| ==Phrack Inc.== | |
| Volume Four, Issue Forty-One, File 4 of 13 | |
| Network Miscellany | |
| ******************************************************* | |
| < The POWER of Electronic Mail > | |
| ******************************************************* | |
| Compiled from Internet Sources | |
| by The Racketeer | |
| of The Hellfire Club | |
| Network Miscellany created by Taran King | |
| First of all, this guide is more than using fakemail. It literally | |
| explains the interfaces used with SMTP in detail enough that you should gain a | |
| stronger awareness of what is going on across the multitude of networks which | |
| make up the worldwide e-mail connections. It also contains my usual crude | |
| remarks and grim hacker humor (assuming it hasn't again been edited out, but | |
| I'm somewhat proud of the fact that Phrack heavily edited my "language" in last | |
| issue's article. Oh well.). | |
| There are two objectives in this file: first, I will attempt to show that | |
| by using fakemail and SMTP, you can cause an amazing number of useful, hacker | |
| related stunts; second, I shall attempt to be the first hacker to ever send a | |
| piece of electronic mail completely around the world, ushering in a new age of | |
| computerdom! | |
| I suggest that, unless you don't want everyone lynching you, don't try to | |
| fuck up anything that can't be repaired offhand. I've experimented with | |
| fakemail beyond this article and the results were both impressive and | |
| disastrous. Therefore, let's examine risks first, and then go onto the good | |
| stuff. Basic philosophy -- use your brain if you've got one. | |
| RISKS: | |
| Getting caught doing this can be labeled as computer vandalism; it may | |
| violate trespassing laws; it probably violates hundreds of NFS, Bitnet and | |
| private company guidelines and ethics policies; and finally, it will no doubt | |
| piss someone off to the point of intended revenge. | |
| Networks have fairly good tracing abilities. If you are logged, your host | |
| may be disconnected due to disciplinary referral by network authorities (I | |
| don't think this has happened yet). Your account will almost definitely be | |
| taken away, and if you are a member of the source or target computer's | |
| company/organization, you can expect to face some sort of political shit that | |
| could result in suspension, expulsion, firing, or otherwise getting the short | |
| end of the stick for awhile. | |
| Finally, if the government catches you attempting to vandalize another | |
| computer system, you will probably get some sort of heavy fine, community | |
| service, or both. | |
| Odds of any of this happening if you are smart: < 1%. | |
| PRECAUTIONS SUGGESTED: | |
| If you have a bogus computer account (standard issue hacker necessity) | |
| then for crissake use that. Don't let "them" know who really is hacking | |
| around. (Point of clarification, I refer to "them" an awful lot in RL and in | |
| philes. "They" are the boneheadded "do-gooders" who try to blame their own | |
| lack of productivity or creativity on your committing of pseudo-crimes with a | |
| computer. FBI, SS, administrators, accountants, SPA "Don't Copy that Floppy" | |
| fucks, religious quacks, stupid rednecks, right wing conservative Republican | |
| activists, pigs, NSA, politicians who still THINK they can control us, city | |
| officials, judges, lame jurors that think a "hacker" only gets | |
| slap-in-the-wrist punishments, lobbyists who want to blame their own failed | |
| software on kids, bankers, investors, and probably every last appalled person | |
| in Stifino's Italian Restaurant when the Colorado 2600 meeting was held there | |
| last month. Enough of the paranoid Illuminati shit, back to the phile.) | |
| Make sure that you delete history files, logs, etc. if you have | |
| access to them. Try using computers that don't keep logs. Check /usr/adm, | |
| /etc/logs to see what logs are kept. | |
| If you can avoid using your local host (since you value network | |
| connections in general), do so. It can avert suspicion that your host contains | |
| "hackers." | |
| IF YOU EVER ARE CONFRONTED: | |
| "They must have broken into that account from some other site!" | |
| "Hackers? Around here? I never check 'who' when I log in." | |
| "They could have been super-user -- keep an eye out to see if the scum | |
