747 lines
34 KiB
Plaintext
747 lines
34 KiB
Plaintext
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Forty-One, File 4 of 13
|
|
|
|
Network Miscellany
|
|
*******************************************************
|
|
< The POWER of Electronic Mail >
|
|
*******************************************************
|
|
Compiled from Internet Sources
|
|
|
|
by The Racketeer
|
|
of The Hellfire Club
|
|
|
|
Network Miscellany created by Taran King
|
|
|
|
|
|
First of all, this guide is more than using fakemail. It literally
|
|
explains the interfaces used with SMTP in detail enough that you should gain a
|
|
stronger awareness of what is going on across the multitude of networks which
|
|
make up the worldwide e-mail connections. It also contains my usual crude
|
|
remarks and grim hacker humor (assuming it hasn't again been edited out, but
|
|
I'm somewhat proud of the fact that Phrack heavily edited my "language" in last
|
|
issue's article. Oh well.).
|
|
|
|
There are two objectives in this file: first, I will attempt to show that
|
|
by using fakemail and SMTP, you can cause an amazing number of useful, hacker
|
|
related stunts; second, I shall attempt to be the first hacker to ever send a
|
|
piece of electronic mail completely around the world, ushering in a new age of
|
|
computerdom!
|
|
|
|
I suggest that, unless you don't want everyone lynching you, don't try to
|
|
fuck up anything that can't be repaired offhand. I've experimented with
|
|
fakemail beyond this article and the results were both impressive and
|
|
disastrous. Therefore, let's examine risks first, and then go onto the good
|
|
stuff. Basic philosophy -- use your brain if you've got one.
|
|
|
|
|
|
RISKS:
|
|
|
|
Getting caught doing this can be labeled as computer vandalism; it may
|
|
violate trespassing laws; it probably violates hundreds of NFS, Bitnet and
|
|
private company guidelines and ethics policies; and finally, it will no doubt
|
|
piss someone off to the point of intended revenge.
|
|
|
|
Networks have fairly good tracing abilities. If you are logged, your host
|
|
may be disconnected due to disciplinary referral by network authorities (I
|
|
don't think this has happened yet). Your account will almost definitely be
|
|
taken away, and if you are a member of the source or target computer's
|
|
company/organization, you can expect to face some sort of political shit that
|
|
could result in suspension, expulsion, firing, or otherwise getting the short
|
|
end of the stick for awhile.
|
|
|
|
Finally, if the government catches you attempting to vandalize another
|
|
computer system, you will probably get some sort of heavy fine, community
|
|
service, or both.
|
|
|
|
Odds of any of this happening if you are smart: < 1%.
|
|
|
|
|
|
PRECAUTIONS SUGGESTED:
|
|
|
|
If you have a bogus computer account (standard issue hacker necessity)
|
|
then for crissake use that. Don't let "them" know who really is hacking
|
|
around. (Point of clarification, I refer to "them" an awful lot in RL and in
|
|
philes. "They" are the boneheadded "do-gooders" who try to blame their own
|
|
lack of productivity or creativity on your committing of pseudo-crimes with a
|
|
computer. FBI, SS, administrators, accountants, SPA "Don't Copy that Floppy"
|
|
fucks, religious quacks, stupid rednecks, right wing conservative Republican
|
|
activists, pigs, NSA, politicians who still THINK they can control us, city
|
|
officials, judges, lame jurors that think a "hacker" only gets
|
|
slap-in-the-wrist punishments, lobbyists who want to blame their own failed
|
|
software on kids, bankers, investors, and probably every last appalled person
|
|
in Stifino's Italian Restaurant when the Colorado 2600 meeting was held there
|
|
last month. Enough of the paranoid Illuminati shit, back to the phile.)
|
|
|
|
Make sure that you delete history files, logs, etc. if you have
|
|
access to them. Try using computers that don't keep logs. Check /usr/adm,
|
|
/etc/logs to see what logs are kept.
|
|
|
|
If you can avoid using your local host (since you value network
|
|
connections in general), do so. It can avert suspicion that your host contains
|
|
"hackers."
|
|
|
|
|
|
IF YOU EVER ARE CONFRONTED:
|
|
|
|
"They must have broken into that account from some other site!"
|
|
|
|
"Hackers? Around here? I never check 'who' when I log in."
|
|
|
|
"They could have been super-user -- keep an eye out to see if the scum
|
|
comes back."
|
|
|
|
"Come on, they are probably making a big deal out of nothing. What could
|
|
be in e-mail that would be so bad?"
|
|
|
|
"Just delete the account and the culprit will be in your office tomorrow
|
|
morning." (Of course, you used a bogus account.)
|
|
|
|
|
|
PART ONE: ELECTRONIC MAIL
|
|
|
|
Basically, electronic mail has become the new medium of choice for
|
|
delivering thoughts in a hurry. It is faster than the post office, cheaper
|
|
than the post office, doesn't take vacations all the time like the post office,
|
|
and is completely free so it doesn't have unions.
