Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security

To Allow or Not Allow E-Mail Attachments? 197

t0pper311 asks: "I work for a pretty large utility company in the midwest and of course, security is a big concern. We use Trend Micro as a mail gateway to basically scan for virii and strip off most attachments like executables or VB script. Now with the Sobig.E virus on the loose, we need to ask ourselves if we should be blocking ZIP files. We got lucky this time and were not effected, but what about next time? What are other companies doing? If you do block ZIP files, how do you give the people who need to sends files the ability to do so? Do you allow any attachments at all?"
This discussion has been archived. No new comments can be posted.

To Allow or Not Allow E-Mail Attachments?

Comments Filter:
  • by Anonymous Coward on Thursday July 03, 2003 @11:24PM (#6364754)
    Pretty simple really.

    Given that most users love to download crap via hotmail etc. , lets hope you have a virus scanner on their PC too.
    • by Matts ( 1628 ) on Friday July 04, 2003 @07:48AM (#6366314) Homepage
      Sobig.E came out before the virus scanners had signature updates. When viruses spread so fast these days about all you can do is push your email through MessageLabs [messagelabs.com] who have never let a virus through to a customer due to their custom AV scanner which uses heuristics instead of signatures.

      Your point about not relying on any one point of access is well taken though - all entry points need to be protected in one way or another.
    • by Jucius Maximus ( 229128 ) on Friday July 04, 2003 @09:48AM (#6366766) Journal
      "Given that most users love to download crap via hotmail etc. , lets hope you have a virus scanner on their PC too."

      That is true. At one company I worked (with several thousand employees) there was an virus outbreak every one or two weeks on the corporate network.

      This reduced to once or twice per year after they blocked off hotmail, yahoo mail, lycos mail, ICQ, AIM, etc. And really, if you are smary enough to get around this an use a small webmail provider then you're smart enough to not download a virus as well.

    • by Safety Cap ( 253500 ) on Sunday July 06, 2003 @11:20PM (#6380684) Homepage Journal
      The problem with ZFSs is that they can be broken easily. Here's one way to do it:
      1. Create a 67 meg ASCII file with nothing but a single repeating character. Here's an three line command-line (DOS) batch file to do it:
        echo aaaaa > punkd.txt

        for /l %%b in (0,1,11) do copy /y punkd.txt + punkd.txt punkd1.txt && copy /y punkd1.txt + punkd1.txt punkd.txt

        del punkd.txt
        (note that the second line is long and may wrap on your display)
      2. Run the batch and copy off "punkd1.txt" to another name.
      3. Make several copies of the file.
      4. Zip them all into your "package 'o death." Due to the simple structure of the file, it will zip down quite a bit (close to 99%) if you use maximum compression.
      5. Deliver the package to your victim.
      When the ZFS tries to unpack the files to scan them, it blows its swap space.
  • OS (Score:3, Insightful)

    by Johnny Mnemonic ( 176043 ) <mdinsmore&gmail,com> on Thursday July 03, 2003 @11:29PM (#6364778) Homepage Journal

    Why do you make so many accommodations for the failures of the OS? Isn't the OS supposed to work for you, instead of you working for it? How many features do you have to shut off before it's not worth the considerable cash you paid for it?
    • Re:OS (Score:5, Interesting)

      by sql*kitten ( 1359 ) * on Friday July 04, 2003 @06:26AM (#6366113)
      Why do you make so many accommodations for the failures of the OS? Isn't the OS supposed to work for you, instead of you working for it? How many features do you have to shut off before it's not worth the considerable cash you paid for it?

      Clearly you lack an understanding of the issue. This is nothing to do with OS. The issue is one of users running executables they are sent via email. If (insert your favourite Linux email package here) allowed a user to double-click an attached .sh file, then the problem would also exist on Linux.

      Outlook was designed to be scripted so you could use it to build your own workflow . If you don't need this feature, switch it off! Complaining about exposed but unused functionality being abused is that same as complaining that it's Linux's fault of all the daemons are started at boot and someone roots you though BIND.
      • Re:OS (Score:4, Interesting)

        by Zork the Almighty ( 599344 ) on Friday July 04, 2003 @07:36AM (#6366290) Journal
        Don't files on Linux default to non-executable ? Your point is well taken though. And I would say it's the Linux distro's fault if it enabled all these useless services by default and left me vunerable.
      • Re:OS (Score:4, Interesting)

        by alangmead ( 109702 ) on Friday July 04, 2003 @10:38PM (#6370516)

        The part where the OS gets involved is when it uses the same mechanism to associate documents with their application as they do interpreted code with their interpreter.