| comes back." | |
| "Come on, they are probably making a big deal out of nothing. What could | |
| be in e-mail that would be so bad?" | |
| "Just delete the account and the culprit will be in your office tomorrow | |
| morning." (Of course, you used a bogus account.) | |
| PART ONE: ELECTRONIC MAIL | |
| Basically, electronic mail has become the new medium of choice for | |
| delivering thoughts in a hurry. It is faster than the post office, cheaper | |
| than the post office, doesn't take vacations all the time like the post office, | |
| and is completely free so it doesn't have unions. | |
| Of course, you know all that and would rather spend this time making damn | |
| sure you know what SMTP is. | |
| To my knowledge, a completely accurate SMTP set of protocols hasn't been | |
| published in any hacker journal. The original (at least, the first I've seen) | |
| was published in the Legion of Doom Technical Journals and covered the minimum | |
| SMTP steps necessary for the program "sendmail," found in a typical Unix | |
| software package. | |
| When you connect a raw socket to a remote SMTP compatible host, your | |
| computer is expected to give a set of commands which will result in having the | |
| sender, receiver, and message being transferred. However, unlike people who | |
| prefer the speed of compression and security of raw integer data, the folks at | |
| DARPA decided that SMTP would be pretty close to English. | |
| If you are on the Internet, and you wanted to connect to the SMTP server, | |
| type: | |
| telnet <hostname> 25 | |
| Port 25 is the standard port for SMTP. I doubt it would be too cool to | |
| change this, since many mail servers connect to the target hosts directly. | |
| [Editor's Note: All mail and SMTP commands have been offset by a ">" at the | |
| beginning of each line in order not to confuse Internet mailers when sending | |
| this article through e-mail.] | |
| When you connect, you will get a small hostname identifier for whatever | |
| SMTP server revision you've got. | |
| 220 huggies.colorado.edu Sendmail 2.2/2.5 8/01/88 ready at Tue, 25 Aug 91 | |
| 03:14:55 edt | |
| Now that you are connected, the computer is waiting for commands. First | |
| of all, you are expected to explain which computer you are calling in from. | |
| This is done with the HELO <host> command. This can be anything at all, but if | |
| you fail to give the exact host that you are connecting from, it causes the | |
| following line to appear on the e-mail message the recipient gets from you: | |
| > Apparently-to: The Racketeer <rack@lycaeum.hfc.com> | |
| Instead of the classic: | |
| > To: The Racketeer <rack@lycaeum.hfc.com> | |
| This is the secret to great fakemail -- the ability to avoid the | |
| "apparently-to" flag. Although it is subtle, it is a pain to avoid. In fact, | |
| in some places, there are so many "protections" to SMTP that every outside | |
| e-mail is marked with "Apparently-to." Hey, their problem. | |
| So, go ahead and type the HELO command: | |
| > HELO LYCAEUM.HFC.COM | |
| The computer replies: | |
| 250 huggies.colorado.edu Hello LYCAEUM.HFC.COM, pleased to meet you | |
| Oh, a warm reception. Older sendmail software explains with the HELP | |
| command that the computer doesn't care about HELO commands. You can check it | |
| upon login with the command "HELP HELO." | |
| Now what you will need to do is tell the computer who is supposed to get | |
| the letter. From this point, there are all sorts of possibilities. First of | |
| all, the format for the recipient would be: | |
| > RCPT TO: <name@host> | |
| And *NOTE*, the "<" and ">" symbols should be present! Some computers, | |
| especially sticklers like Prime, won't even accept the letters unless they | |
| adhere specifically to the protocol! Now, if you give a local address name, | |
| such as: | |
| > RCPT TO: <smith> | |
| ...then it will treat the mail as if it were sent locally, even though it | |
| was sent through the Internet. Giving a computer its own host name is valid, | |
| although there is a chance that it will claim that the machine you are calling | |
| from had something to do with it. | |
| > RCPT TO: <smith@thishost> | |
| ...will check to see if there is a "smith" at this particular computer. If | |
| the computer finds "smith," then it will tell you there is no problem. If you | |