|
|
|
|
Of course, you know all that and would rather spend this time making damn
|
|
sure you know what SMTP is.
|
|
|
|
To my knowledge, a completely accurate SMTP set of protocols hasn't been
|
|
published in any hacker journal. The original (at least, the first I've seen)
|
|
was published in the Legion of Doom Technical Journals and covered the minimum
|
|
SMTP steps necessary for the program "sendmail," found in a typical Unix
|
|
software package.
|
|
|
|
When you connect a raw socket to a remote SMTP compatible host, your
|
|
computer is expected to give a set of commands which will result in having the
|
|
sender, receiver, and message being transferred. However, unlike people who
|
|
prefer the speed of compression and security of raw integer data, the folks at
|
|
DARPA decided that SMTP would be pretty close to English.
|
|
|
|
If you are on the Internet, and you wanted to connect to the SMTP server,
|
|
type:
|
|
|
|
telnet <hostname> 25
|
|
|
|
Port 25 is the standard port for SMTP. I doubt it would be too cool to
|
|
change this, since many mail servers connect to the target hosts directly.
|
|
|
|
[Editor's Note: All mail and SMTP commands have been offset by a ">" at the
|
|
beginning of each line in order not to confuse Internet mailers when sending
|
|
this article through e-mail.]
|
|
|
|
When you connect, you will get a small hostname identifier for whatever
|
|
SMTP server revision you've got.
|
|
|
|
220 huggies.colorado.edu Sendmail 2.2/2.5 8/01/88 ready at Tue, 25 Aug 91
|
|
03:14:55 edt
|
|
|
|
Now that you are connected, the computer is waiting for commands. First
|
|
of all, you are expected to explain which computer you are calling in from.
|
|
This is done with the HELO <host> command. This can be anything at all, but if
|
|
you fail to give the exact host that you are connecting from, it causes the
|
|
following line to appear on the e-mail message the recipient gets from you:
|
|
|
|
> Apparently-to: The Racketeer <rack@lycaeum.hfc.com>
|
|
|
|
Instead of the classic:
|
|
|
|
> To: The Racketeer <rack@lycaeum.hfc.com>
|
|
|
|
This is the secret to great fakemail -- the ability to avoid the
|
|
"apparently-to" flag. Although it is subtle, it is a pain to avoid. In fact,
|
|
in some places, there are so many "protections" to SMTP that every outside
|
|
e-mail is marked with "Apparently-to." Hey, their problem.
|
|
|
|
So, go ahead and type the HELO command:
|
|
|
|
> HELO LYCAEUM.HFC.COM
|
|
|
|
The computer replies:
|
|
|
|
250 huggies.colorado.edu Hello LYCAEUM.HFC.COM, pleased to meet you
|
|
|
|
Oh, a warm reception. Older sendmail software explains with the HELP
|
|
command that the computer doesn't care about HELO commands. You can check it
|
|
upon login with the command "HELP HELO."
|
|
|
|
Now what you will need to do is tell the computer who is supposed to get
|
|
the letter. From this point, there are all sorts of possibilities. First of
|
|
all, the format for the recipient would be:
|
|
|
|
> RCPT TO: <name@host>
|
|
|
|
And *NOTE*, the "<" and ">" symbols should be present! Some computers,
|
|
especially sticklers like Prime, won't even accept the letters unless they
|
|
adhere specifically to the protocol! Now, if you give a local address name,
|
|
such as:
|
|
|
|
> RCPT TO: <smith>
|
|
|
|
...then it will treat the mail as if it were sent locally, even though it
|
|
was sent through the Internet. Giving a computer its own host name is valid,
|
|
although there is a chance that it will claim that the machine you are calling
|
|
from had something to do with it.
|
|
|
|
> RCPT TO: <smith@thishost>
|
|
|
|
...will check to see if there is a "smith" at this particular computer. If
|
|
the computer finds "smith," then it will tell you there is no problem. If you
|
|
decide to use this computer as a forwarding host (between two other points),
|
|
you can type:
|
|
|
|
> RCPT TO: <smith@someotherhost>
|
|
|
|
This will cause the mail to be forwarded to someotherhost's SMTP port and
|
|
the letter will no longer be a problem for you. I'll be using this trick to
|
|
send my letter around the world.
|
|
|
|
Now, after you have given the name of the person who is to receive the
|
|
letter, you have to tell the computer who is sending it.
|
|
|
|
> MAIL FROM: <rack@lycaeum.hfc.com> ; Really from
|
|
> MAIL FROM: <rack> ; Localhost
|
|
> MAIL FROM: <rack@osi.mil> ; Fake -- "3rd party host"
|
|
> MAIL FROM: <lycaeum.hfc.com|rack> ; UUCP Path
|
|
|
|
Essentially, if you claim the letter is from a "3rd party," then the other
|
|
machine will accept it due to UUCP style routing. This will be explained later
|
|
on.