        MIME has a Content-Type mechanism to describe data. In the original MIME specification [ietf.org] the authors stated

        The "application" Content-Type is to be used for data which do not fit in any of the other categories, and particularly for data to be processed by mail-based uses of application programs. This is information which must be processed by an application before it is viewable or usable to a user. Expected uses for Content-Type application include mail- based file transfer, spreadsheets, data for mail-based scheduling systems, and languages for "active" (computational) email. (The latter, in particular, can pose security problems which should be understood by implementors, and are considered in detail in the discussion of the application/PostScript content-type.)
        and
        Security considerations: This type is intended for the transmission of data to be interpreted by locally-installed programs. If used, for example, to transmit executable binary programs or programs in general-purpose interpreted languages, such as LISP programs or shell scripts, severe security problems could result. In general, authors of mail-reading agents are cautioned against giving their systems the power to execute mail-based application data without carefully considering the security implications. While it is certainly possible to define safe application formats and even safe interpreters for unsafe formats, each interpreter should be evaluated separately for possible security problems.

        Just because the designers of outlook essentially ignored the data description features of MIME didn't mean they had to ignore the warnings of the dangers of executable content. There is no reason why a mail reader should associate a .sh file, or an application/x-shell-script file with a general purpose interpreter, and the people who invented MIME knew this and warned about it.

        There is no good reason for a mail program to run hand executable content off to the OS or an interpreter.

  • by Muggins the Mad ( 27719 ) on Thursday July 03, 2003 @11:29PM (#6364780)
    If you do block ZIP files, how do you give the people who need to sends files the ability to do so?

    I think if people insist on running software that is vulnerable to these kinds of attacks then yes, you do need to stop these people using attachments completely.

    If we do need to send files to each other as part of our business then surely that's a major feature that our application environment needs. If our chosen solution doesn't let us do that without an enormous amount of hassle and risk, then maybe it's time to make other tradeoffs and choose a client that does.

    And if we have to choose between an email client with nice scheduling/calendaring and one that lets us receive file attachments safely, then that's a *decision* that must be made based on business needs. Which is more important to your task? Is there a way to have both? Will we accept the risk and hassle of virii to get nice calendaring, or will we use clumsier calendaring and have safe file attachments?

    Only when people start making these conscious decisions en masse will we start seeing applications (including OS/hardware/whatever) that provide all the features we need to do our jobs.

    The current climate of "how do we shore up the inadequacies of our chosen software?" isn't helping things improve.

    Nice calendering *or* safe file attachments. Choose. If someone offers a product that does both. Cool. We all win.

    - Muggins the Mad

    • by GypC ( 7592 ) on Thursday July 03, 2003 @11:35PM (#6364809) Homepage Journal

      From what I can gather from the virus information, it's not an Outlook virus. It's a Windows virus that propogates through its own SMTP routines, harvesting email addresses from a variety of local files. In Outlook it requires the user to extract the executable and run it, just like any other mail client.

    • by joto ( 134244 ) on Thursday July 03, 2003 @11:42PM (#6364837)
      I think if people insist on running software that is vulnerable to these kinds of attacks

      Actually, the virus he talks about only works through social engineering. You have to manually open the zip file and click the .exe file.

      • by Muggins the Mad ( 27719 ) on Thursday July 03, 2003 @11:54PM (#6364877)
        Actually, the virus he talks about only works through social engineering. You have to manually open the zip file and click the .exe file.

        Ok, to bring another level to it. Why is running an unknown executable dangerous?

        It's pretty safe running unknown Java Applets in our browsers these days, barring the occasional VM bug. Why can't we run random executables without worrying that they'll delete everything/spam/etc.

        Why the assumption that running a random executable is dangerous?

        - Muggins the Mad
        • Set up a sandbox. (Score:4, Insightful)

          by Flying-Cow-Man ( 686404 ) on Friday July 04, 2003 @12:16AM (#6364955)
          This is an important point. Why should running an executable be dangerous at all? is it really that difficult to set up a sandbox (a la the JVM) for users to run untrusted executables in? There may be some more hassle involved, but it could be implemented fairly transparently.
          • Re:Set up a sandbox. (Score:3, Interesting)

            by GiMP ( 10923 )
            Yeah, it is called Unix.. Run it as a non-root user. The worst that happens is that that user's data is stolen or deleted (credit card numbers, etc)
            • by Flying-Cow-Man ( 686404 ) on Friday July 04, 2003 @01:41AM (#6365221)
              This would only protect other users from the effects of an executable. I'm not sure about you, but I consider my home directory to be far more valuable then the rest of the installation, which I could easily recreate within an hour.

              A good VM would allow you to interact in a useful way with the application, without allowing it unauthorised access to your data.

              A quick (though cumbersome) workaround would be to have another account on the machine within which any untrusted apps may be tested first. Though awkward, it does prove the concept.
              • Re:Set up a sandbox. (Score:5, Informative)

                by moncyb ( 456490 ) on Friday July 04, 2003 @02:40AM (#6365466) Journal

                The chroot command should help.