| decide to use this computer as a forwarding host (between two other points), | |
| you can type: | |
| > RCPT TO: <smith@someotherhost> | |
| This will cause the mail to be forwarded to someotherhost's SMTP port and | |
| the letter will no longer be a problem for you. I'll be using this trick to | |
| send my letter around the world. | |
| Now, after you have given the name of the person who is to receive the | |
| letter, you have to tell the computer who is sending it. | |
| > MAIL FROM: <rack@lycaeum.hfc.com> ; Really from | |
| > MAIL FROM: <rack> ; Localhost | |
| > MAIL FROM: <rack@osi.mil> ; Fake -- "3rd party host" | |
| > MAIL FROM: <lycaeum.hfc.com|rack> ; UUCP Path | |
| Essentially, if you claim the letter is from a "3rd party," then the other | |
| machine will accept it due to UUCP style routing. This will be explained later | |
| on. | |
| The next step is actually entering the e-mail message. The first few | |
| lines of each message consists of the message title, X-Messages, headers, | |
| Forwarding Lines, etc. These are completely up to the individual mail program, | |
| but a few simple standards will be printed later, but first let's run through | |
| the step-by-step way to send fakemail. You type anything that isn't preceded | |
| by a number. | |
| 220 hal.gnu.ai.mit.edu Sendmail AIX 3.2/UCB 5.64/4.0 ready at Tue, 21 Jul 1992 | |
| 22:15:03 -0400 | |
| > helo lycaeum.hfc.com | |
| 250 hal.gnu.ai.mit.edu Hello lycaeum.hfc.com, pleased to meet you | |
| > mail from: <rack@lycaeum.hfc.com> | |
| 250 <rack@lycaeum.hfc.com>... Sender ok | |
| > rcpt to: <phrack@gnu.ai.mit.edu> | |
| 250 <phrack@gnu.ai.mit.edu>... Recipient ok | |
| > data | |
| 354 Enter mail, end with "." on a line by itself | |
| > Yo, C.D. -- mind letting me use this account? | |
| > . | |
| 250 Ok | |
| > quit | |
| Now, here are a few more advanced ways of using sendmail. First of all, | |
| there is the VRFY command. You can use this for two basic things: checking up | |
| on a single user or checking up on a list of users. Anyone with basic | |
| knowledge of ANY of the major computer networks knows that there are mailing | |
| lists which allow several people to share mail. You can use the VRFY command | |
| to view every member on the entire list. | |
| > vrfy phrack | |
| 250 Phrack Classic <phrack> | |
| Or, to see everyone on a mailing list: | |
| > vrfy phrack-staff-list | |
| 250 Knight Lightning <kl@stormking.com> | |
| 250 Dispater <dispater@stormking.com> | |
| Note - this isn't the same thing as a LISTSERV -- like the one that | |
| distributes Phrack. LISTSERVs themselves are quite powerful tools because they | |
| allow people to sign on and off of lists without human moderation. Alias lists | |
| are a serious problem to moderate effectively. | |
| This can be useful to just check to see if an account exists. It can be | |
| helpful if you suspect a machine has a hacked finger daemon or something to | |
| hide the user's identity. Getting a list of users from mailing lists doesn't | |
| have a great deal of uses, but if you are trying very hard to learn someone's | |
| real identity, and you suspect they are signed up to a list, just check for all | |
| users from that particular host site and see if there are any matches. | |
| Finally, there is one last section to e-mail -- the actual message itself. | |
| In fact, this is the most important area to concentrate on in order to avoid | |
| the infamous "Apparently-to:" line. Basically, the data consists of a few | |
| lines of title information and then the actual message follows. | |
| There is a set of guidelines you must follow in order for the quotes to | |
| appear in correct order. You won't want to have a space separate your titles | |
| from your name, for example. Here is an example of a real e-mail message: | |
| > From: rack@lycaeum.hfc.com | |
| > Received: by dockmaster.ncsc.mil (5.12/3.7) id AA10000; Thu, 6 Feb 92 | |
| > 12:00:00 | |
| > Message-Id: <666.AA10000@dockmaster.ncsc.mil> | |
| > To: RMorris@dockmaster.ncsc.mil | |
| > Date: Thu, 06 Feb 92 12:00:00 | |
| > Title: *wave* Hello, No Such Agency dude! | |
| > | |
| > NIST sucks. Say "hi" to your kid for me from all of us at Phrack! | |
| Likewise, if you try to create a message without an information line, your | |
| message would look something like this: | |
| > From: rack@lycaeum.hfc.com | |
