| ==Phrack Inc.== |
|
|
| Volume Four, Issue Forty-One, File 4 of 13 |
|
|
| Network Miscellany |
| ******************************************************* |
| < The POWER of Electronic Mail > |
| ******************************************************* |
| Compiled from Internet Sources |
|
|
| by The Racketeer |
| of The Hellfire Club |
|
|
| Network Miscellany created by Taran King |
|
|
|
|
| First of all, this guide is more than using fakemail. It literally |
| explains the interfaces used with SMTP in detail enough that you should gain a |
| stronger awareness of what is going on across the multitude of networks which |
| make up the worldwide e-mail connections. It also contains my usual crude |
| remarks and grim hacker humor (assuming it hasn't again been edited out, but |
| I'm somewhat proud of the fact that Phrack heavily edited my "language" in last |
| issue's article. Oh well.). |
|
|
| There are two objectives in this file: first, I will attempt to show that |
| by using fakemail and SMTP, you can cause an amazing number of useful, hacker |
| related stunts; second, I shall attempt to be the first hacker to ever send a |
| piece of electronic mail completely around the world, ushering in a new age of |
| computerdom! |
|
|
| I suggest that, unless you don't want everyone lynching you, don't try to |
| fuck up anything that can't be repaired offhand. I've experimented with |
| fakemail beyond this article and the results were both impressive and |
| disastrous. Therefore, let's examine risks first, and then go onto the good |
| stuff. Basic philosophy -- use your brain if you've got one. |
|
|
|
|
| RISKS: |
|
|
| Getting caught doing this can be labeled as computer vandalism; it may |
| violate trespassing laws; it probably violates hundreds of NFS, Bitnet and |
| private company guidelines and ethics policies; and finally, it will no doubt |
| piss someone off to the point of intended revenge. |
|
|
| Networks have fairly good tracing abilities. If you are logged, your host |
| may be disconnected due to disciplinary referral by network authorities (I |
| don't think this has happened yet). Your account will almost definitely be |
| taken away, and if you are a member of the source or target computer's |
| company/organization, you can expect to face some sort of political shit that |
| could result in suspension, expulsion, firing, or otherwise getting the short |
| end of the stick for awhile. |
|
|
| Finally, if the government catches you attempting to vandalize another |
| computer system, you will probably get some sort of heavy fine, community |
| service, or both. |
|
|
| Odds of any of this happening if you are smart: < 1%. |
|
|
|
|
| PRECAUTIONS SUGGESTED: |
|
|
| If you have a bogus computer account (standard issue hacker necessity) |
| then for crissake use that. Don't let "them" know who really is hacking |
| around. (Point of clarification, I refer to "them" an awful lot in RL and in |
| philes. "They" are the boneheadded "do-gooders" who try to blame their own |
| lack of productivity or creativity on your committing of pseudo-crimes with a |
| computer. FBI, SS, administrators, accountants, SPA "Don't Copy that Floppy" |
| fucks, religious quacks, stupid rednecks, right wing conservative Republican |
| activists, pigs, NSA, politicians who still THINK they can control us, city |
| officials, judges, lame jurors that think a "hacker" only gets |
| slap-in-the-wrist punishments, lobbyists who want to blame their own failed |
| software on kids, bankers, investors, and probably every last appalled person |
| in Stifino's Italian Restaurant when the Colorado 2600 meeting was held there |
| last month. Enough of the paranoid Illuminati shit, back to the phile.) |
|
|
| Make sure that you delete history files, logs, etc. if you have |
| access to them. Try using computers that don't keep logs. Check /usr/adm, |
| /etc/logs to see what logs are kept. |
|
|
| If you can avoid using your local host (since you value network |
| connections in general), do so. It can avert suspicion that your host contains |
| "hackers." |
|
|
|
|
| IF YOU EVER ARE CONFRONTED: |
|
|
| "They must have broken into that account from some other site!" |
|
|
| "Hackers? Around here? I never check 'who' when I log in." |
|
|