|
|
|
|
The next step is actually entering the e-mail message. The first few
|
|
lines of each message consists of the message title, X-Messages, headers,
|
|
Forwarding Lines, etc. These are completely up to the individual mail program,
|
|
but a few simple standards will be printed later, but first let's run through
|
|
the step-by-step way to send fakemail. You type anything that isn't preceded
|
|
by a number.
|
|
|
|
220 hal.gnu.ai.mit.edu Sendmail AIX 3.2/UCB 5.64/4.0 ready at Tue, 21 Jul 1992
|
|
22:15:03 -0400
|
|
> helo lycaeum.hfc.com
|
|
250 hal.gnu.ai.mit.edu Hello lycaeum.hfc.com, pleased to meet you
|
|
> mail from: <rack@lycaeum.hfc.com>
|
|
250 <rack@lycaeum.hfc.com>... Sender ok
|
|
> rcpt to: <phrack@gnu.ai.mit.edu>
|
|
250 <phrack@gnu.ai.mit.edu>... Recipient ok
|
|
> data
|
|
354 Enter mail, end with "." on a line by itself
|
|
> Yo, C.D. -- mind letting me use this account?
|
|
> .
|
|
250 Ok
|
|
> quit
|
|
|
|
Now, here are a few more advanced ways of using sendmail. First of all,
|
|
there is the VRFY command. You can use this for two basic things: checking up
|
|
on a single user or checking up on a list of users. Anyone with basic
|
|
knowledge of ANY of the major computer networks knows that there are mailing
|
|
lists which allow several people to share mail. You can use the VRFY command
|
|
to view every member on the entire list.
|
|
|
|
> vrfy phrack
|
|
250 Phrack Classic <phrack>
|
|
|
|
Or, to see everyone on a mailing list:
|
|
|
|
> vrfy phrack-staff-list
|
|
250 Knight Lightning <kl@stormking.com>
|
|
250 Dispater <dispater@stormking.com>
|
|
|
|
Note - this isn't the same thing as a LISTSERV -- like the one that
|
|
distributes Phrack. LISTSERVs themselves are quite powerful tools because they
|
|
allow people to sign on and off of lists without human moderation. Alias lists
|
|
are a serious problem to moderate effectively.
|
|
|
|
This can be useful to just check to see if an account exists. It can be
|
|
helpful if you suspect a machine has a hacked finger daemon or something to
|
|
hide the user's identity. Getting a list of users from mailing lists doesn't
|
|
have a great deal of uses, but if you are trying very hard to learn someone's
|
|
real identity, and you suspect they are signed up to a list, just check for all
|
|
users from that particular host site and see if there are any matches.
|
|
|
|
Finally, there is one last section to e-mail -- the actual message itself.
|
|
In fact, this is the most important area to concentrate on in order to avoid
|
|
the infamous "Apparently-to:" line. Basically, the data consists of a few
|
|
lines of title information and then the actual message follows.
|
|
|
|
There is a set of guidelines you must follow in order for the quotes to
|
|
appear in correct order. You won't want to have a space separate your titles
|
|
from your name, for example. Here is an example of a real e-mail message:
|
|
|
|
> From: rack@lycaeum.hfc.com
|
|
> Received: by dockmaster.ncsc.mil (5.12/3.7) id AA10000; Thu, 6 Feb 92
|
|
> 12:00:00
|
|
> Message-Id: <666.AA10000@dockmaster.ncsc.mil>
|
|
> To: RMorris@dockmaster.ncsc.mil
|
|
> Date: Thu, 06 Feb 92 12:00:00
|
|
> Title: *wave* Hello, No Such Agency dude!
|
|
>
|
|
> NIST sucks. Say "hi" to your kid for me from all of us at Phrack!
|
|
|
|
Likewise, if you try to create a message without an information line, your
|
|
message would look something like this:
|
|
|
|
> From: rack@lycaeum.hfc.com
|
|
> Received: by dockmaster.ncsc.mil (5.12/3.7) id AA10000; Thu, 6 Feb 92
|
|
> 12:00:00 -0500
|
|
> Message-Id: <666.AA10000@dockmaster.ncsc.mil>
|
|
> Date: Thu, 06 Feb 92 12:00:00
|
|
> Apparently-to: RMorris@dockmaster.ncsc.mil
|
|
|
|
> NIST sucks. Say "hi" to your kid for me from all of us at Phrack!
|
|
|
|
Basically, this looks pretty obvious that it's fakemail, not because I
|
|
altered the numbers necessarily, but because it doesn't have a title line, it
|
|
doesn't have the "Date:" in the right place, and because the "Apparently-to:"
|
|
designation was on.
|
|
|
|
To create the "realistic" e-mail, you would enter:
|
|
|
|
> helo lycaeum.hfc.com
|
|
> mail from: <rack@lycaeum.hfc.com>
|
|
> rcpt to: <RMorris@docmaster.ncsc.mil>
|
|
> data
|
|
> To: RMorris@dockmaster.ncsc.mil>
|
|
> Date: Thu, 06 Feb 92 12:00:00
|
|
> Title: *wave* Hello, No Such Agency dude!