| > Received: by dockmaster.ncsc.mil (5.12/3.7) id AA10000; Thu, 6 Feb 92 | |
| > 12:00:00 -0500 | |
| > Message-Id: <666.AA10000@dockmaster.ncsc.mil> | |
| > Date: Thu, 06 Feb 92 12:00:00 | |
| > Apparently-to: RMorris@dockmaster.ncsc.mil | |
| > NIST sucks. Say "hi" to your kid for me from all of us at Phrack! | |
| Basically, this looks pretty obvious that it's fakemail, not because I | |
| altered the numbers necessarily, but because it doesn't have a title line, it | |
| doesn't have the "Date:" in the right place, and because the "Apparently-to:" | |
| designation was on. | |
| To create the "realistic" e-mail, you would enter: | |
| > helo lycaeum.hfc.com | |
| > mail from: <rack@lycaeum.hfc.com> | |
| > rcpt to: <RMorris@docmaster.ncsc.mil> | |
| > data | |
| > To: RMorris@dockmaster.ncsc.mil> | |
| > Date: Thu, 06 Feb 92 12:00:00 | |
| > Title: *wave* Hello, No Such Agency dude! | |
| > | |
| > NIST sucks. Say "hi" to your kid for me from all of us at Phrack! | |
| > . | |
| Notice that, even though you are in "data" mode, you are still giving | |
| commands to sendmail. All of the lines can (even if only partially) be altered | |
| through the data command. This is perfect for sending good fakemail. For | |
| example: | |
| > helo lycaeum.hfc.com | |
| > mail from: <dale@opus.tymnet.com> | |
| > rcpt to: <listserv@brownvm.brown.edu> | |
| > data | |
| > Received: by lycaeum.hfc.com (5.12/3.7) id AA11891; Thu 6 Feb 92 12:00:00 | |
| > Message-Id: <230.AA11891@lycaeum.hfc.com> | |
| > To: <listserv@brownvm.brown.edu> | |
| > Date: Thu, 06 Feb 92 12:00:00 | |
| > Title: Ohh, sign me up Puuuleeeze. | |
| > | |
| > subscribe BISEXU-L Dale "Fist Me" Drew | |
| > . | |
| Now, according to this e-mail path, you are telling the other computer | |
| that you received this letter from OPUS.TYMNET.COM, and it is being forwarded | |
| by your machine to BROWNVM.BROWN.EDU. Basically, you are stepping into the | |
| middle of the line and claiming you've been waiting there all this time. This | |
| is a legit method of sending e-mail! | |
| Originally, when sendmail was less automated, you had to list every | |
| computer that your mail had to move between in order for it to arrive. If you | |
| were computer ALPHA, you'd have to send e-mail to account "joe" on computer | |
| GAMMA by this address: | |
| > mail to: <beta!ceti!delta!epsilon!freddy!gamma!joe> | |
| Notice that the account name goes last and the host names "lead" up to | |
| that account. The e-mail will be routed directly to each machine until it | |
| finally reaches GAMMA. This is still required today, especially between | |
| networks like Internet and Bitnet -- where certain hosts are capable of sending | |
| mail between networks. This particular style of sending e-mail is called "UUCP | |
| Style" routing. | |
| Sometimes, hosts will use the forwarding UUCP style mail addresses in case | |
| the host has no concept of how to deal with a name address. Your machine | |
| simply routes the e-mail to a second host which is capable of resolving the | |
| rest of the name. Although these machines are going out of style, they still | |
| exist. | |
| The third reasonable case of where e-mail will be routed between hosts is | |
| when, instead of having each computer waste individual time dealing with each | |
| piece of e-mail that comes about, the computer gives the mail to a dedicated | |
| mailserver which will then deliver the mail. This is quite common all over the | |
| network -- especially due to the fact that the Internet is only a few T1 lines | |
| in comparison to the multitude of 9600 and 14.4K baud modems that everyone is | |
| so protective of people over-using. Of course, this doesn't cause the address | |
| to be in UUCP format, but when it reaches the other end of the network, it'll | |
| be impossible to tell what method the letter used to get sent. | |
| Okay, now we can send fairly reasonable electronic fakemail. This stuff | |
| can't easily be distinguished between regular e-mail unless you either really | |
| botched it up (say, sending fakemail between two people on the same machine by | |
| way of 4 national hosts or something) or really had bad timing. | |
| Let's now discuss the POWER of fakemail. Fakemail itself is basically a | |
| great way to fool people into thinking you are someone else. You could try to | |