                • Am I the only one in this thread who's noticed that the orginal poster asked for advice working on the basis that they're using Outlook.

                  Last I checked, typing chroot into a command prompt on a Windows box resulted in a blank stare.
                  • Perhaps you're the only one which didn't notice GiMP telling the poster to get an operating system with real security. For the most part, the sandbox the poster was talking about can easily be implemented with common commands. Commands which set kernel enforcement of security procedures. They have been operational in various systems before Microsoft had ever heard of security. I was securing my Linux box while Win98 would allow any user or any program (including a virus) to do any nasty thing with the syste

              • Put /home on a separate partition and mount it with noexec.
            • Yeah, it is called Unix.. Run it as a non-root user. The worst that happens is that that user's data is stolen or deleted (credit card numbers, etc)

              So, even better, run it as a non-root user that has no permissions and no files, similar to the way most Internet-accessible daemons are run. Oh, and do it in a chroot jail in a temp directory that gets cleaned out after the execution.

              Not a perfectly secure solution, since it would still be possible to write a worm that exploits some local holes to break o

          • Re:Set up a sandbox. (Score:4, Interesting)

            by dfgdfgdfg ( 577386 ) on Friday July 04, 2003 @03:44AM (#6365692)
            This is an important point. Why should running an executable be dangerous at all? is it really that difficult to set up a sandbox (a la the JVM) for users to run untrusted executables in? There may be some more hassle involved, but it could be implemented fairly transparently.

            Exactly! Files that are executed should always be executed in a sandbox, except if the reside in "/usr/bin" or other system directories. If the common file managers/ email client did that, there would be no problem sending exes per mail.

            Someone should implement the following: A program "nobody" that executes a command line and traps all system calls. When the child process does a system call, it asks the user e.g. "The program wants to open a connection to c32x.com. Allow?". If the user answers "No", the system call just returns -1. You could invoke it just like "nice" or "nohup". That should solve the email-attachment problem. Programs like "strace" already trap system calls, so this must be possible.

          • You sound like someone pimping Palladium. Do you work for Microsoft?

        • Wow, you guys really don't know?

          Windows allows executables to work on any file. And Windows scripting allows scripts and exes to find

          Look, security has been afterthought with MS every time. NTFS is a little more protected but not much.

          Look up permissions on Unix and even AmigaOS (which had 32-bit preemptive multitasking 10 years before win95 and almost 20 years before MacOS X).
          • Look, security has been afterthought with MS every time. NTFS is a little more protected but not much.

            Look up permissions on Unix and even AmigaOS (which had 32-bit preemptive multitasking 10 years before win95 and almost 20 years before MacOS X).

            Unfortunately UNIX permissions are still woefully out of date. It doesn't really matter these days that malware can't reformat your drive. It can still send all your files out on the 'net, send a couple of million spam, and delete all your work.

            Sun, bless t

        • Welcome to .NET - I know I'll be flamed, but this is what Microsoft's new technology is about: bringing Java-like security to every application (Microsoft calls it "Managed" code).
          • by Muggins the Mad ( 27719 ) on Friday July 04, 2003 @03:54AM (#6365739)
            Welcome to .NET - I know I'll be flamed, but this is what Microsoft's new technology is about

            Yes, and god forbid they actually get it right. The free software world needs to snap out of it's smug "UNIX is secure" stance and do something to bring it into this millenium. I want to run executables from random places. As part of my job I actually need to. I don't currently have an OS where I can do that. I would hate for the first one that lets me to be from MS.

            - Muggins the Mad

        • by joto ( 134244 ) on Friday July 04, 2003 @06:56AM (#6366198)
          Ok, to bring another level to it. Why is running an unknown executable dangerous?

          Because at some point, you need something that actually uses raw machine code, unless you want a very limited system. Not having this option, and having to run everything through a VM is not a very good option from either a performance or functionality standpoint.

          I'm not saying I'm againt secure byte-code interpreted environments, such as Java. Actually, I am all for it, but sometimes you need to do things a bit more low-level than the Java API allows, and that means you'll have to allow executables.

          Still, there is a lot that could potentially be done to limit the harm you can do with executables. You can sandbox them in various ways, from intercepting system-calls and let some access-level checker see if you have the right privileges (sometimes called capabilities), to running in a different VM (such as user-space linux), to full emulation (bochs). Whether such security measures should be on by default, and only "trusted" executables should be allowed to do what they do now, or special actions needs to be performed by users to run "untrusted" ones is of course up to debate.

          My point is that the problem is only halfways technical. Adding additional security measures can never protect stupid users from doing stupid things. If the e-mail had said: "this app needs to be 'trusted' before you run it, please enable that before clicking on it", you can be sure some users would do that.

