• cPOP and MessageID can you push and email back to mailserver

    From Phil McGuinness@21:1/5 to All on Tue Mar 1 14:44:42 2022
    Is it possible with cPOP to not only retrieve and email bu to modify and push back to email stack using message ID.

    Also if an attachment to email, say a PDF... can see how to save.
    Say I modified, stamp paid maybe and push back to email on mail server

    oPop:email:messageId

    How ?
    Has anybody done this.

    Phil

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Wolfgang Riedmann@21:1/5 to Phil McGuinness on Fri Mar 4 11:11:10 2022
    Hi Phil,

    the POP3 protocoll cannot do this, but you can use the IMAP protocol.

    But AFAIK the IMAP protocoll is not very well standardized, and so
    every implementation is a bit different.

    Wolfgang


    Phil McGuinness wrote:

    Is it possible with cPOP to not only retrieve and email bu to modify
    and push back to email stack using message ID.

    Also if an attachment to email, say a PDF... can see how to save.
    Say I modified, stamp paid maybe and push back to email on mail server

    oPop:email:messageId

    How ?
    Has anybody done this.

    Phil



    --

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Phil McGuinness@21:1/5 to All on Fri Mar 4 18:41:31 2022
    Wolfgang,

    said, "the POP3 protocoll cannot do this, but you cansaid; use the IMAP protocol. Port 143 for iMAP... a lot of times this blocked.

    I have proof of concept using POP and cSMTP where I can pull the email, deconstruct it.
    Then push a new email with cSMTP and delete the original using POP.

    The reason I ask is a client we sent a invoice as PDF for $7900. We chased them for days and normal response paid.
    At day 7.. two sides talking and client releasised receieved 1st invoice and 2 hours later another looked same, different BSB/ACCNT
    They paid money to the "fake email and invoice"

    They did not want to pay, as they think they have paid and believe our mail server or we had been hacked.
    At the point did not have their 2nd email to look at headers and trying to work out if we have been compromised.
    Classic many in middle attack.

    It is not hard with U/PW to a mail server to monitor the traffic and I have proven easy to trick a receiver with subsequent email.
    We have login to to get this but a lot want a copy of invoice emailed, with say PDF

    Considering a verification concept with Button is the PDF to click to very that it is genuine.
    Say HASH the contents, store hash and verify against. A hacker could still change attachment contecnt but would not verify.,

    Any thoughts on this concept or alternative ideas.

    Phil

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Wolfgang Riedmann@21:1/5 to Phil McGuinness on Wed Mar 9 08:04:54 2022
    Hi Phil,

    of course you can do that with the combination of POP3 and SMTP.

    I have seen similar things with compromised invoices... and changed
    email headers.
    But after researching the recipient had a hacked machine....

    Wolfgang

    Phil McGuinness wrote:

    Wolfgang,

    said, "the POP3 protocoll cannot do this, but you cansaid; use the
    IMAP protocol. Port 143 for iMAP... a lot of times this blocked.

    I have proof of concept using POP and cSMTP where I can pull the
    email, deconstruct it. Then push a new email with cSMTP and delete
    the original using POP.

    The reason I ask is a client we sent a invoice as PDF for $7900. We
    chased them for days and normal response paid. At day 7.. two sides
    talking and client releasised receieved 1st invoice and 2 hours later
    another looked same, different BSB/ACCNT They paid money to the "fake
    email and invoice"

    They did not want to pay, as they think they have paid and believe
    our mail server or we had been hacked. At the point did not have
    their 2nd email to look at headers and trying to work out if we have
    been compromised. Classic many in middle attack.

    It is not hard with U/PW to a mail server to monitor the traffic and
    I have proven easy to trick a receiver with subsequent email. We
    have login to to get this but a lot want a copy of invoice emailed,
    with say PDF

    Considering a verification concept with Button is the PDF to click to
    very that it is genuine. Say HASH the contents, store hash and
    verify against. A hacker could still change attachment contecnt but
    would not verify.,

    Any thoughts on this concept or alternative ideas.

    Phil



    --

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)