| "They could have been super-user -- keep an eye out to see if the scum |
| comes back." |
|
|
| "Come on, they are probably making a big deal out of nothing. What could |
| be in e-mail that would be so bad?" |
|
|
| "Just delete the account and the culprit will be in your office tomorrow |
| morning." (Of course, you used a bogus account.) |
|
|
|
|
| PART ONE: ELECTRONIC MAIL |
|
|
| Basically, electronic mail has become the new medium of choice for |
| delivering thoughts in a hurry. It is faster than the post office, cheaper |
| than the post office, doesn't take vacations all the time like the post office, |
| and is completely free so it doesn't have unions. |
|
|
| Of course, you know all that and would rather spend this time making damn |
| sure you know what SMTP is. |
|
|
| To my knowledge, a completely accurate SMTP set of protocols hasn't been |
| published in any hacker journal. The original (at least, the first I've seen) |
| was published in the Legion of Doom Technical Journals and covered the minimum |
| SMTP steps necessary for the program "sendmail," found in a typical Unix |
| software package. |
|
|
| When you connect a raw socket to a remote SMTP compatible host, your |
| computer is expected to give a set of commands which will result in having the |
| sender, receiver, and message being transferred. However, unlike people who |
| prefer the speed of compression and security of raw integer data, the folks at |
| DARPA decided that SMTP would be pretty close to English. |
|
|
| If you are on the Internet, and you wanted to connect to the SMTP server, |
| type: |
|
|
| telnet <hostname> 25 |
|
|
| Port 25 is the standard port for SMTP. I doubt it would be too cool to |
| change this, since many mail servers connect to the target hosts directly. |
|
|
| [Editor's Note: All mail and SMTP commands have been offset by a ">" at the |
| beginning of each line in order not to confuse Internet mailers when sending |
| this article through e-mail.] |
|
|
| When you connect, you will get a small hostname identifier for whatever |
| SMTP server revision you've got. |
|
|
| 220 huggies.colorado.edu Sendmail 2.2/2.5 8/01/88 ready at Tue, 25 Aug 91 |
| 03:14:55 edt |
|
|
| Now that you are connected, the computer is waiting for commands. First |
| of all, you are expected to explain which computer you are calling in from. |
| This is done with the HELO <host> command. This can be anything at all, but if |
| you fail to give the exact host that you are connecting from, it causes the |
| following line to appear on the e-mail message the recipient gets from you: |
|
|
| > Apparently-to: The Racketeer <rack@lycaeum.hfc.com> |
|
|
| Instead of the classic: |
|
|
| > To: The Racketeer <rack@lycaeum.hfc.com> |
|
|
| This is the secret to great fakemail -- the ability to avoid the |
| "apparently-to" flag. Although it is subtle, it is a pain to avoid. In fact, |
| in some places, there are so many "protections" to SMTP that every outside |
| e-mail is marked with "Apparently-to." Hey, their problem. |
|
|
| So, go ahead and type the HELO command: |
|
|
| > HELO LYCAEUM.HFC.COM |
|
|
| The computer replies: |
|
|
| 250 huggies.colorado.edu Hello LYCAEUM.HFC.COM, pleased to meet you |
|
|
| Oh, a warm reception. Older sendmail software explains with the HELP |
| command that the computer doesn't care about HELO commands. You can check it |
| upon login with the command "HELP HELO." |
|
|
| Now what you will need to do is tell the computer who is supposed to get |
| the letter. From this point, there are all sorts of possibilities. First of |
| all, the format for the recipient would be: |
|
|
| > RCPT TO: <name@host> |
|
|
| And *NOTE*, the "<" and ">" symbols should be present! Some computers, |
| especially sticklers like Prime, won't even accept the letters unless they |
| adhere specifically to the protocol! Now, if you give a local address name, |
| such as: |
|
|
| > RCPT TO: <smith> |
|
|
| ...then it will treat the mail as if it were sent locally, even though it |
| was sent through the Internet. Giving a computer its own host name is valid, |
| although there is a chance that it will claim that the machine you are calling |
| from had something to do with it. |
|
|
| > RCPT TO: <smith@thishost> |
|
|
| ...will check to see if there is a "smith" at this particular computer. If |