|
|
>
|
|
> NIST sucks. Say "hi" to your kid for me from all of us at Phrack!
|
|
> .
|
|
|
|
Notice that, even though you are in "data" mode, you are still giving
|
|
commands to sendmail. All of the lines can (even if only partially) be altered
|
|
through the data command. This is perfect for sending good fakemail. For
|
|
example:
|
|
|
|
> helo lycaeum.hfc.com
|
|
> mail from: <dale@opus.tymnet.com>
|
|
> rcpt to: <listserv@brownvm.brown.edu>
|
|
> data
|
|
> Received: by lycaeum.hfc.com (5.12/3.7) id AA11891; Thu 6 Feb 92 12:00:00
|
|
> Message-Id: <230.AA11891@lycaeum.hfc.com>
|
|
> To: <listserv@brownvm.brown.edu>
|
|
> Date: Thu, 06 Feb 92 12:00:00
|
|
> Title: Ohh, sign me up Puuuleeeze.
|
|
>
|
|
> subscribe BISEXU-L Dale "Fist Me" Drew
|
|
> .
|
|
|
|
Now, according to this e-mail path, you are telling the other computer
|
|
that you received this letter from OPUS.TYMNET.COM, and it is being forwarded
|
|
by your machine to BROWNVM.BROWN.EDU. Basically, you are stepping into the
|
|
middle of the line and claiming you've been waiting there all this time. This
|
|
is a legit method of sending e-mail!
|
|
|
|
Originally, when sendmail was less automated, you had to list every
|
|
computer that your mail had to move between in order for it to arrive. If you
|
|
were computer ALPHA, you'd have to send e-mail to account "joe" on computer
|
|
GAMMA by this address:
|
|
|
|
> mail to: <beta!ceti!delta!epsilon!freddy!gamma!joe>
|
|
|
|
Notice that the account name goes last and the host names "lead" up to
|
|
that account. The e-mail will be routed directly to each machine until it
|
|
finally reaches GAMMA. This is still required today, especially between
|
|
networks like Internet and Bitnet -- where certain hosts are capable of sending
|
|
mail between networks. This particular style of sending e-mail is called "UUCP
|
|
Style" routing.
|
|
|
|
Sometimes, hosts will use the forwarding UUCP style mail addresses in case
|
|
the host has no concept of how to deal with a name address. Your machine
|
|
simply routes the e-mail to a second host which is capable of resolving the
|
|
rest of the name. Although these machines are going out of style, they still
|
|
exist.
|
|
|
|
The third reasonable case of where e-mail will be routed between hosts is
|
|
when, instead of having each computer waste individual time dealing with each
|
|
piece of e-mail that comes about, the computer gives the mail to a dedicated
|
|
mailserver which will then deliver the mail. This is quite common all over the
|
|
network -- especially due to the fact that the Internet is only a few T1 lines
|
|
in comparison to the multitude of 9600 and 14.4K baud modems that everyone is
|
|
so protective of people over-using. Of course, this doesn't cause the address
|
|
to be in UUCP format, but when it reaches the other end of the network, it'll
|
|
be impossible to tell what method the letter used to get sent.
|
|
|
|
Okay, now we can send fairly reasonable electronic fakemail. This stuff
|
|
can't easily be distinguished between regular e-mail unless you either really
|
|
botched it up (say, sending fakemail between two people on the same machine by
|
|
way of 4 national hosts or something) or really had bad timing.
|
|
|
|
Let's now discuss the POWER of fakemail. Fakemail itself is basically a
|
|
great way to fool people into thinking you are someone else. You could try to
|
|
social engineer information out of people on a machine by fakemail, but at the
|
|
same time, why not just hack the root password and use "root" to do it? This
|
|
way you can get the reply to the mail as well. It doesn't seem reasonable to
|
|
social engineer anything while you are root either. Who knows. Maybe a really
|
|
great opportunity will pop up some day -- but until then, let's forget about
|
|
dealing person-to-person with fakemail, and instead deal with
|
|
person-to-machine.
|
|
|
|
There are many places on the Internet that respond to received electronic
|
|
mail automatically. You have all of the Archie sites that will respond, all of
|
|
the Internet/Bitnet LISTSERVs, and Bitmail FTP servers. Actually, there are
|
|
several other servers, too, such as the diplomacy adjudicator. Unfortunately,
|
|
this isn't anywhere nearly as annoying as what you can do with other servers.
|
|
|
|
First, let's cover LISTSERVs. As you saw above, I created a fakemail
|
|
message that would sign up Mr. Dale Drew to the BISEXU-L LISTSERV. This means
|
|
that any of the "netnews" regarding bisexual behavior on the Internet would be
|
|
sent directly to his mailbox. He would be on this list (which is public and
|
|
accessible by anyone) and likewise be assumed to be a member of the network
|
|
bisexual community.