          The problem, if anything, is more of a cultural issue than a technical one. In windows, users have become accustomed to run random binaries from unknown sources, and the environment has as a result been set up to make it easy. Under unix, you would generally be skeptical of running a binary from someone you don't know or trust, and the environment has generally been set up to make it somewhat harder. Unfortunately, the trend seems to go in windows direction (even on unix). End-users are rarely supportive of security features that make their job harder, even if it is more secure.

          Running an unknown executable is always a bad idea. People need to be trained to only open safe file-types they get from untrusted sources.

          • Ok, to bring another level to it. Why is running an unknown executable dangerous?

            Because at some point, you need something that actually uses raw machine code, unless you want a very limited system. Not having this option, and having to run everything through a VM is not a very good option from either a performance or functionality standpoint.

            There's no reason raw machine code needs to be dangerous at all. Modern computers (even PCs) have decent memory protection that'll stop user programs from havi

            • There's no reason raw machine code needs to be dangerous at all. Modern computers (even PCs) have decent memory protection that'll stop user programs from having direct access to hardware and force them to go through the OS.

              Yes, this was the first option I mentioned.

              The OS can decide what the user program is allowed to do. Whether it's opening network connections, allocating more memory, writing to screen or file, it *already* goes through the OS anyway. So it's not much of a step to put a few security

        • "It's pretty safe running unknown Java Applets in our browsers these days, barring the occasional VM bug. Why can't we run random executables without worrying that they'll delete everything/spam/etc."

          Because Java stuff runs in a sandbox. If you are logged in as Administrator and run a java applet in your browser, it can only wreak havoc if you give it permission or it exploits a bug that you forgot to patch.

          If you run a random .exe file as Administrator, it doesn't need permission from you to hose the

        • Why can't we run random executables without worrying that they'll delete everything/spam/etc.

          For precisely the same reasons as why should walking down the street minding your own business be dangerous? Many attacks and muggings however are carried out daily against people for doing just this.
        • Why can't we run random executables without worrying that they'll delete everything/spam/etc.

          Because the OS has no way of knowing whether the random executable trying to format the hard disk has been run accidentally or deliberately.

        • Ok, to bring another level to it. Why is running an unknown executable dangerous?

          It's pretty safe running unknown Java Applets in our browsers these days, barring the occasional VM bug. Why can't we run random executables without worrying that they'll delete everything/spam/etc.

          Why the assumption that running a random executable is dangerous?


          Defining what an app is allowed to do is pretty tricky. That's especially true if you want to be able to bubble up decisions to the user.

          Suppose that somebody send
    • Everyone is vulnerable to evil attachments -- just look at this [securityfocus.com] from earlier in the week. As you suggest having to open the attachment to execute any evil payload is of course much better than having it execute on previewing, since most bad things are sent by unknowns or by a spoofed contact with obviously fake covering notes.

      Kmail has a good balance between previewing content and safety IMHO, but then I am happy to see raw HTML by default.
    • From a business standpoint, this is a potentially disasterous attitude. Observe:

      1. Outbreak of viruses. Admin makes decision to block file attatchments.

      2. M&A activity occurs two months later. CEO requests data from investment banker, who sends it in ZIP file.

      3. File attatchment is blocked. Confusion insues.

      BEST CASE: CEO finally gets file w/trickery and support from IS, and asks feature to be turned back on, or supported for limited group.

      WORST CASE: Bad Things happen as a result of delay, and mer
  • Why (Score:3, Informative)

    by Zerth ( 26112 ) on Thursday July 03, 2003 @11:29PM (#6364784)
    would one have to block zip files? just scan the contents of the zip files for the virus, all of which have been stuff like .pif or other windows-ish things.
    • Re:Why (Score:5, Interesting)

      by jshare ( 6557 ) on Friday July 04, 2003 @01:51AM (#6365264) Homepage
      Well, you can run into trouble if you try to scan this [krotus.com] zip file.

      I forget the exact stats, but it decompresses out about 7 levels deep, 16 files per level, and 4gig files at the last level. So, that's a lot of unzipping your virusscanner would be doing.

      Granted, you could probably give it a checksum for this file in particular, but there are always variations on the theme.

      • Re:Why (Score:4, Insightful)

        by crisco ( 4669 ) on Friday July 04, 2003 @02:15AM (#6365387) Homepage
        so basically that could be used as a DOS against someone running a virus scanner on the email gateway?

        evil

        Are all of the virus scanners going to recursively extract all those zip files?

        • by crisco ( 4669 )
          to answer my question, at least on the client, the free version of AVG on Windows sure does, while it hasn't as yet extracted a 4GB file it sure is taking its sweet time making its way through the file.
          • My NAI scanner caught it instantly as it finished downloading on my Mozilla.

            Strangely fast.
            • by jshare ( 6557 )
              I think this file (I forget where I found it) is one of the canonical ones of this type. So, your scanner may have a specific rule for exactly this file.