| the computer finds "smith," then it will tell you there is no problem. If you |
| decide to use this computer as a forwarding host (between two other points), |
| you can type: |
|
|
| > RCPT TO: <smith@someotherhost> |
|
|
| This will cause the mail to be forwarded to someotherhost's SMTP port and |
| the letter will no longer be a problem for you. I'll be using this trick to |
| send my letter around the world. |
|
|
| Now, after you have given the name of the person who is to receive the |
| letter, you have to tell the computer who is sending it. |
|
|
| > MAIL FROM: <rack@lycaeum.hfc.com> ; Really from |
| > MAIL FROM: <rack> ; Localhost |
| > MAIL FROM: <rack@osi.mil> ; Fake -- "3rd party host" |
| > MAIL FROM: <lycaeum.hfc.com|rack> ; UUCP Path |
|
|
| Essentially, if you claim the letter is from a "3rd party," then the other |
| machine will accept it due to UUCP style routing. This will be explained later |
| on. |
|
|
| The next step is actually entering the e-mail message. The first few |
| lines of each message consists of the message title, X-Messages, headers, |
| Forwarding Lines, etc. These are completely up to the individual mail program, |
| but a few simple standards will be printed later, but first let's run through |
| the step-by-step way to send fakemail. You type anything that isn't preceded |
| by a number. |
|
|
| 220 hal.gnu.ai.mit.edu Sendmail AIX 3.2/UCB 5.64/4.0 ready at Tue, 21 Jul 1992 |
| 22:15:03 -0400 |
| > helo lycaeum.hfc.com |
| 250 hal.gnu.ai.mit.edu Hello lycaeum.hfc.com, pleased to meet you |
| > mail from: <rack@lycaeum.hfc.com> |
| 250 <rack@lycaeum.hfc.com>... Sender ok |
| > rcpt to: <phrack@gnu.ai.mit.edu> |
| 250 <phrack@gnu.ai.mit.edu>... Recipient ok |
| > data |
| 354 Enter mail, end with "." on a line by itself |
| > Yo, C.D. -- mind letting me use this account? |
| > . |
| 250 Ok |
| > quit |
|
|
| Now, here are a few more advanced ways of using sendmail. First of all, |
| there is the VRFY command. You can use this for two basic things: checking up |
| on a single user or checking up on a list of users. Anyone with basic |
| knowledge of ANY of the major computer networks knows that there are mailing |
| lists which allow several people to share mail. You can use the VRFY command |
| to view every member on the entire list. |
|
|
| > vrfy phrack |
| 250 Phrack Classic <phrack> |
|
|
| Or, to see everyone on a mailing list: |
|
|
| > vrfy phrack-staff-list |
| 250 Knight Lightning <kl@stormking.com> |
| 250 Dispater <dispater@stormking.com> |
|
|
| Note - this isn't the same thing as a LISTSERV -- like the one that |
| distributes Phrack. LISTSERVs themselves are quite powerful tools because they |
| allow people to sign on and off of lists without human moderation. Alias lists |
| are a serious problem to moderate effectively. |
|
|
| This can be useful to just check to see if an account exists. It can be |
| helpful if you suspect a machine has a hacked finger daemon or something to |
| hide the user's identity. Getting a list of users from mailing lists doesn't |
| have a great deal of uses, but if you are trying very hard to learn someone's |
| real identity, and you suspect they are signed up to a list, just check for all |
| users from that particular host site and see if there are any matches. |
|
|
| Finally, there is one last section to e-mail -- the actual message itself. |
| In fact, this is the most important area to concentrate on in order to avoid |
| the infamous "Apparently-to:" line. Basically, the data consists of a few |
| lines of title information and then the actual message follows. |
|
|
| There is a set of guidelines you must follow in order for the quotes to |
| appear in correct order. You won't want to have a space separate your titles |
| from your name, for example. Here is an example of a real e-mail message: |
|
|
| > From: rack@lycaeum.hfc.com |
| > Received: by dockmaster.ncsc.mil (5.12/3.7) id AA10000; Thu, 6 Feb 92 |
| > 12:00:00 |
| > Message-Id: <666.AA10000@dockmaster.ncsc.mil> |
| > To: RMorris@dockmaster.ncsc.mil |
| > Date: Thu, 06 Feb 92 12:00:00 |
| > Title: *wave* Hello, No Such Agency dude! |
| > |
| > NIST sucks. Say "hi" to your kid for me from all of us at Phrack! |
|
|
| Likewise, if you try to create a message without an information line, your |