|
|
|
|
This fakemail message would go all the way to the LISTSERV, it would
|
|
register Mr. Dictator for the BISEXU-L list, >DISCARD< my message, and, because
|
|
it thinks that Dale Drew sent the message, it will go ahead and sign him up to
|
|
receive all the bisexual information on the network.
|
|
|
|
And people wonder why I don't even give out my e-mail address.
|
|
|
|
The complete list of all groups on the Internet is available in the file
|
|
"list_of_lists" which is available almost everywhere so poke around
|
|
wuarchive.wustl.edu or ftp.uu.net until you find it. You'll notice that there
|
|
are several groups that are quite fanatic and would freak out nearly anybody
|
|
who was suddenly signed up to one.
|
|
|
|
Ever notice how big mega-companies like IBM squelch little people who try
|
|
to make copies of their ideas? Even though you cannot "patent" an "idea,"
|
|
folks like IBM want you to believe they can. They send their "brute" squad of
|
|
cheap lawyers to "legal-fee-to-death" small firms. If you wanted to
|
|
"nickel-and-dime" someone out of existence, try considering the following:
|
|
|
|
CompuServe is now taking electronic mail from the Internet. This is good.
|
|
CompuServe charges for wasting too much of their drive space with stored
|
|
e-mail. This is bad. You can really freak out someone you don't like on
|
|
CompuServe by signing them up to the Dungeons and Dragons list, complete with
|
|
several megabytes of fluff per day. This is cool. They will then get charged
|
|
hefty fines by CompuServe. That is fucked up. How the hell could they know?
|
|
|
|
CompuServe e-mail addresses are userid@compuserve.com, but as the Internet
|
|
users realize, they can't send commas (",") as e-mail paths. Therefore, use a
|
|
period in place of every comma. If your e-mail address was 767,04821 on
|
|
CompuServe then it would be 767.04821 for the Internet. CompuServe tends to
|
|
"chop" most of the message headers that Internet creates out of the mail before
|
|
it reaches the end user. This makes them particularly vulnerable to fakemail.
|
|
|
|
You'll have to check with your individual pay services, but I believe such
|
|
groups as MCI Mail also have time limitations. Your typical non-Internet-
|
|
knowing schmuck would never figure out how to sign off of some God-awful fluff
|
|
contained LISTSERV such as the Advanced Dungeons & Dragons list. The amount of
|
|
damage you could cause in monetary value alone to an account would be
|
|
horrendous.
|
|
|
|
Some groups charge for connection time to the Internet -- admittedly, the
|
|
fees are reasonable -- I've seen the price at about $2 per hour for
|
|
communications. However, late at night, you could cause massive e-mail traffic
|
|
on some poor sap's line that they might not catch. They don't have a way to
|
|
shut this off, so they are basically screwed. Be WARY, though -- this sabotage
|
|
could land you in deep shit. It isn't actually fraud, but it could be
|
|
considered "unauthorized usage of equipment" and could get you a serious fine.
|
|
However, if you are good enough, you won't get caught and the poor fucks will
|
|
have to pay the fees themselves!
|
|
|
|
Now let's investigate short-term VOLUME damage to an e-mail address.
|
|
There are several anonymous FTP sites that exist out there with a service known
|
|
as BIT FTP. This means that a user from Bitnet, or one who just has e-mail and
|
|
no other network services, can still download files off of an FTP site. The
|
|
"help" file on this is stored in Appendix C, regarding the usage of Digital's
|
|
FTP mail server.
|
|
|
|
Basically, if you wanted to fool the FTP Mail Server into bombarding some
|
|
poor slob with an ungodly huge amount of mail, try doing a regular "fakemail"
|
|
on the guy, with the enclosed message packet:
|
|
|
|
> helo lycaeum.hfc.com
|
|
> mail from: <dale@opus.tymnet.com>
|
|
> rcpt to: <ftpmail@decwrl.dec.com>
|
|
> data
|
|
> Received: by lycaeum.hfc.com (5.12/3.7) id AA10992; Fri 9 Oct 92 12:00:00
|
|
> Message-Id: <230.AA11891@lycaeum.hfc.com>
|
|
> To: <listserv@brownvm.brown.edu>
|
|
> Date: Fri, 09 Oct 92 12:00:00
|
|
> Title: Hey, I don't have THAT nifty program!
|
|
>
|
|
> reply dale@opus.tymnet.com
|
|
> connect wuarchive.wustl.edu anonymous fistme@opus.tymnet.com
|
|
> binary
|
|
> get mirrors/gnu/gcc-2.3.2.tar.Z
|
|
> quit
|
|
> .
|
|
|
|
What is particularly nasty about this is that somewhere between 15 and
|
|
20 megabytes of messages are going to be dumped into this poor guy's account.
|
|
All of the files will be uuencoded and broken down into separate messages!