| social engineer information out of people on a machine by fakemail, but at the | |
| same time, why not just hack the root password and use "root" to do it? This | |
| way you can get the reply to the mail as well. It doesn't seem reasonable to | |
| social engineer anything while you are root either. Who knows. Maybe a really | |
| great opportunity will pop up some day -- but until then, let's forget about | |
| dealing person-to-person with fakemail, and instead deal with | |
| person-to-machine. | |
| There are many places on the Internet that respond to received electronic | |
| mail automatically. You have all of the Archie sites that will respond, all of | |
| the Internet/Bitnet LISTSERVs, and Bitmail FTP servers. Actually, there are | |
| several other servers, too, such as the diplomacy adjudicator. Unfortunately, | |
| this isn't anywhere nearly as annoying as what you can do with other servers. | |
| First, let's cover LISTSERVs. As you saw above, I created a fakemail | |
| message that would sign up Mr. Dale Drew to the BISEXU-L LISTSERV. This means | |
| that any of the "netnews" regarding bisexual behavior on the Internet would be | |
| sent directly to his mailbox. He would be on this list (which is public and | |
| accessible by anyone) and likewise be assumed to be a member of the network | |
| bisexual community. | |
| This fakemail message would go all the way to the LISTSERV, it would | |
| register Mr. Dictator for the BISEXU-L list, >DISCARD< my message, and, because | |
| it thinks that Dale Drew sent the message, it will go ahead and sign him up to | |
| receive all the bisexual information on the network. | |
| And people wonder why I don't even give out my e-mail address. | |
| The complete list of all groups on the Internet is available in the file | |
| "list_of_lists" which is available almost everywhere so poke around | |
| wuarchive.wustl.edu or ftp.uu.net until you find it. You'll notice that there | |
| are several groups that are quite fanatic and would freak out nearly anybody | |
| who was suddenly signed up to one. | |
| Ever notice how big mega-companies like IBM squelch little people who try | |
| to make copies of their ideas? Even though you cannot "patent" an "idea," | |
| folks like IBM want you to believe they can. They send their "brute" squad of | |
| cheap lawyers to "legal-fee-to-death" small firms. If you wanted to | |
| "nickel-and-dime" someone out of existence, try considering the following: | |
| CompuServe is now taking electronic mail from the Internet. This is good. | |
| CompuServe charges for wasting too much of their drive space with stored | |
| e-mail. This is bad. You can really freak out someone you don't like on | |
| CompuServe by signing them up to the Dungeons and Dragons list, complete with | |
| several megabytes of fluff per day. This is cool. They will then get charged | |
| hefty fines by CompuServe. That is fucked up. How the hell could they know? | |
| CompuServe e-mail addresses are userid@compuserve.com, but as the Internet | |
| users realize, they can't send commas (",") as e-mail paths. Therefore, use a | |
| period in place of every comma. If your e-mail address was 767,04821 on | |
| CompuServe then it would be 767.04821 for the Internet. CompuServe tends to | |
| "chop" most of the message headers that Internet creates out of the mail before | |
| it reaches the end user. This makes them particularly vulnerable to fakemail. | |
| You'll have to check with your individual pay services, but I believe such | |
| groups as MCI Mail also have time limitations. Your typical non-Internet- | |
| knowing schmuck would never figure out how to sign off of some God-awful fluff | |
| contained LISTSERV such as the Advanced Dungeons & Dragons list. The amount of | |
| damage you could cause in monetary value alone to an account would be | |
| horrendous. | |
| Some groups charge for connection time to the Internet -- admittedly, the | |
| fees are reasonable -- I've seen the price at about $2 per hour for | |
| communications. However, late at night, you could cause massive e-mail traffic | |
| on some poor sap's line that they might not catch. They don't have a way to | |
| shut this off, so they are basically screwed. Be WARY, though -- this sabotage | |
| could land you in deep shit. It isn't actually fraud, but it could be | |
| considered "unauthorized usage of equipment" and could get you a serious fine. | |