| message would look something like this: |
|
|
| > From: rack@lycaeum.hfc.com |
| > Received: by dockmaster.ncsc.mil (5.12/3.7) id AA10000; Thu, 6 Feb 92 |
| > 12:00:00 -0500 |
| > Message-Id: <666.AA10000@dockmaster.ncsc.mil> |
| > Date: Thu, 06 Feb 92 12:00:00 |
| > Apparently-to: RMorris@dockmaster.ncsc.mil |
|
|
| > NIST sucks. Say "hi" to your kid for me from all of us at Phrack! |
|
|
| Basically, this looks pretty obvious that it's fakemail, not because I |
| altered the numbers necessarily, but because it doesn't have a title line, it |
| doesn't have the "Date:" in the right place, and because the "Apparently-to:" |
| designation was on. |
|
|
| To create the "realistic" e-mail, you would enter: |
|
|
| > helo lycaeum.hfc.com |
| > mail from: <rack@lycaeum.hfc.com> |
| > rcpt to: <RMorris@docmaster.ncsc.mil> |
| > data |
| > To: RMorris@dockmaster.ncsc.mil> |
| > Date: Thu, 06 Feb 92 12:00:00 |
| > Title: *wave* Hello, No Such Agency dude! |
| > |
| > NIST sucks. Say "hi" to your kid for me from all of us at Phrack! |
| > . |
|
|
| Notice that, even though you are in "data" mode, you are still giving |
| commands to sendmail. All of the lines can (even if only partially) be altered |
| through the data command. This is perfect for sending good fakemail. For |
| example: |
|
|
| > helo lycaeum.hfc.com |
| > mail from: <dale@opus.tymnet.com> |
| > rcpt to: <listserv@brownvm.brown.edu> |
| > data |
| > Received: by lycaeum.hfc.com (5.12/3.7) id AA11891; Thu 6 Feb 92 12:00:00 |
| > Message-Id: <230.AA11891@lycaeum.hfc.com> |
| > To: <listserv@brownvm.brown.edu> |
| > Date: Thu, 06 Feb 92 12:00:00 |
| > Title: Ohh, sign me up Puuuleeeze. |
| > |
| > subscribe BISEXU-L Dale "Fist Me" Drew |
| > . |
|
|
| Now, according to this e-mail path, you are telling the other computer |
| that you received this letter from OPUS.TYMNET.COM, and it is being forwarded |
| by your machine to BROWNVM.BROWN.EDU. Basically, you are stepping into the |
| middle of the line and claiming you've been waiting there all this time. This |
| is a legit method of sending e-mail! |
|
|
| Originally, when sendmail was less automated, you had to list every |
| computer that your mail had to move between in order for it to arrive. If you |
| were computer ALPHA, you'd have to send e-mail to account "joe" on computer |
| GAMMA by this address: |
|
|
| > mail to: <beta!ceti!delta!epsilon!freddy!gamma!joe> |
|
|
| Notice that the account name goes last and the host names "lead" up to |
| that account. The e-mail will be routed directly to each machine until it |
| finally reaches GAMMA. This is still required today, especially between |
| networks like Internet and Bitnet -- where certain hosts are capable of sending |
| mail between networks. This particular style of sending e-mail is called "UUCP |
| Style" routing. |
|
|
| Sometimes, hosts will use the forwarding UUCP style mail addresses in case |
| the host has no concept of how to deal with a name address. Your machine |
| simply routes the e-mail to a second host which is capable of resolving the |
| rest of the name. Although these machines are going out of style, they still |
| exist. |
|
|
| The third reasonable case of where e-mail will be routed between hosts is |
| when, instead of having each computer waste individual time dealing with each |
| piece of e-mail that comes about, the computer gives the mail to a dedicated |
| mailserver which will then deliver the mail. This is quite common all over the |
| network -- especially due to the fact that the Internet is only a few T1 lines |
| in comparison to the multitude of 9600 and 14.4K baud modems that everyone is |
| so protective of people over-using. Of course, this doesn't cause the address |
| to be in UUCP format, but when it reaches the other end of the network, it'll |
| be impossible to tell what method the letter used to get sent. |
|
|
| Okay, now we can send fairly reasonable electronic fakemail. This stuff |
| can't easily be distinguished between regular e-mail unless you either really |
| botched it up (say, sending fakemail between two people on the same machine by |
| way of 4 national hosts or something) or really had bad timing. |
|
|
| Let's now discuss the POWER of fakemail. Fakemail itself is basically a |