|
|
Instead of deleting just one file, there will be literally hundreds of messages
|
|
to delete! Obnoxious! Nearly impossible to trace, too!
|
|
|
|
|
|
Part 2: E-MAIL AROUND THE WORLD
|
|
|
|
Captain Crunch happened to make a telephone call around the world, which
|
|
could have ushered in the age of phreak enlightenment -- after all, he proved
|
|
that, through the telephone, you could "touch someone" anywhere you wanted
|
|
around the world! Billions of people could be contacted.
|
|
|
|
I undoubtedly pissed off a great number of people trying to do this e-mail
|
|
trick -- having gotten automated complaints from many hosts. Apparently, every
|
|
country has some form of NSA. This doesn't surprise me at all, I'm just
|
|
somewhat amazed that entire HOSTS were disconnected during the times I used
|
|
them for routers. Fortunately, I was able to switch computers faster than they
|
|
were able to disconnect them.
|
|
|
|
In order to send the e-mail, I couldn't send it through a direct path.
|
|
What I had to do was execute UUCP style routing, meaning I told each host in
|
|
the path to send the e-mail to the next host in the path, etc., until the last
|
|
machine was done. Unfortunately, the first machine I used for sending the
|
|
e-mail had a remarkably efficient router and resolved the fact that the target
|
|
was indeed the destination. Therefore, I re-altered the path to a machine
|
|
sitting about, oh, two feet away from it. Those two feet are meaningless in
|
|
this epic journey.
|
|
|
|
The originating host names have been altered as to conceal my identity.
|
|
However, if we ever meet at a Con, I'll probably have the real print-out of the
|
|
results somewhere and you can verify its authenticity. Regardless, most of
|
|
this same shit will work from just about any typical college campus Internet
|
|
(and even Bitnet) connected machines.
|
|
|
|
In APPENDIX A, I've compiled a list of every foreign country that I could
|
|
locate on the Internet. I figured it was relatively important to keep with the
|
|
global program and pick a series of hosts to route through that would
|
|
presumably require relatively short hops. I did this by using this list and
|
|
trial and error (most of this information was procured from the Network
|
|
Information Center, even though they deliberately went way the hell out of
|
|
their way to make it difficult to get computers associated with foreign
|
|
countries).
|
|
|
|
My ultimate choice of a path was:
|
|
|
|
lycaeum.hfc.com -- Origin, "middle" America.
|
|
albert.gnu.ai.mit.edu -- Massachusetts, USA.
|
|
isgate.is -- Iceland
|
|
chenas.inria.fr -- France
|
|
icnucevx.cnuce.cn.it -- Italy
|
|
sangram.ncst.ernet.in -- India
|
|
waseda-mail.waseda.ac.jp -- Japan
|
|
seattleu.edu -- Seattle
|
|
inferno.hfc.com -- Ultimate Destination
|
|
|
|
The e-mail address came out to be:
|
|
|
|
isgate.is!chenas.inria.fr!icnucevx.cnuce.cn.it!sangram.ncst.ernet.in!
|
|
waseda-mail.waseda.ac.jp!seattleu.edu!inferno.hfc.com!
|
|
rack@albert.gnu.ai.mit.edu
|
|
|
|
...meaning, first e-mail albert.gnu.ai.mit.edu, and let it parse the name
|
|
down a line, going to Iceland, then to France, etc. until it finally reaches
|
|
the last host on the list before the name, which is the Inferno, and deposits
|
|
the e-mail at rack@inferno.hfc.com.
|
|
|
|
This takes a LONG time, folks. Every failure toward the end took on
|
|
average of 8-10 hours before the e-mail was returned to me with the failure
|
|
message. In one case, in fact, the e-mail made it shore to shore and then came
|
|
all the way back because it couldn't resolve the last hostname! That one made
|
|
it (distance-wise) all the way around the world and half again.