| However, if you are good enough, you won't get caught and the poor fucks will | |
| have to pay the fees themselves! | |
| Now let's investigate short-term VOLUME damage to an e-mail address. | |
| There are several anonymous FTP sites that exist out there with a service known | |
| as BIT FTP. This means that a user from Bitnet, or one who just has e-mail and | |
| no other network services, can still download files off of an FTP site. The | |
| "help" file on this is stored in Appendix C, regarding the usage of Digital's | |
| FTP mail server. | |
| Basically, if you wanted to fool the FTP Mail Server into bombarding some | |
| poor slob with an ungodly huge amount of mail, try doing a regular "fakemail" | |
| on the guy, with the enclosed message packet: | |
| > helo lycaeum.hfc.com | |
| > mail from: <dale@opus.tymnet.com> | |
| > rcpt to: <ftpmail@decwrl.dec.com> | |
| > data | |
| > Received: by lycaeum.hfc.com (5.12/3.7) id AA10992; Fri 9 Oct 92 12:00:00 | |
| > Message-Id: <230.AA11891@lycaeum.hfc.com> | |
| > To: <listserv@brownvm.brown.edu> | |
| > Date: Fri, 09 Oct 92 12:00:00 | |
| > Title: Hey, I don't have THAT nifty program! | |
| > | |
| > reply dale@opus.tymnet.com | |
| > connect wuarchive.wustl.edu anonymous fistme@opus.tymnet.com | |
| > binary | |
| > get mirrors/gnu/gcc-2.3.2.tar.Z | |
| > quit | |
| > . | |
| What is particularly nasty about this is that somewhere between 15 and | |
| 20 megabytes of messages are going to be dumped into this poor guy's account. | |
| All of the files will be uuencoded and broken down into separate messages! | |
| Instead of deleting just one file, there will be literally hundreds of messages | |
| to delete! Obnoxious! Nearly impossible to trace, too! | |
| Part 2: E-MAIL AROUND THE WORLD | |
| Captain Crunch happened to make a telephone call around the world, which | |
| could have ushered in the age of phreak enlightenment -- after all, he proved | |
| that, through the telephone, you could "touch someone" anywhere you wanted | |
| around the world! Billions of people could be contacted. | |
| I undoubtedly pissed off a great number of people trying to do this e-mail | |
| trick -- having gotten automated complaints from many hosts. Apparently, every | |
| country has some form of NSA. This doesn't surprise me at all, I'm just | |
| somewhat amazed that entire HOSTS were disconnected during the times I used | |
| them for routers. Fortunately, I was able to switch computers faster than they | |
| were able to disconnect them. | |
| In order to send the e-mail, I couldn't send it through a direct path. | |
| What I had to do was execute UUCP style routing, meaning I told each host in | |
| the path to send the e-mail to the next host in the path, etc., until the last | |
| machine was done. Unfortunately, the first machine I used for sending the | |
| e-mail had a remarkably efficient router and resolved the fact that the target | |
| was indeed the destination. Therefore, I re-altered the path to a machine | |
| sitting about, oh, two feet away from it. Those two feet are meaningless in | |
| this epic journey. | |
| The originating host names have been altered as to conceal my identity. | |
| However, if we ever meet at a Con, I'll probably have the real print-out of the | |
| results somewhere and you can verify its authenticity. Regardless, most of | |
| this same shit will work from just about any typical college campus Internet | |
| (and even Bitnet) connected machines. | |
| In APPENDIX A, I've compiled a list of every foreign country that I could | |
| locate on the Internet. I figured it was relatively important to keep with the | |
| global program and pick a series of hosts to route through that would | |
| presumably require relatively short hops. I did this by using this list and | |
| trial and error (most of this information was procured from the Network | |
| Information Center, even though they deliberately went way the hell out of | |
| their way to make it difficult to get computers associated with foreign | |
| countries). | |
| My ultimate choice of a path was: | |
| lycaeum.hfc.com -- Origin, "middle" America. | |
| albert.gnu.ai.mit.edu -- Massachusetts, USA. | |
| isgate.is -- Iceland | |
| chenas.inria.fr -- France | |
| icnucevx.cnuce.cn.it -- Italy | |
| sangram.ncst.ernet.in -- India | |