        • Some mail scanners are too smart to fall for that one. (Usually they limit the size that an archive is allowed to expand to)
      • "Well, you can run into trouble if you try to scan this [krotus.com] zip file. I forget the exact stats, but it decompresses out about 7 levels deep, 16 files per level, and 4gig files at the last level. So, that's a lot of unzipping your virusscanner would be doing."

        If you're on a network where someone (other than you) gets an alert if your virus scanner detects something, *do not* download that file because it is identified as a 'zipcrash' trojan.

      • how did you make that file? I'm mostly confused as to how you convinced winrar that a small rar has multiple 4GB files inside it. I'm sure its something obvious but please explain anyways
        • Well, I didn't make it, but if you look at it, you'll see that the 4Gig files are compressed into something not very small. Then, 16 of them are compressed into another file that is slightly smaller. And so on, and so on.

          I think the 4gig files are actually just 4gigs of Nulls, so that's obviously very compressible.

  • Or... (Score:3, Interesting)

    by BrokenHalo ( 565198 ) on Thursday July 03, 2003 @11:31PM (#6364790)
    You could just let everyone catch every virus going for a few months, then offer them a real computer that doesn't get viruses. I wonder how many people would get the message.
    • Re:Or... (Score:3, Insightful)

      by bellings ( 137948 )
      That sounds cool. Can you recommend a computer that wont get email trojans? An XBox, or perhaps an old Atari 2600?
      • Can you recommend a computer that wont get email trojans?

        Yes, of course I can.

        And the fact that you're posting in this forum at all should indicate that you are (or should be) just as aware as I am as to what those OSs are.

        • There is nothing stopping linux getting e-mail trogans. There is nothing stopping such a program emailing lots of people from your pine / mozilla / whatever address book, then deleting all the files in your user space. For single users linux isn't really any better than windows from a virus point of view...
  • by NeuralNet03 ( 650974 ) on Thursday July 03, 2003 @11:33PM (#6364794) Journal
    I think that if a user opens an attachment from a random source, that came with no explanation, with a funky name like the ones in the write-up (see article link), then that's their own fault.

    Filtering out legitimate attachments is not very good policy to protect against virii. You'd be -much- better off spending a few minutes educating employees in a "Virus Prevention" seminar or something. Show them that opening emails like that is not intelligent, and that way, it's not as much of a problem.
    • Filtering out legitimate attachments is not very good policy to protect against virii. You'd be -much- better off spending a few minutes educating employees in a "Virus Prevention" seminar or something. Show them that opening emails like that is not intelligent, and that way, it's not as much of a problem.

      Picture this;
      User receives attachments from a colleage sometimes as often as a dozen times a day. An e-mail comes in from this user with an attachment described breifly as "The file we discussed earli

      • Maybe I don't understand this problem in detail, but I thought the rationale for blocking attachments was either the real file type displayed was hidden or that the user doesn't know a specific attachment is an executable.

        Why don't Microsoft display all attachments that would be executed in a unique way or have a dialog come up confirming execution? Or display the whole filename and not hide any file types?

        I agree: new Outlook Express default policy is even more brain dead. One cannot even download and sa
        • I agree: new Outlook Express default policy is even more brain dead. One cannot even download and save attachments unless this virus option is turned off.
          I double agree. There's a little trick that you can use to get OE to download/save attachments. First, open the message that has the attachments. Then click on Forward. Then you can save the attachments to your heart's content. Little bit of a workaround, but still manageable.
  • by Smartcowboy ( 679871 ) on Thursday July 03, 2003 @11:38PM (#6364816)
    10 years ago, on BBS (bulletin board system), every time someone uploaded something, the system automatically unpacked the { zip | rar | arj } on a temp directory. Then the content of the archive were automatically checked for virii with *MANY* anti-virus like MacAfee, FProt and MSAV (if the BBS were DOS-based). If the archive passed the test, it was made available to download by other user. Then, the temp directory was cleaned.
    • They were lucky... (Score:5, Interesting)

      by Dthoma ( 593797 ) on Friday July 04, 2003 @04:42PM (#6369006) Journal
      ...that no one uploaded a zip bomb. For the uninitiated, that's where you make a huge file or series of files containing nothing but a single character (e.g. a null character) repeated millions/billions of times over and then compressed. Since such perfectly repetitive data compresses so well, it's easy to upload the resulting small file (on the order of a few dozen kilobytes) and wait for the server to get thrown off unzipping it.
  • by Red Pointy Tail ( 127601 ) on Thursday July 03, 2003 @11:39PM (#6364824)
    ...as the .zip files are not evil per se - SoBig threat applies for those who execute the malicious files within the zips. All you need is to get a decent enough e-mail virus scanner that scans *inside* the zip files, and through multiple layers of zips if necessary, to weed out the malicious files.
    • Actually, they're all potentially incompatible so I'd recommend rejecting all attachments.

