http://www.impsec.org/email-tools/procmail-security.html
Helping OC out: gratuitous scientology link More linktivism: Rob Enderle