| great way to fool people into thinking you are someone else. You could try to |
| social engineer information out of people on a machine by fakemail, but at the |
| same time, why not just hack the root password and use "root" to do it? This |
| way you can get the reply to the mail as well. It doesn't seem reasonable to |
| social engineer anything while you are root either. Who knows. Maybe a really |
| great opportunity will pop up some day -- but until then, let's forget about |
| dealing person-to-person with fakemail, and instead deal with |
| person-to-machine. |
|
|
| There are many places on the Internet that respond to received electronic |
| mail automatically. You have all of the Archie sites that will respond, all of |
| the Internet/Bitnet LISTSERVs, and Bitmail FTP servers. Actually, there are |
| several other servers, too, such as the diplomacy adjudicator. Unfortunately, |
| this isn't anywhere nearly as annoying as what you can do with other servers. |
|
|
| First, let's cover LISTSERVs. As you saw above, I created a fakemail |
| message that would sign up Mr. Dale Drew to the BISEXU-L LISTSERV. This means |
| that any of the "netnews" regarding bisexual behavior on the Internet would be |
| sent directly to his mailbox. He would be on this list (which is public and |
| accessible by anyone) and likewise be assumed to be a member of the network |
| bisexual community. |
|
|
| This fakemail message would go all the way to the LISTSERV, it would |
| register Mr. Dictator for the BISEXU-L list, >DISCARD< my message, and, because |
| it thinks that Dale Drew sent the message, it will go ahead and sign him up to |
| receive all the bisexual information on the network. |
|
|
| And people wonder why I don't even give out my e-mail address. |
|
|
| The complete list of all groups on the Internet is available in the file |
| "list_of_lists" which is available almost everywhere so poke around |
| wuarchive.wustl.edu or ftp.uu.net until you find it. You'll notice that there |
| are several groups that are quite fanatic and would freak out nearly anybody |
| who was suddenly signed up to one. |
|
|
| Ever notice how big mega-companies like IBM squelch little people who try |
| to make copies of their ideas? Even though you cannot "patent" an "idea," |
| folks like IBM want you to believe they can. They send their "brute" squad of |
| cheap lawyers to "legal-fee-to-death" small firms. If you wanted to |
| "nickel-and-dime" someone out of existence, try considering the following: |
|
|
| CompuServe is now taking electronic mail from the Internet. This is good. |
| CompuServe charges for wasting too much of their drive space with stored |
| e-mail. This is bad. You can really freak out someone you don't like on |
| CompuServe by signing them up to the Dungeons and Dragons list, complete with |
| several megabytes of fluff per day. This is cool. They will then get charged |
| hefty fines by CompuServe. That is fucked up. How the hell could they know? |
|
|
| CompuServe e-mail addresses are userid@compuserve.com, but as the Internet |
| users realize, they can't send commas (",") as e-mail paths. Therefore, use a |
| period in place of every comma. If your e-mail address was 767,04821 on |
| CompuServe then it would be 767.04821 for the Internet. CompuServe tends to |
| "chop" most of the message headers that Internet creates out of the mail before |
| it reaches the end user. This makes them particularly vulnerable to fakemail. |
|
|
| You'll have to check with your individual pay services, but I believe such |
| groups as MCI Mail also have time limitations. Your typical non-Internet- |
| knowing schmuck would never figure out how to sign off of some God-awful fluff |
| contained LISTSERV such as the Advanced Dungeons & Dragons list. The amount of |
| damage you could cause in monetary value alone to an account would be |
| horrendous. |
|
|
| Some groups charge for connection time to the Internet -- admittedly, the |
| fees are reasonable -- I've seen the price at about $2 per hour for |
| communications. However, late at night, you could cause massive e-mail traffic |
| on some poor sap's line that they might not catch. They don't have a way to |
| shut this off, so they are basically screwed. Be WARY, though -- this sabotage |