| waseda-mail.waseda.ac.jp -- Japan | |
| seattleu.edu -- Seattle | |
| inferno.hfc.com -- Ultimate Destination | |
| The e-mail address came out to be: | |
| isgate.is!chenas.inria.fr!icnucevx.cnuce.cn.it!sangram.ncst.ernet.in! | |
| waseda-mail.waseda.ac.jp!seattleu.edu!inferno.hfc.com! | |
| rack@albert.gnu.ai.mit.edu | |
| ...meaning, first e-mail albert.gnu.ai.mit.edu, and let it parse the name | |
| down a line, going to Iceland, then to France, etc. until it finally reaches | |
| the last host on the list before the name, which is the Inferno, and deposits | |
| the e-mail at rack@inferno.hfc.com. | |
| This takes a LONG time, folks. Every failure toward the end took on | |
| average of 8-10 hours before the e-mail was returned to me with the failure | |
| message. In one case, in fact, the e-mail made it shore to shore and then came | |
| all the way back because it couldn't resolve the last hostname! That one made | |
| it (distance-wise) all the way around the world and half again. | |
| Here is the final e-mail that I received (with dates, times, and numbers | |
| altered to squelch any attempt to track me): | |
| > Return-Path: <rack@lycaeum.hfc.com> | |
| > Received: from sumax.seattleu.edu [192.48.211.120] by Lyceaum.HFC.Com ; 19 | |
| Dec 92 16:23:21 MST | |
| > Received: from waseda-mail.waseda.ac.jp by sumax.seattleu.edu with SMTP id | |
| > AA28431 (5.65a/IDA-1.4.2 for rack@inferno.hfc.com); Sat, 19 Dec 92 | |
| > 14:26:01 -0800 | |
| > Received: from relay2.UU.NET by waseda-mail.waseda.ac.jp (5.67+1.6W/2.8Wb) | |
| > id AA28431; Sun, 20 Dec 92 07:24:04 JST | |
| > Return-Path: <rack@lycaeum.hfc.com> | |
| > Received: from uunet.uu.net (via LOCALHOST.UU.NET) by relay2.UU.NET with SMTP | |
| > (5.61/UUNET-internet-primary) id AA28431; Sat, 19 Dec 92 17:24:08 - | |
| > 0500 | |
| > Received: from sangam.UUCP by uunet.uu.net with UUCP/RMAIL | |
| > (queueing-rmail) id 182330.3000; Sat, 19 Dec 1992 17:23:30 EST | |
| > Received: by sangam.ncst.ernet.in (4.1/SMI-4.1-MHS-7.0) | |
| > id AA28431; Sun, 20 Dec 92 03:50:19 IST | |
| > From: rack@lycaeum.hfc.com | |
| > Received: from shakti.ncst.ernet.in by saathi.ncst.ernet.in | |
| > (5.61/Ultrix3.0-C) | |
| > id AA28431; Sun, 20 Dec 92 03:52:12 +0530 | |
| > Received: from saathi.ncst.ernet.in by shakti.ncst.ernet.in with SMTP | |
| > (16.6/16.2) id AA09700; Sun, 20 Dec 92 03:51:37 +0530 | |
| > Received: by saathi.ncst.ernet.in (5.61/Ultrix3.0-C) | |
| > id AA28431; Sun, 20 Dec 92 03:52:09 +0530 | |
| > Received: by sangam.ncst.ernet.in (4.1/SMI-4.1-MHS-7.0) | |
| > id AA28431; Sun, 20 Dec 92 03:48:24 IST | |
| > Received: from ICNUCEVX.CNUCE.CNR.IT by relay1.UU.NET with SMTP | |
| > (5.61/UUNET-internet-primary) id AA28431; Sat, 19 Dec 92 17:20:23 | |
| > -0500 | |
| > Received: from chenas.inria.fr by ICNUCEVX.CNUCE.CNR.IT (PMDF #2961 ) id | |
| > <01GSIP122UOW000FBT@ICNUCEVX.CNUCE.CNR.IT>; Sun, 19 Dec 1992 23:14:29 MET | |
| > Received: from isgate.is by chenas.inria.fr (5.65c8d/92.02.29) via Fnet-EUnet | |
| > id AA28431; Sun, 19 Dec 1992 23:19:58 +0100 (MET) | |
| > Received: from albert.gnu.ai.mit.edu by isgate.is (5.65c8/ISnet/14-10-91); | |
| > Sat, 19 Dec 1992 22:19:50 GMT | |
| > Received: from lycaeum.hfc.com by albert.gnu.ai.mit.edu (5.65/4.0) with | |
| > SMTP id <AA28431@albert.gnu.ai.mit.edu>; Sat, 19 Dec 92 17:19:36 -0500 | |
| > Received: by lycaeum.hfc.com (5.65/4.0) id <AA11368@lycaeum.hfc.com>; | |
| > Sat, 19 Dec 92 17:19:51 -0501 | |
| > Date: 19 Dec 1992 17:19:50 -0500 (EST) | |
| > Subject: Global E-Mail | |
| > To: rack@inferno.hfc.com | |
| > Message-id: <9212192666.AA11368@lycaeum.hfc.com> | |
| > Mime-Version: 1.0 | |
| > Content-Type: text/plain; charset=US-ASCII | |
| > Content-Transfer-Encoding: 7bit | |
| > X-Mailer: ELM [version 2.4 PL5] | |
| > Content-Length: 94 | |
| > X-Charset: ASCII | |
| > X-Char-Esc: 29 | |
| > | |
| > This Electronic Mail has been completely around the world! | |
| > | |
| > (and isn't even a chain letter.) | |
| =============================================================================== | |
| APPENDIX A: | |
| List of Countries on the Internet by Root Domain | |
| (I tried to get a single mail router in each domain. The domains that don't | |
| have them are unavailable at my security clearance. The computer is your | |
| friend.) | |
| .AQ New Zealand | |
| .AR Argentina atina.ar | |
| .AT Austria pythia.eduz.univie.ac.at | |
