I don't like spam!
Dec. 8th, 2003 06:19 pm... but by and large I just shrug and delete it, even though recently the sheer volume of the stuff has been truly incredible.
But today, on a whim, I went to look at the website for one of those Natwest scams. The mail claimed to be from support@natwest.com, and the text of the message was as follows:
Now, to me it's perfectly obvious that this isn't kosher. For one thing, the peculiar translationese ("will help you to avoid frequently fraud transactions and to keep your investments in safety"?) isn't at all what I'd expect from an official Natwest email. For another thing, I've never heard of a "Bank Mail"; it sounds like a scammy invention. (I'm sure people will now tell me that it's a perfectly legit term and has a very specific meaning!) But the real clincher is that I haven't had an account with Natwest for over 7 years now.
Nonetheless, I went to have a look at the site out of curiosity, and it's really quite impressive -- the site pointed to in the email looks just like the Natwest online banking login page. And indeed, https://www.nwolb.com/ is the Natwest OB page. So, as the TV show asks, "How do they do that?"
Well, that's when
sion_a pointed me at the source:
To log into your account, please visit the NatWest Online Banking
https://www.nwolb.com/
Weird linebreak, yeah, but so what? Well, after that "nwolb.com" comes an eternity of whitespace, followed by this:
:UserSession=2f4d0zzz899amaiioiiabv5589955&userrstste=SecurityUpdate&StateLevel=CameFrom@64.174.108.131/
Ah-HA. Suddenly it becomes a lot clearer (not that I know exactly what they're doing, but at least it tells me how one page can be a stinking great bear-trap and another apparently-identical page can be the genuine article).
This is a really, really dirty trick. I can't help but be impressed at the deviousness, but at the same time it's horrifying to think of how many people are likely to be taken in by this kind of thing. Oh, I know, it's probably old news by now (and indeed the IP address in the clever-hacky-stuff above is unpingable, suggesting that this one's already been nailed) but it's still a scary thought -- not least because even if this particular scam has been stopped, there's nothing to stop other people doing the same thing again, only more cleverly. And even without the added cleverness, there will always be new people to fall for the same old tricks...
But today, on a whim, I went to look at the website for one of those Natwest scams. The mail claimed to be from support@natwest.com, and the text of the message was as follows:
Dear Valued Customer,
- Our new security system will help you to avoid frequently fraud transactions and to keep your investments in safety.
- Due to technical update we recommend you to reactivate your account.
Click on the link below to login and begin using your updated NatWest account.
To log into your account, please visit the NatWest Online Banking https://www.nwolb.com/
If you have questions about your online statement, please send us a Bank Mail or call us at 0846 600 2323 (outside the UK dial +44 247 686 2063).
We appreciate your business. It's truly our pleasure to serve you.
NatWest Customer Care
This email is for notification only. To contact us, please log into your account and send a Bank Mail.
Now, to me it's perfectly obvious that this isn't kosher. For one thing, the peculiar translationese ("will help you to avoid frequently fraud transactions and to keep your investments in safety"?) isn't at all what I'd expect from an official Natwest email. For another thing, I've never heard of a "Bank Mail"; it sounds like a scammy invention. (I'm sure people will now tell me that it's a perfectly legit term and has a very specific meaning!) But the real clincher is that I haven't had an account with Natwest for over 7 years now.
Nonetheless, I went to have a look at the site out of curiosity, and it's really quite impressive -- the site pointed to in the email looks just like the Natwest online banking login page. And indeed, https://www.nwolb.com/ is the Natwest OB page. So, as the TV show asks, "How do they do that?"
Well, that's when
To log into your account, please visit the NatWest Online Banking
https://www.nwolb.com/
Weird linebreak, yeah, but so what? Well, after that "nwolb.com" comes an eternity of whitespace, followed by this:
:UserSession=2f4d0zzz899amaiioiiabv5589955&userrstste=SecurityUpdate&StateLevel=CameFrom@64.174.108.131/
Ah-HA. Suddenly it becomes a lot clearer (not that I know exactly what they're doing, but at least it tells me how one page can be a stinking great bear-trap and another apparently-identical page can be the genuine article).