| could land you in deep shit. It isn't actually fraud, but it could be |
| considered "unauthorized usage of equipment" and could get you a serious fine. |
| However, if you are good enough, you won't get caught and the poor fucks will |
| have to pay the fees themselves! |
|
|
| Now let's investigate short-term VOLUME damage to an e-mail address. |
| There are several anonymous FTP sites that exist out there with a service known |
| as BIT FTP. This means that a user from Bitnet, or one who just has e-mail and |
| no other network services, can still download files off of an FTP site. The |
| "help" file on this is stored in Appendix C, regarding the usage of Digital's |
| FTP mail server. |
|
|
| Basically, if you wanted to fool the FTP Mail Server into bombarding some |
| poor slob with an ungodly huge amount of mail, try doing a regular "fakemail" |
| on the guy, with the enclosed message packet: |
|
|
| > helo lycaeum.hfc.com |
| > mail from: <dale@opus.tymnet.com> |
| > rcpt to: <ftpmail@decwrl.dec.com> |
| > data |
| > Received: by lycaeum.hfc.com (5.12/3.7) id AA10992; Fri 9 Oct 92 12:00:00 |
| > Message-Id: <230.AA11891@lycaeum.hfc.com> |
| > To: <listserv@brownvm.brown.edu> |
| > Date: Fri, 09 Oct 92 12:00:00 |
| > Title: Hey, I don't have THAT nifty program! |
| > |
| > reply dale@opus.tymnet.com |
| > connect wuarchive.wustl.edu anonymous fistme@opus.tymnet.com |
| > binary |
| > get mirrors/gnu/gcc-2.3.2.tar.Z |
| > quit |
| > . |
|
|
| What is particularly nasty about this is that somewhere between 15 and |
| 20 megabytes of messages are going to be dumped into this poor guy's account. |
| All of the files will be uuencoded and broken down into separate messages! |
| Instead of deleting just one file, there will be literally hundreds of messages |
| to delete! Obnoxious! Nearly impossible to trace, too! |
|
|
|
|
| Part 2: E-MAIL AROUND THE WORLD |
|
|
| Captain Crunch happened to make a telephone call around the world, which |
| could have ushered in the age of phreak enlightenment -- after all, he proved |
| that, through the telephone, you could "touch someone" anywhere you wanted |
| around the world! Billions of people could be contacted. |
|
|
| I undoubtedly pissed off a great number of people trying to do this e-mail |
| trick -- having gotten automated complaints from many hosts. Apparently, every |
| country has some form of NSA. This doesn't surprise me at all, I'm just |
| somewhat amazed that entire HOSTS were disconnected during the times I used |
| them for routers. Fortunately, I was able to switch computers faster than they |
| were able to disconnect them. |
|
|
| In order to send the e-mail, I couldn't send it through a direct path. |
| What I had to do was execute UUCP style routing, meaning I told each host in |
| the path to send the e-mail to the next host in the path, etc., until the last |
| machine was done. Unfortunately, the first machine I used for sending the |
| e-mail had a remarkably efficient router and resolved the fact that the target |
| was indeed the destination. Therefore, I re-altered the path to a machine |
| sitting about, oh, two feet away from it. Those two feet are meaningless in |
| this epic journey. |
|
|
| The originating host names have been altered as to conceal my identity. |
| However, if we ever meet at a Con, I'll probably have the real print-out of the |
| results somewhere and you can verify its authenticity. Regardless, most of |
| this same shit will work from just about any typical college campus Internet |
| (and even Bitnet) connected machines. |
|
|
| In APPENDIX A, I've compiled a list of every foreign country that I could |
| locate on the Internet. I figured it was relatively important to keep with the |
| global program and pick a series of hosts to route through that would |
| presumably require relatively short hops. I did this by using this list and |
| trial and error (most of this information was procured from the Network |
| Information Center, even though they deliberately went way the hell out of |
| their way to make it difficult to get computers associated with foreign |
| countries). |
|
|
| My ultimate choice of a path was: |
|
|
| lycaeum.hfc.com -- Origin, "middle" America. |
| albert.gnu.ai.mit.edu -- Massachusetts, USA. |
| isgate.is -- Iceland |
| chenas.inria.fr -- France |