      I've set up mailing lists which contain large numbers of non-expert users so I set an automated rejection + message of anything with incoming attachments. This not only stops the MSTDs dead, but also makes the size of the archive smaller, and allows the archive to be fully searchable. From the user side, it eliminates crowded inboxes (many web-mail clients have small limits) and, for the novices, it eliminates the

  • Better Scanner... (Score:3, Interesting)

    by NetJunkie ( 56134 ) <jason.nashNO@SPAMgmail.com> on Thursday July 03, 2003 @11:41PM (#6364830)
    Get a better scanner. I can't recommend Sybari's Antigen enough. It uses multiple virus scanner engines and has great filter support. It also opens up archive files and scans inside of them.

  • by MightyTribble ( 126109 ) on Thursday July 03, 2003 @11:44PM (#6364841)
    We use Symantec for Microsoft Exchange. It'll scan and clean files within zip files. SoBig.E has not been a problem for us (aside from the fact that we're running MS Exchange, of course).

    That said, I was surprised to find one of the largest employers in MA doesn't have *any* AV protection on their Exchange servers, and had quite a bit of downtime as a result. So I guess AV on mail servers aren't as commonsensical as I thought... ;-p

    Running Exchange is bad enough, but do-able. To run Exchange *without* decent, up-to-date AV software is just incompetent.
  • by Feztaa ( 633745 ) on Thursday July 03, 2003 @11:51PM (#6364867) Homepage
    IMHO, email is not a file transfer medium; sure you can send little things with it, but it's just not useful for any real kinds of file transfer.

    Personally, I think you should set up an FTP that is open anonymously to everybody in your company, and then disable attachments so that people have to upload to the ftp, then email the link around.
    • IMHO, email is not a file transfer medium; sure you can send little things with it, but it's just not useful for any real kinds of file transfer.

      The problem in this case is that some viruses don't actually need email to propogate. This particular one just needs someone to open it and run it. Doesn't matter if it came in via FTP, Email, or Kazaa.

      - Muggins the Mad
    • by klui ( 457783 )
      You'd need to retrain everyone who use email to stop using attachments. This won't happen, since they've already tasted attachments' convenience. There are those who are so clueless that they would blindly send 10MB worth of shit uncompressed to an entire company's distribution list without a second thought. The sad thing is they don't realize: sending 10MB is bad in the first place; broadcasting to everyone in a company is not efficient (you'd eventually get bozos replying "Please don't give me this file!!
      • I like winzip for this - right click on blah.doc , select "winzip" select "zip and email blah.zip".

        Three clicks - and an you end up with an open blank email message with your file attached. groovy.
      • sending MS Word/Excel/what-have-you uncompressed is wasteful.

        That's exactly what I was getting at. Email isn't designed for file transfer, it's designed for sending short ASCII text messages :)
    • The only problem with anonymous FTP is when the security auditors (provided by the same folks that do the financial audits, mind you) give you a "Management Comment" that anonymous FTP is a security risk. And they don't want to hear from no chroot jail or any "technical mumbo-jumbo" like that. It says right in their audit checklist that anonymous FTP is bad.
      • Gotta love the beurocrats.

        In that case, set up something similar, except with a different protocol (bittorrent? Less practical for small files. maybe just SMB or NFS or something).
  • What if (Score:2, Interesting)

    by altp ( 108775 ) *
    what if you choose to block email attachments completely, could you set up a respository on a computer. Have people drop attachments there, and as they finish their uploads scan them for viruses before making them visable for people to download. People could log in with their email addresses (on your side), and there could be guest accounts generated for people on the outside to get files in and out.

    the guest accounts could expire after a time frame, or a number of uses, or whatever.

    Altp.
  • by Kris_J ( 10111 ) on Friday July 04, 2003 @01:04AM (#6365135) Homepage Journal
    From memory, MailScanner (ours uses the F-Secure engine) looks inside zip files. No biggy.
  • While you may have been lucky and escaped the Sobig.E virus, unfortunately it appears that you have been infected with the 'affective disorder' virus.

    This cunning virus sniffs all your outgoing email and replaces 'affect' with 'effect' and vice versa. So while we know that you wrote "We got lucky this time and were not affected...", this malicious virus made it appear on slashdot as though you are 'affectively disordered'.

    • Seems it also replaces "viruses" with "virii"....