| .BB Barbados | |
| .BE Belgium ub4b.buug.be | |
| .BG Bulgaria | |
| .BO Bolivia unbol.bo | |
| .BR Brazil fpsp.fapesp.br | |
| .BS Bahamas | |
| .BZ Belize | |
| .CA Canada cs.ucb.ca | |
| .CH Switzerland switch.ch | |
| .CL Chile uchdcc.uchile.cl | |
| .CN China ica.beijing.canet.cn | |
| .CR Costa Rica huracan.cr | |
| .CU Cuba | |
| .DE Germany deins.informatik.uni-dortmund.de | |
| .DK Denmark dkuug.dk | |
| .EC Ecuador ecuanex.ec | |
| .EE Estonia kbfi.ee | |
| .EG Egypt | |
| .FI Finland funet.fi | |
| .FJ Fiji | |
| .FR France inria.inria.fr | |
| .GB England | |
| .GR Greece csi.forth.gr | |
| .HK Hong Kong hp9000.csc.cuhk.hk | |
| .HU Hungary sztaki.hu | |
| .IE Ireland nova.ucd.ie | |
| .IL Israel relay.huji.ac.il | |
| .IN India shakti.ernet.in | |
| .IS Iceland isgate.is | |
| .IT Italy deccnaf.infn.it | |
| .JM Jamaica | |
| .JP Japan jp-gate.wide.ad.jp | |
| .KR South Korea kum.kaist.ac.kr | |
| .LK Sri Lanka cse.mrt.ac.lk | |
| .LT Lithuania ma-mii.lt.su | |
| .LV Latvia | |
| .MX Mexico mtec1.mty.itesm.mx | |
| .MY Malaysia rangkom.my | |
| .NA Namibia | |
| .NI Nicaragua uni.ni | |
| .NL Netherlands sering.cwi.nl | |
| .NO Norway ifi.uio.no | |
| .NZ New Zealand waikato.ac.nz | |
| .PE Peru desco.pe | |
| .PG New Guinea ee.unitech.ac.pg | |
| .PH Philippines | |
| .PK Pakistan | |
| .PL Poland | |
| .PR Puerto Rico sun386-gauss.pr | |
| .PT Portugal ptifm2.ifm.rccn.pt | |
| .PY Paraguay ledip.py | |
| .SE Sweden sunic.sunet.se | |
| .SG Singapore nuscc.nus.sg | |
| .TH Thailand | |
| .TN Tunisia spiky.rsinet.tn | |
| .TR Turkey | |
| .TT Trinidad & Tobago | |
| .TW Taiwan twnmoe10.edu.tw | |
| .UK United Kingdom ess.cs.ucl.ac.uk | |
| .US United States isi.edu | |
| .UY Uruguay seciu.uy | |
| .VE Venezuela | |
| .ZA South Africa hippo.ru.ac.za | |
| .ZW Zimbabwe zimbix.uz.zw | |
| =============================================================================== | |
| APPENDIX B: | |
| Basic SMTP Commands | |
| > HELO <hostname> Tells mail daemon what machine is calling. This | |
| will be determined anyway, so omission doesn't mean | |
| anonymity. | |
| > MAIL FROM: <path> Tells where the mail came from. | |
| > RCPT TO: <path> Tells where the mail is going. | |
| > DATA Command to start transmitting message. | |
| > QUIT Quit mail daemon, disconnects socket. | |
| > NOOP No Operation -- used for delays. | |
| > HELP Gives list of commands -- sometimes disabled. | |
| > VRFY Verifies if a path is valid on that machine. | |
| > TICK Number of "ticks" from connection to present | |
| ("0001" is a typical straight connection). | |
| =============================================================================== | |
| APPENDIX C: | |
| BIT-FTP Help File | |
| ftpmail@decwrl.dec.com (Digital FTP mail server) | |
| Commands are: | |
| reply <MAILADDR> Set reply address since headers are usually | |
| wrong. | |
| connect [HOST [USER [PASS]]] Defaults to gatekeeper.dec.com, anonymous. | |
| ascii Files grabbed are printable ASCII. | |
| binary Files grabbed are compressed or tar or both. | |
| compress Compress binaries using Lempel-Ziv encoding. | |
| compact Compress binaries using Huffman encoding. | |
| uuencode Binary files will be mailed in uuencoded | |
| format. | |
| btoa Binary files will be mailed in btoa format. | |
| ls (or dir) PLACE Short (long) directory listing. | |
| get FILE Get a file and have it mailed to you. | |
| quit Terminate script, ignore rest of mail message | |
| (use if you have a .signature or are a | |
| VMSMAIL user). | |
| Notes: | |
| -> You must give a "connect" command (default host is gatekeeper.dec.com, | |
| default user is anonymous, default password is your mail address). | |
| -> Binary files will not be compressed unless "compress" or "compact" | |
| command is given; use this if at all possible, it helps a lot. | |
| -> Binary files will always be formatted into printable ASCII with "btoa" or | |
| "uuencode" (default is "btoa"). | |
| -> All retrieved files will be split into 60KB chunks and mailed. | |
| -> VMS/DOS/Mac versions of uudecode, atob, compress and compact are | |
| available, ask your LOCAL wizard about them. | |
| -> It will take ~1-1/2 day for a request to be processed. Once the jobs has | |
| been accepted by the FTP daemon, you'll get a mail stating the fact that | |
| your job has been accepted and that the result will be mailed to you. | |