| icnucevx.cnuce.cn.it -- Italy |
| sangram.ncst.ernet.in -- India |
| waseda-mail.waseda.ac.jp -- Japan |
| seattleu.edu -- Seattle |
| inferno.hfc.com -- Ultimate Destination |
|
|
| The e-mail address came out to be: |
|
|
| isgate.is!chenas.inria.fr!icnucevx.cnuce.cn.it!sangram.ncst.ernet.in! |
| waseda-mail.waseda.ac.jp!seattleu.edu!inferno.hfc.com! |
| rack@albert.gnu.ai.mit.edu |
|
|
| ...meaning, first e-mail albert.gnu.ai.mit.edu, and let it parse the name |
| down a line, going to Iceland, then to France, etc. until it finally reaches |
| the last host on the list before the name, which is the Inferno, and deposits |
| the e-mail at rack@inferno.hfc.com. |
|
|
| This takes a LONG time, folks. Every failure toward the end took on |
| average of 8-10 hours before the e-mail was returned to me with the failure |
| message. In one case, in fact, the e-mail made it shore to shore and then came |
| all the way back because it couldn't resolve the last hostname! That one made |
| it (distance-wise) all the way around the world and half again. |
|
|
| Here is the final e-mail that I received (with dates, times, and numbers |
| altered to squelch any attempt to track me): |
|
|
| > Return-Path: <rack@lycaeum.hfc.com> |
| > Received: from sumax.seattleu.edu [192.48.211.120] by Lyceaum.HFC.Com ; 19 |
| Dec 92 16:23:21 MST |
| > Received: from waseda-mail.waseda.ac.jp by sumax.seattleu.edu with SMTP id |
| > AA28431 (5.65a/IDA-1.4.2 for rack@inferno.hfc.com); Sat, 19 Dec 92 |
| > 14:26:01 -0800 |
| > Received: from relay2.UU.NET by waseda-mail.waseda.ac.jp (5.67+1.6W/2.8Wb) |
| > id AA28431; Sun, 20 Dec 92 07:24:04 JST |
| > Return-Path: <rack@lycaeum.hfc.com> |
| > Received: from uunet.uu.net (via LOCALHOST.UU.NET) by relay2.UU.NET with SMTP |
| > (5.61/UUNET-internet-primary) id AA28431; Sat, 19 Dec 92 17:24:08 - |
| > 0500 |
| > Received: from sangam.UUCP by uunet.uu.net with UUCP/RMAIL |
| > (queueing-rmail) id 182330.3000; Sat, 19 Dec 1992 17:23:30 EST |
| > Received: by sangam.ncst.ernet.in (4.1/SMI-4.1-MHS-7.0) |
| > id AA28431; Sun, 20 Dec 92 03:50:19 IST |
| > From: rack@lycaeum.hfc.com |
| > Received: from shakti.ncst.ernet.in by saathi.ncst.ernet.in |
| > (5.61/Ultrix3.0-C) |
| > id AA28431; Sun, 20 Dec 92 03:52:12 +0530 |
| > Received: from saathi.ncst.ernet.in by shakti.ncst.ernet.in with SMTP |
| > (16.6/16.2) id AA09700; Sun, 20 Dec 92 03:51:37 +0530 |
| > Received: by saathi.ncst.ernet.in (5.61/Ultrix3.0-C) |
| > id AA28431; Sun, 20 Dec 92 03:52:09 +0530 |
| > Received: by sangam.ncst.ernet.in (4.1/SMI-4.1-MHS-7.0) |
| > id AA28431; Sun, 20 Dec 92 03:48:24 IST |
| > Received: from ICNUCEVX.CNUCE.CNR.IT by relay1.UU.NET with SMTP |
| > (5.61/UUNET-internet-primary) id AA28431; Sat, 19 Dec 92 17:20:23 |
| > -0500 |
| > Received: from chenas.inria.fr by ICNUCEVX.CNUCE.CNR.IT (PMDF #2961 ) id |
| > <01GSIP122UOW000FBT@ICNUCEVX.CNUCE.CNR.IT>; Sun, 19 Dec 1992 23:14:29 MET |
| > Received: from isgate.is by chenas.inria.fr (5.65c8d/92.02.29) via Fnet-EUnet |
| > id AA28431; Sun, 19 Dec 1992 23:19:58 +0100 (MET) |
| > Received: from albert.gnu.ai.mit.edu by isgate.is (5.65c8/ISnet/14-10-91); |
| > Sat, 19 Dec 1992 22:19:50 GMT |
| > Received: from lycaeum.hfc.com by albert.gnu.ai.mit.edu (5.65/4.0) with |
| > SMTP id <AA28431@albert.gnu.ai.mit.edu>; Sat, 19 Dec 92 17:19:36 -0500 |
| > Received: by lycaeum.hfc.com (5.65/4.0) id <AA11368@lycaeum.hfc.com>; |
| > Sat, 19 Dec 92 17:19:51 -0501 |
| > Date: 19 Dec 1992 17:19:50 -0500 (EST) |
| > Subject: Global E-Mail |
| > To: rack@inferno.hfc.com |
| > Message-id: <9212192666.AA11368@lycaeum.hfc.com> |
| > Mime-Version: 1.0 |
| > Content-Type: text/plain; charset=US-ASCII |
| > Content-Transfer-Encoding: 7bit |
| > X-Mailer: ELM [version 2.4 PL5] |
| > Content-Length: 94 |
| > X-Charset: ASCII |
| > X-Char-Esc: 29 |
| > |
| > This Electronic Mail has been completely around the world! |
| > |
| > (and isn't even a chain letter.) |
|
|
| =============================================================================== |
|
|
| APPENDIX A: |
|
|
| List of Countries on the Internet by Root Domain |
|
|
| (I tried to get a single mail router in each domain. The domains that don't |
| have them are unavailable at my security clearance. The computer is your |
| friend.) |
|
|
| .AQ New Zealand |