|
|
|
|
Here is the final e-mail that I received (with dates, times, and numbers
|
|
altered to squelch any attempt to track me):
|
|
|
|
> Return-Path: <rack@lycaeum.hfc.com>
|
|
> Received: from sumax.seattleu.edu [192.48.211.120] by Lyceaum.HFC.Com ; 19
|
|
Dec 92 16:23:21 MST
|
|
> Received: from waseda-mail.waseda.ac.jp by sumax.seattleu.edu with SMTP id
|
|
> AA28431 (5.65a/IDA-1.4.2 for rack@inferno.hfc.com); Sat, 19 Dec 92
|
|
> 14:26:01 -0800
|
|
> Received: from relay2.UU.NET by waseda-mail.waseda.ac.jp (5.67+1.6W/2.8Wb)
|
|
> id AA28431; Sun, 20 Dec 92 07:24:04 JST
|
|
> Return-Path: <rack@lycaeum.hfc.com>
|
|
> Received: from uunet.uu.net (via LOCALHOST.UU.NET) by relay2.UU.NET with SMTP
|
|
> (5.61/UUNET-internet-primary) id AA28431; Sat, 19 Dec 92 17:24:08 -
|
|
> 0500
|
|
> Received: from sangam.UUCP by uunet.uu.net with UUCP/RMAIL
|
|
> (queueing-rmail) id 182330.3000; Sat, 19 Dec 1992 17:23:30 EST
|
|
> Received: by sangam.ncst.ernet.in (4.1/SMI-4.1-MHS-7.0)
|
|
> id AA28431; Sun, 20 Dec 92 03:50:19 IST
|
|
> From: rack@lycaeum.hfc.com
|
|
> Received: from shakti.ncst.ernet.in by saathi.ncst.ernet.in
|
|
> (5.61/Ultrix3.0-C)
|
|
> id AA28431; Sun, 20 Dec 92 03:52:12 +0530
|
|
> Received: from saathi.ncst.ernet.in by shakti.ncst.ernet.in with SMTP
|
|
> (16.6/16.2) id AA09700; Sun, 20 Dec 92 03:51:37 +0530
|
|
> Received: by saathi.ncst.ernet.in (5.61/Ultrix3.0-C)
|
|
> id AA28431; Sun, 20 Dec 92 03:52:09 +0530
|
|
> Received: by sangam.ncst.ernet.in (4.1/SMI-4.1-MHS-7.0)
|
|
> id AA28431; Sun, 20 Dec 92 03:48:24 IST
|
|
> Received: from ICNUCEVX.CNUCE.CNR.IT by relay1.UU.NET with SMTP
|
|
> (5.61/UUNET-internet-primary) id AA28431; Sat, 19 Dec 92 17:20:23
|
|
> -0500
|
|
> Received: from chenas.inria.fr by ICNUCEVX.CNUCE.CNR.IT (PMDF #2961 ) id
|
|
> <01GSIP122UOW000FBT@ICNUCEVX.CNUCE.CNR.IT>; Sun, 19 Dec 1992 23:14:29 MET
|
|
> Received: from isgate.is by chenas.inria.fr (5.65c8d/92.02.29) via Fnet-EUnet
|
|
> id AA28431; Sun, 19 Dec 1992 23:19:58 +0100 (MET)
|
|
> Received: from albert.gnu.ai.mit.edu by isgate.is (5.65c8/ISnet/14-10-91);
|
|
> Sat, 19 Dec 1992 22:19:50 GMT
|
|
> Received: from lycaeum.hfc.com by albert.gnu.ai.mit.edu (5.65/4.0) with
|
|
> SMTP id <AA28431@albert.gnu.ai.mit.edu>; Sat, 19 Dec 92 17:19:36 -0500
|
|
> Received: by lycaeum.hfc.com (5.65/4.0) id <AA11368@lycaeum.hfc.com>;
|
|
> Sat, 19 Dec 92 17:19:51 -0501
|
|
> Date: 19 Dec 1992 17:19:50 -0500 (EST)
|
|
> Subject: Global E-Mail
|
|
> To: rack@inferno.hfc.com
|
|
> Message-id: <9212192666.AA11368@lycaeum.hfc.com>
|
|
> Mime-Version: 1.0
|
|
> Content-Type: text/plain; charset=US-ASCII
|
|
> Content-Transfer-Encoding: 7bit
|
|
> X-Mailer: ELM [version 2.4 PL5]
|
|
> Content-Length: 94
|
|
> X-Charset: ASCII
|
|
> X-Char-Esc: 29
|
|
>
|
|
> This Electronic Mail has been completely around the world!
|
|
>
|
|
> (and isn't even a chain letter.)
|
|
|
|
===============================================================================
|
|
|
|
APPENDIX A:
|
|
|
|
List of Countries on the Internet by Root Domain
|
|
|
|
(I tried to get a single mail router in each domain. The domains that don't
|
|
have them are unavailable at my security clearance. The computer is your
|
|
friend.)