This is a really, really dirty trick. I can't help but be impressed at the deviousness, but at the same time it's horrifying to think of how many people are likely to be taken in by this kind of thing. Oh, I know, it's probably old news by now (and indeed the IP address in the clever-hacky-stuff above is unpingable, suggesting that this one's already been nailed) but it's still a scary thought -- not least because even if this particular scam has been stopped, there's nothing to stop other people doing the same thing again, only more cleverly. And even without the added cleverness, there will always be new people to fall for the same old tricks...
no subject
Date: 2003-12-08 02:08 pm (UTC)userinfo = *( unreserved | escaped | ";" | ":" | "&" | "=" | "+" | "$" | "," )'/' is already banned as a character in userinfo, and for good reason. Similarly, spaces aren't allowed in URIs, IPv4 addresses in URIs are required to be dotted-quads (and no sneaky using hex or octal), and HTTP URIs aren't allowed to contain userinfo at all. All that's needed is for the stupid browsers to actually enforce the rules that already exist.Please excuse me. I seem to be ranting.
no subject
Date: 2003-12-08 04:22 pm (UTC)no subject
Date: 2003-12-09 02:46 am (UTC)They are allowed but should be stripped out, per the appendix in RFC 1738.
no subject
Date: 2003-12-09 06:53 am (UTC)A strict reading of the relevant RFCs does seem to indicate this, yes. On the other hand, when they are used legitimately (rather than in nasty hacks like this) I don't see any reason why that should be the case. There is such a thing as a web page which requires a user name and password, so the fact that they are allowed in FTP URLs but not HTTP URLs seems slightly arbitrary. Moreover, RFC 2396 claims to replace 1738 and allows userinfo for any IP-based protocol in general, saying that scheme-specific details will be published in further documents - however, I can't find any such document detailing the restrictions of HTTP URLs. (Mind you, 2068 also contains a description of HTTP URLs which omits the userinfo part.)
IPv4 addresses in URIs are required to be dotted-quads
I'm fairly sure that IPv4 addresses in general are required to be dotted-quads (in decimal); the fact that most IPv4 implementations accept a 32-bit number seems to be a bug (although saying `0' instead of `localhost' does save a bit of typing sometimes) and is not necessarily the browser's fault (though this did expose a further bug in IE whereby the non-dotted number was considered to be an intranet address and thus placed in the trusted zone).
no subject
Date: 2003-12-09 10:10 am (UTC)There are two reasons why FTP needs userinfo where HTTP doesn't:
- Anonymous FTP is only a convention, not a standard, so some FTP servers might use different user names for anonymous access and need a way to override it.
- FTP doesn't distinguish "file not found" from "authentication required", so the client doesn't know when to prompt for a username/password to access a protected resource, and hence needs a hint in the URI.
As its introduction points out, RFC 2396 defines a superset of all valid URIs, so the fact that it permits something doesn't say require any scheme to permit it. According to the IANA list (http://www.iana.org/assignments/uri-schemes), RFC 2616 is the definition of HTTP URIs, and is quite clear that HTTP URIs never contain userinfo, just as they never contain params.I'm fairly sure that IPv4 addresses in general are required to be dotted-quads (in decimal)
Can you quote C&V for that? I tried once, and eventually gave up. Certainly, some standards (POSIX, for instance) mandate support for other formats, which is evil.
no subject
Date: 2003-12-09 03:24 pm (UTC)That's beside the point really (there's already lots of things that can be used for nasty hacks; anyway, if clients ban it then spammers will no doubt just switch to FTP URLs where it's still allowed).
Given the amount of confusion that userinfo causes, it seems entirely sensible that HTTP bans it.
But the clients do accept it (and always have, as far as I know). I suspect they always will, despite what RFCs say. (I don't think the confusion could necessarily have been foreseen when the HTTP/1.0 document was written; client authors may just have seen the omission as an oversight and implemented it anyway.)
RFC 2616 is the definition of HTTP URIs
This is of course the document I should have quoted when I referred to 2068.
Can you quote C&V for that?
I suspect not, as it turns out that the source I was thinking of actually quoted RFC 1945. :-/
However, he points out that this document refers to section 2.1 of RFC 1123 (as does RFC 2396), which strongly implies that dotted decimal form should be used (though technically it probably doesn't absolutely rule out other formats). This in turn refers back to RFC 952, which also (in assumption 2) specifies the dotted decimal form.