      (C'mon, "viri" I can understand, but who's the knucklehead that thought up "virii", and why does this spurious plural spread as if it were itself a virus?)
  • This is not hard (Score:3, Informative)

    by TomGroves ( 622890 ) on Friday July 04, 2003 @01:34AM (#6365205) Homepage
    This is not a hard thing to do at all. I assume you are using ScanMail. This applies to ScanMail 6, but I recall from memory that older versions were basically the same. Open up the ScanMail Magement console. Click the 'Virus Scan' tab and then 'options'. Now, on the right, click the 'settings' button for 'advanced options'. Check the box 'Enable Compressed Attachement Scanning'. Have a nice day. -Tom
    • The idea here is that by unilaterally blocking .vbs, for example, you're immune to new .vbs viruses which the scanner engine doesn't yet know about.

      When sobig.E hit the world, scanners didn't know about it. Because it was in a zip file, it sailed right past a lot of precautionary attachment stripping.

      Yes, once it was incorporated into virus defs, compressed attachment scanning will find it. But the question here is if .zip files should be unilaterally blocked to prevent the next .vbs virus from sneaki

  • by PD ( 9577 ) * <slashdotlinux@pdrap.org> on Friday July 04, 2003 @02:40AM (#6365467) Homepage Journal
    You should make sure that your bounce messages go to the right place. I've received countless messages informing me that my attachment was stripped because it contains the Sobig virus. The second thing you should do is to make sure that the full headers of the message get inserted into your bounce.

    The funny thing is that I run only Linux on my domain, and I never e-mailed those people anything. It's very unlikely that Sobig can run on Linux. And I can't do anything about it because I don't have any headers to track down the source of the mails. Nobody's answered my requests for them either.
  • by Anonymous Coward
    Your fucking userii should not be clicking on the attachmentii if they don't know what programii is going to run on their computerii.

  • Not all zip files (Score:5, Informative)

    by nocomment ( 239368 ) on Friday July 04, 2003 @03:27AM (#6365642) Homepage Journal
    Here's what I did with postfix.

    in my main.cf created a line that says
    body_checks = pcre:/etc/postfix/extensions

    then created a file called extensions that looks like this:
    /^(Content-(Type|Disposition):.*|\s*(file)?)name=( "[^"]*|\S*)\.(ade|adp|bas|shm|cmd|com|dll|hlp|js|j se|exe|com|chm|hta|jse|reg|shb|shs|vbe|vbs|vxd|scr |pif|bat|lnk|dll|vbs|js|mp*)\b/ REJECT

    /^(Content-(Type|Disposition):.*|\s*(file)?)name=( \S*your_details)\.(zip)\b/ REJECT

    The first line (yes it's all one line) blocks all executable files from entering the server. The second line block the only version of sobig that we received. Actually we received 2 modifications...one attachment was called your_details.zip, and the other was 'your_details.zip the ' allowed it to get around the filter, hence the wildcard.

    The key is, to inform your users over and voer not to open things from people they don't know or aren't expecting. If you start blocking zip's you might as well block all attachments.
  • by RedPhoenix ( 124662 ) on Friday July 04, 2003 @03:41AM (#6365682)
    This, and similar issues, have cropped up at a few of our customer sites over the years. There are situations where bringing in (documents/zip files/spreadsheets/etc.) are an essential part of making organisation function.

    Whilst you can implement technical countermeasures to reduce your security risk somewhat, such as installing virus checkers that are able to unzip/unarj/unrar, keeping virus signature definitions up to date, quarantine incoming attachments.. etc, you really need to compare your security risk profile, with the business risk associated with NOT receiving these attachments.

    This would normally be the function of your organisational risk assessment - it would compare the likely harm of virus infection, against the loss of capability as a result of not receiving the documents/zip files in question.

    Which way you go, really depends on the threat/risk/harm/countermeasure equasion, which is unique to your organisation. However, a quick 'cheat' check:
    * How badly is it going to hurt your organisation overall, if attachments don't come in?
    * Do you have the resources to quickly clean up a virus attack if one makes it through?

    - If you're a small organisation, with adequate IT staff numbers, and receiving attachments is pretty essential to your normal business... it's probably worth allowing things through.

    - If your IT staff numbers are limited such that a virus attack would be a major cleanup effort, or attachments aren't all that critical, then block them, or quarantine them by redirecting them to technically literate help-desk users (who can forward them internally after checking them out).

    However, make sure that you make it relatively painless for users to get their files. If you're really anal about things, they'll just open up a hotmail/yahoo/whatever account, ask people to send attachements there instead, and download just like a normal web link.

    Red.
  • by Anonymous Coward on Friday July 04, 2003 @04:47AM (#6365865)
    Here's a simple solution used by a number of organisations down here in New Zealand.

    If an email with a forbidden attachment type is received, bounce it back to the sender with a "Sorry, no go" message UNLESS it has a matching flag in the subject line.

    So, to send a friend of mine a picture, I need to include [JPG] in the subject line, else it will bounce.

    Simple, easy, and proof against viri because YOU choose the flag.

    In your case, set it up to require [FUBAR] in the subject line to let a zip file through.

    Sorry though, I don't know the software package they use.