|
|
|
|
.AQ New Zealand
|
|
.AR Argentina atina.ar
|
|
.AT Austria pythia.eduz.univie.ac.at
|
|
.BB Barbados
|
|
.BE Belgium ub4b.buug.be
|
|
.BG Bulgaria
|
|
.BO Bolivia unbol.bo
|
|
.BR Brazil fpsp.fapesp.br
|
|
.BS Bahamas
|
|
.BZ Belize
|
|
.CA Canada cs.ucb.ca
|
|
.CH Switzerland switch.ch
|
|
.CL Chile uchdcc.uchile.cl
|
|
.CN China ica.beijing.canet.cn
|
|
.CR Costa Rica huracan.cr
|
|
.CU Cuba
|
|
.DE Germany deins.informatik.uni-dortmund.de
|
|
.DK Denmark dkuug.dk
|
|
.EC Ecuador ecuanex.ec
|
|
.EE Estonia kbfi.ee
|
|
.EG Egypt
|
|
.FI Finland funet.fi
|
|
.FJ Fiji
|
|
.FR France inria.inria.fr
|
|
.GB England
|
|
.GR Greece csi.forth.gr
|
|
.HK Hong Kong hp9000.csc.cuhk.hk
|
|
.HU Hungary sztaki.hu
|
|
.IE Ireland nova.ucd.ie
|
|
.IL Israel relay.huji.ac.il
|
|
.IN India shakti.ernet.in
|
|
.IS Iceland isgate.is
|
|
.IT Italy deccnaf.infn.it
|
|
.JM Jamaica
|
|
.JP Japan jp-gate.wide.ad.jp
|
|
.KR South Korea kum.kaist.ac.kr
|
|
.LK Sri Lanka cse.mrt.ac.lk
|
|
.LT Lithuania ma-mii.lt.su
|
|
.LV Latvia
|
|
.MX Mexico mtec1.mty.itesm.mx
|
|
.MY Malaysia rangkom.my
|
|
.NA Namibia
|
|
.NI Nicaragua uni.ni
|
|
.NL Netherlands sering.cwi.nl
|
|
.NO Norway ifi.uio.no
|
|
.NZ New Zealand waikato.ac.nz
|
|
.PE Peru desco.pe
|
|
.PG New Guinea ee.unitech.ac.pg
|
|
.PH Philippines
|
|
.PK Pakistan
|
|
.PL Poland
|
|
.PR Puerto Rico sun386-gauss.pr
|
|
.PT Portugal ptifm2.ifm.rccn.pt
|
|
.PY Paraguay ledip.py
|
|
.SE Sweden sunic.sunet.se
|
|
.SG Singapore nuscc.nus.sg
|
|
.TH Thailand
|
|
.TN Tunisia spiky.rsinet.tn
|
|
.TR Turkey
|
|
.TT Trinidad & Tobago
|
|
.TW Taiwan twnmoe10.edu.tw
|
|
.UK United Kingdom ess.cs.ucl.ac.uk
|
|
.US United States isi.edu
|
|
.UY Uruguay seciu.uy
|
|
.VE Venezuela
|
|
.ZA South Africa hippo.ru.ac.za
|
|
.ZW Zimbabwe zimbix.uz.zw
|
|
|
|
===============================================================================
|
|
|
|
APPENDIX B:
|
|
|
|
Basic SMTP Commands
|
|
|
|
> HELO <hostname> Tells mail daemon what machine is calling. This
|
|
will be determined anyway, so omission doesn't mean
|
|
anonymity.
|
|
|
|
> MAIL FROM: <path> Tells where the mail came from.
|
|
|
|
> RCPT TO: <path> Tells where the mail is going.
|
|
|
|
> DATA Command to start transmitting message.
|
|
|
|
> QUIT Quit mail daemon, disconnects socket.
|
|
|
|
> NOOP No Operation -- used for delays.
|
|
|
|
> HELP Gives list of commands -- sometimes disabled.
|
|
|
|
> VRFY Verifies if a path is valid on that machine.
|
|
|
|
> TICK Number of "ticks" from connection to present
|
|
("0001" is a typical straight connection).
|
|
|
|
===============================================================================
|
|
|
|
APPENDIX C:
|
|
|
|
BIT-FTP Help File
|
|
|
|
ftpmail@decwrl.dec.com (Digital FTP mail server)
|
|
|
|
Commands are:
|
|
reply <MAILADDR> Set reply address since headers are usually
|
|
wrong.
|
|
connect [HOST [USER [PASS]]] Defaults to gatekeeper.dec.com, anonymous.
|
|
ascii Files grabbed are printable ASCII.
|
|
binary Files grabbed are compressed or tar or both.
|
|
compress Compress binaries using Lempel-Ziv encoding.
|
|
compact Compress binaries using Huffman encoding.
|
|
uuencode Binary files will be mailed in uuencoded
|
|
format.
|
|
btoa Binary files will be mailed in btoa format.
|
|
ls (or dir) PLACE Short (long) directory listing.
|
|
get FILE Get a file and have it mailed to you.
|
|
quit Terminate script, ignore rest of mail message
|
|
(use if you have a .signature or are a
|
|
VMSMAIL user).
|
|
|
|
Notes:
|
|
-> You must give a "connect" command (default host is gatekeeper.dec.com,
|
|
default user is anonymous, default password is your mail address).
|
|
-> Binary files will not be compressed unless "compress" or "compact"
|
|
command is given; use this if at all possible, it helps a lot.
|
|
-> Binary files will always be formatted into printable ASCII with "btoa" or
|
|
"uuencode" (default is "btoa").
|
|
-> All retrieved files will be split into 60KB chunks and mailed.
|
|
-> VMS/DOS/Mac versions of uudecode, atob, compress and compact are
|
|
available, ask your LOCAL wizard about them.
|
|
-> It will take ~1-1/2 day for a request to be processed. Once the jobs has
|
|
been accepted by the FTP daemon, you'll get a mail stating the fact that
|
|
your job has been accepted and that the result will be mailed to you.
|