How to verify Lotus Notes Sender

I would like to know whether there is any way to verify the sender for Lotus Notes.

One of my client's Lotus Notes email address has been spoofed by someone, so they are looking for a way in Lotus Notes to protect this situation to happen again. For instance, whether there is a way to authenticate both the user id and lotus notes email address together?

Thank you for any advice.
Who is Participating?
qwaleteeConnect With a Mentor Commented:
1) Look at Delivery info, it will tell you if it was a pure Notes message, or came in via the internet

2) Look at $UpdatedBy, the first entry shoudl be the person who created the document, regardless of what teh SendTo field says.  For an internet message, that would be your inbound Domno SMTP server name.  For an internal message, it should be the name of the user who created the doc.  If it is an internal message but has a server name, then either an agent sent the message, or the spoofer has access to a server ID.

Exceptions: if a user has access to another user's ID, the purloined ID can be used to create untraceable spoofs.  Or, if one user has another user sign or modify an agent, the signer/modifier will be seen as the sender of messages from that agent.  The programmer sets things up so lots of messages will appear to come from the signer.  That's good for system messages, but can be abused by a crafty programmer for spoofing.
Sjef BosmanGroupware ConsultantCommented:
Hi kodegenos,

In Notes the sender can add his signature, so the receiver can see that it really was the sender who sent the mail.

What do you mean, it has been spoofed ?  

Over the internet (smtp), or over Notes - to - Notes  (nrpc) trafic ?

I think sjef means the sender can 'sign' his message, to allow the receiver to verify this.  This only works for Notes-to-Notes email ...

Cloud Class® Course: SQL Server Core 2016

This course will introduce you to SQL Server Core 2016, as well as teach you about SSMS, data tools, installation, server configuration, using Management Studio, and writing and executing queries.

The new virus does spoof the sender names there is nothing you can do about it except do a virus check and delete any potential virus attachments..

kodegenosAuthor Commented:
Thanks for everyone reply.

I get to know that Lotus Notes require a user to authenticate to the server with a correct address and password before they can send email. What do they mean by the correct address? Do they mean they need their own address to send mail? eg. user id is kgoh, and the user must use to send email? How about if they use to send as user id 'kgoh'?
If you mean that someone send a message over the internet containing a virus, that appears to come from you (, and you now get all the alert messages from various antivirus engines, you can't do anything about that.

That has nothing to do with Notes - any idiot with a networkconnection can send an email that appears to come from you.

Try it yourself : telnet to port 25 on your smtp server , and start sending away , impersonating every user you want ....  (actually, if you set your smtp server correctly, you'll need to use a from address from within your domain, but on the internet, you can do what you want ... you'll get the idea)

telnet 25
| Out: 220 Ready for action (whatever/SMTP)
| In: helo
| Out: 250
| In: mail from: <WHOEVER@WHATEVER.COM>
| Out: 250 receiving from WHOEVER@WHATEVER.COM
| In: rcpt to: <>
| Out: 250 will send to
| In: data
| Out: 354 send the message, terminate with "."
| In: To: <>
| In: Subject: Telnet test 1
| In: TEST
| In: .
| Out: 250 received the message, thanks
| In: rset
| Out: 250 clearing sender and recipient list, go ahead
| In: quit
| Out: 221 have a nice day (SMTP Closing)
Bozzie is correct about SMTP.  It is also possible internally, though the user would have to be pretty sophisticated to avoid all detection.

FYI, it has nothing to do with the Notes user's internet adddress.  It is the "user name" embedded in the file, which generally matches a Full Name in the server names.nsf.  The authenication uses Public Key Cryptography to verify identity.  It is rather complicated.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.