Re: [exim] mime_filename and &# encoding

Góra strony
Delete this message
Reply to this message
Autor: Sean Donelan
Data:  
Dla: exim-users
Temat: Re: [exim] mime_filename and &# encoding
On Thu, 26 Jun 2014, Lena@??? wrote:
>> From: Jamie <jamie@???>
>
>> deny message = Blacklisted file extension detected
>>    condition = ${if match \
>>                     {${lc:$mime_filename}} \
>>                     {\N(\.exe|\.pif|\.bat|\.scr|\.lnk|\.com|\.zip)$\N} \
>>                  {1}{0}}

>>
>> It has hugely reduced the amount of spam, but they have suddenly worked
>> around it by sending documents with an attachment name of "& # 1057 ;
>> opy_of_document_SER176.zip" (without spaces)
>
> How the full header of the MIME part looks undecoded? Use the
> "view source" function of your MUA, like perhaps Ctrl-U in Thunderbird,
> e in Mutt, Ctrl-F3 in Outlook Express. Base64-encoded filenames
> like this example should be decoded correctly:


It appears the RFC2047 decode in Exim can be tricked, and the spammers
have figured out how to exploit it.

For example, this is a recent MIME part (I added "_")

    Content-Type: application/x-zip-compressed;
         name="&_#_1057_;opy_of_Document_ID7851.zip"
    Content-Transfer-Encoding: base64
    Content-Disposition: attachment;
         filename="&_#_1057_;opy_of_Document_ID7851.zip"


When Exim expands the variable $mime_filename the result
is only "&_#_1057" and nothing else (again _'s added)