| .AR Argentina atina.ar |
| .AT Austria pythia.eduz.univie.ac.at |
| .BB Barbados |
| .BE Belgium ub4b.buug.be |
| .BG Bulgaria |
| .BO Bolivia unbol.bo |
| .BR Brazil fpsp.fapesp.br |
| .BS Bahamas |
| .BZ Belize |
| .CA Canada cs.ucb.ca |
| .CH Switzerland switch.ch |
| .CL Chile uchdcc.uchile.cl |
| .CN China ica.beijing.canet.cn |
| .CR Costa Rica huracan.cr |
| .CU Cuba |
| .DE Germany deins.informatik.uni-dortmund.de |
| .DK Denmark dkuug.dk |
| .EC Ecuador ecuanex.ec |
| .EE Estonia kbfi.ee |
| .EG Egypt |
| .FI Finland funet.fi |
| .FJ Fiji |
| .FR France inria.inria.fr |
| .GB England |
| .GR Greece csi.forth.gr |
| .HK Hong Kong hp9000.csc.cuhk.hk |
| .HU Hungary sztaki.hu |
| .IE Ireland nova.ucd.ie |
| .IL Israel relay.huji.ac.il |
| .IN India shakti.ernet.in |
| .IS Iceland isgate.is |
| .IT Italy deccnaf.infn.it |
| .JM Jamaica |
| .JP Japan jp-gate.wide.ad.jp |
| .KR South Korea kum.kaist.ac.kr |
| .LK Sri Lanka cse.mrt.ac.lk |
| .LT Lithuania ma-mii.lt.su |
| .LV Latvia |
| .MX Mexico mtec1.mty.itesm.mx |
| .MY Malaysia rangkom.my |
| .NA Namibia |
| .NI Nicaragua uni.ni |
| .NL Netherlands sering.cwi.nl |
| .NO Norway ifi.uio.no |
| .NZ New Zealand waikato.ac.nz |
| .PE Peru desco.pe |
| .PG New Guinea ee.unitech.ac.pg |
| .PH Philippines |
| .PK Pakistan |
| .PL Poland |
| .PR Puerto Rico sun386-gauss.pr |
| .PT Portugal ptifm2.ifm.rccn.pt |
| .PY Paraguay ledip.py |
| .SE Sweden sunic.sunet.se |
| .SG Singapore nuscc.nus.sg |
| .TH Thailand |
| .TN Tunisia spiky.rsinet.tn |
| .TR Turkey |
| .TT Trinidad & Tobago |
| .TW Taiwan twnmoe10.edu.tw |
| .UK United Kingdom ess.cs.ucl.ac.uk |
| .US United States isi.edu |
| .UY Uruguay seciu.uy |
| .VE Venezuela |
| .ZA South Africa hippo.ru.ac.za |
| .ZW Zimbabwe zimbix.uz.zw |
|
|
| =============================================================================== |
|
|
| APPENDIX B: |
|
|
| Basic SMTP Commands |
|
|
| > HELO <hostname> Tells mail daemon what machine is calling. This |
| will be determined anyway, so omission doesn't mean |
| anonymity. |
|
|
| > MAIL FROM: <path> Tells where the mail came from. |
|
|
| > RCPT TO: <path> Tells where the mail is going. |
|
|
| > DATA Command to start transmitting message. |
|
|
| > QUIT Quit mail daemon, disconnects socket. |
|
|
| > NOOP No Operation -- used for delays. |
|
|
| > HELP Gives list of commands -- sometimes disabled. |
|
|
| > VRFY Verifies if a path is valid on that machine. |
|
|
| > TICK Number of "ticks" from connection to present |
| ("0001" is a typical straight connection). |
|
|
| =============================================================================== |
|
|
| APPENDIX C: |
|
|
| BIT-FTP Help File |
|
|
| ftpmail@decwrl.dec.com (Digital FTP mail server) |
|
|
| Commands are: |
| reply <MAILADDR> Set reply address since headers are usually |
| wrong. |
| connect [HOST [USER [PASS]]] Defaults to gatekeeper.dec.com, anonymous. |
| ascii Files grabbed are printable ASCII. |
| binary Files grabbed are compressed or tar or both. |
| compress Compress binaries using Lempel-Ziv encoding. |
| compact Compress binaries using Huffman encoding. |
| uuencode Binary files will be mailed in uuencoded |
| format. |
| btoa Binary files will be mailed in btoa format. |
| ls (or dir) PLACE Short (long) directory listing. |
| get FILE Get a file and have it mailed to you. |
| quit Terminate script, ignore rest of mail message |
| (use if you have a .signature or are a |
| VMSMAIL user). |
|
|
| Notes: |
| -> You must give a "connect" command (default host is gatekeeper.dec.com, |
| default user is anonymous, default password is your mail address). |
| -> Binary files will not be compressed unless "compress" or "compact" |
| command is given; use this if at all possible, it helps a lot. |
| -> Binary files will always be formatted into printable ASCII with "btoa" or |
| "uuencode" (default is "btoa"). |
| -> All retrieved files will be split into 60KB chunks and mailed. |
| -> VMS/DOS/Mac versions of uudecode, atob, compress and compact are |
| available, ask your LOCAL wizard about them. |
| -> It will take ~1-1/2 day for a request to be processed. Once the jobs has |
| been accepted by the FTP daemon, you'll get a mail stating the fact that |
| your job has been accepted and that the result will be mailed to you. |
|
|