  • We use RenAttach and I added ZIP files to its list of 'bad' files last week as a precaution.

    If you aren't familiar with it, RenAttach processes each email and compares the file extension of each email attachment against a list of "bad" extenstions you've configured. Any files with bad extenstions are renamed: "yourfile.exe" becomes "yourfile_exe.xxx".

    This prevents auto-running executable viruses from damaging anything, but still leaves the user in control so they can exchange data. This would not work in
  • I communicate with a major broadcaster, which is therefore a fairly high profile target for politically motivated hackers as well as mindless viruses. They have a flat no-attachments policy. If I want to send them a binary, I have to put it up on our website, then certain technically qualified people are permitted to download from the web. But the default applied to the majoprity of the people is no attatchments - full stop. I can't even send them zipped text or pdf.
    • Sounds familiar. Place I once worked did that: No attachments, period. If a staffer needed someone to send them a file, they had to get their boss to sign off, and then make arrangments for a small staff using standalones to get it via FTP or HTTP. Everything was tracked and recorded, just in case.

      Note that a staffer had to set this up; an outsider could not make the arrangements. Internal distribution to the intended recipient was via floppy or CD, who had to sign for it.
  • If the attachments can be reasonably assumed not to be work-related, don't let them in.

    I worked at a security-conscious place a few years ago. Executables, zip files and the like were stripped off incoming mail.
  • Our company was vulnerable when Sobig first came out. I got the first e-mail into the company and noticed it was a virus and that it had gotten through our defenses so I went and downloaded the latest dat file for anti-virus for exchange and that particular zip was then getting quarentined. We can't block zips in our company because that is the only alternative to letting our users send exe's and other file extensions that are blocked.
  • Multi-Level Solution (Score:5, Informative)

    by fdiskne1 ( 219834 ) on Friday July 04, 2003 @12:35PM (#6367733)

    Here's what we do:

    1. Use Symantec Antivirus for SMTP Gateways 3.1. Blocks spam by subject, sender, multiple RBLs and heuristic antispam and has whitelist support. Scans for viruses and attachments can be deleted by filename with wildcards. I block anything that is executable in a Windows environment (since we use Windows, Exchange and Outlook -- no flames, please). Any file deleted gets a .txt file added to the message stating that <filename> is not allowed for security reasons. This means that if anyone needs to send a .exe, .cmd, .bat, .vb?, .cpl, .dll, and a number of others must first call so I can temporarily disable the deletion.

    2. Use another company's antivirus on the mail servers. We use Sybari with multiple scan engines. This saved us this past week when the new FortNight.E managed to get past SAV for SMTP because it didn't detect it yet and it was essentially a script embedded in an html. (I'd love to strip them, too, but too many legitimate emails come through as html.) Sybari caught it after Symantec missed it.

    3. Use another antivirus package for clients and servers. We use SAV Corporate edition with a master server setup so that one server d/l's updates from Symantec nightly or when I force it. Each remote location's server d/l's from that server nightly or when I force it. Each workstation d/l's from their location's server every 4 hours.

    Since starting this practice, we've had a total of 2 viruses make it into our network. One was on a laptop that, for some strange reason never got antivirus installed and it was infected at the user's home. The virus never got further than that, but it took a while to discover where the virus alerts were coming from when it attempted to infect other machines. The other one had a corrupt install of the desktop antivirus and the end user didn't let us know that something didn't look right on his client. He then fell for the e-card virus (Go to this URL to download the greeting card X sent you.). Again, never got further than this one workstation. This is all the infections we've seen in over 2 years. Not bad for a 1500 user network.

  • on your business.. Do you have clients that may send you attachements in the email? If so then if they zip them and you block them your screwed!

    I don't normally get attachements as zip's but I have had to once or twice. If our company blocked zip files I would have never been able to debug the zipped core file one of our clients sent to me.

    I think the real solution is maybe to use a 'quarantine' system. Where attachements can be held instead of blocked. Also make sure that you have a virsu scanner on

  • Digital signatures (Score:3, Interesting)

    by macemoneta ( 154740 ) on Friday July 04, 2003 @06:33PM (#6369500) Homepage
    Digital signatures verify the authenticity of the email, but come in as an attachment. Stripping these off is counter to your intent, maintaining security.
  • by Animats ( 122034 ) on Saturday July 05, 2003 @01:33PM (#6372804) Homepage
    The big problem is proprietary file formats. So how about a format-translation gateway? One based on components of OpenOffice. It would convert the proprietary formats that cause trouble (mostly .doc and .xls) into RTF or OpenOffice XML-based documents, then pass those on with a note.

    Yes, sometimes translation will be disappointing, but you probably didn't need the formatting junk anyway. Besides, once it's in an OpenOffice format, you can file it in a system with a search engine.

    Google ought to sell something like this as a product, since they already do most of those translations.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...