Fwd: CONGRATULATION____REF#87670

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Is there nowhere else this interminable thread can be taken?  Some of us 
actually subscribe to this list to actually follow *openssl* use & issues.

Take it up with the list admins directly?

On 04/04/2016 05:39 PM, Jakob Bohm wrote:
> On 05/04/2016 01:47, Johann v. Preu?en wrote:
>> '/No one (until about 2 hours ago) were discussing how the //
>> //particular "From" address got past the "you must be //
>> //subscribed to post" filter/'
>> actually, i first posted on this issue c. 76 hours ago.
>>
>
> Not in this thread on openssl-users as far as I can tell.
>
>
>> '/maybe the spoofed From address happened to be a subscriber/'
>> is it possible that openssl still does not know if the email addr is a
>> real subscriber?
>>
>
> I have no way of knowing since I am not one of the list admins.
>
>> '/maybe there is a bug in the list management software or configuration/'
>> yes, i surely hope someone is looking into this possibility.
>>
>> further, not only was owenevans98 able to post an original message (the
>> subject of this thread), but there was a subsequent posting in reply to
>> another thread. thus, the conclusion that owenevans98 was not only able
>> to post but was|is receiving the listserv mailings is self-evident. the
>> fact that this two-way comm path came into existence means that the
>> listserv database was corrupted and that the original posting was not
>> some slip-up in permitting an un-authorized one-time posting.
>
> Which other thread was that?
>
>>
>> jakob, i appreciate your taking of the time to detail some of openssl's
>> listserv practices and view-points. perhaps it is best to set forth the
>> synopses of my views:
>
> I am not a list admin or other official team member, I am just an
> active list member who wants to avoid the list admins following bad
> advice from people like you and Ben Humpert.
>
>>
>>  1. make certain ' owenevans98' and any other illegitimate posters are
>>     not receiving listserv mailings;
>
> Question is if owenevans97 is an illegitimate poster or a legitimate
> poster whose e-mail address was spoofed.
>
> Anyway, the OpenSSL mailings are all being indexed on the world wide
> web by multiple organizations, where anyone can read them.
>
>>  2. stop publishing the subscriber's protected PII in the clear; and
>
> Again, I see no sign this is happening other than the age-old inclusion
> of original from and reply addresses in postings (which is limited to
> those who post, and doesn't affect those who only subscribe).
>
>>  3. control postings of anchors.
>>
>
> I disagree.  A number of e-mail clients (MUAs) automatically turn
> textual URLs into anchors and make it very difficult (if not
> impossible) for the posting user to avoid this.  And people
> professional enough to understand most of the stuff on OpenSSL mailing
> list also know not to click on links in strange e-mails and forum posts.
>
>
>> according to your comment quoted, supra, it seems that the step
>> indicated in Item 1 has yet to be taken.
>
> I wouldn't know.
>
>>
>> Item 2 can be implemented by inaugurating a subscriber-managed profile
>> and merely publishing a user handle linked thereto. thus, you can shift
>> the onus to the subscriber to reveal whatever info they wish rather than
>> arbitrarily exposing to the world a subscriber's personal name, email
>> addr, and work-force association.
>
> Did you read and understand any of that which I wrote, or
> are you just trolling?
>
>>
>> in the case of Item 3, i understand all of the reasons for having links
>> (not html anchors) in postings. it is a very minor inconvenience for
>> someone who has  a burning interest in viewing a link to copy the
>> clear-text link into a browser versus clicking on an anchor description
>> which could lead the subscriber far astray from what the description
>> says. it also enhances the subscriber experience to visually see where
>> the link is going instead of having the actual target obscured by a
>> description that may be deceptive, merely misleading, or non-apparent
>> (i.e., 'click here').
>>
>> jakob, you also mention concern re MTA operators having some issues with
>> changes you may make to the listserv ops. please note: none of the three
>> (3) items, supra, i have suggested have any impact on other MTA
>> operators as they are totally internal-control enhancement proc's.
>
> I am an MTA operator, I am not a listserv op.  I was posting concerns I
> have as an MTA operator and list member with stupid changes suggested
> by you and Ben Humpert.
>
>>
>> i cannot understand why openssl's filtering missed the fact that the
>> posting that is subject of this thread predominated in symbols and
>> control characters, contained no actual message text, and still went
>> through. hopefully, someone is also looking into why this happened.
>>
>
> Did you read the brief but very clear message posted on 2016-04-02
> 15:24 UTC by Rich Salz (who is an OpenSSL team member and may have
> access to the listserv configuration details not published to avoid
> helping spammers)?
>
>
> P.S.
>
> Please don't CC list members on replies to the list, it causes
> duplicate copies to reach them (since list membership is required to
> post to the list anyway).
>
>>
>> On 2016.Apr.04 15:36, Jakob Bohm wrote:
>>> On 04/04/2016 22:28, Johann v. Preu?en wrote:
>>>> i am not certain i understand how it is google's fault that this
>>>> owenevans98|Dawn was able to slip into the listserv database. this
>>>> is, of course, assuming that this was not done via a simple sign-up.
>>>> i also do not understand how prohibiting a posting (content, infra)
>>>> that obfuscates a message within a host of symbols with a net zero
>>>> percent of prose and 100% anchor description is responding to some
>>>> sort of a "fad". this list is re problems and solutions that can only
>>>> be conveyed in prose ... no prose == no message. and permitting
>>>> private anchors is also a questionable security practice. it does not
>>>> seem unreasonable to require anchors to be to _recognized_ sandbox
>>>> sites or -- much better -- to an openssl-operated one.
>>>>
>>> No one (until about 2 hours ago) were discussing how the
>>> particular "From" address got past the "you must be
>>> subscribed to post" filter, maybe the spoofed From address
>>> happened to be a subscriber, maybe there is a bug in the
>>> list management software or configuration.
>>>
>>> There was discussion of which generic "hard-reject" filters
>>> should be applied and someone suggested prematurely
>>> applying a number of recently "trendy" such rules promoted
>>> by (ironically in this case) Google and others.  I was the
>>> one who used the word "fad" to refer to such recently
>>> promoted "hard-reject" rules and pointed out that many
>>> smaller organizations will be unable to cause legitimate
>>> mail/postings to comply with such rules anytime soon,
>>> simply because it takes time to roll out new protocols to
>>> all the worlds legitimate e-mail sending servers.
>>>
>>> As for the suggestion to forbid links to servers other than
>>> OpenSSL.org servers, this will be fatally flawed as it will
>>> block discussions of such common OpenSSL related topics as:
>>>
>>> - URLs of published security research (such as the home
>>>  pages of new vulnerability descriptions).
>>>
>>> - URLs of sites that publish OpenSSL related software, such
>>>  as OpenSSH, stunnel, the Shining Light Windows binaries of
>>>  OpenSSL etc.
>>>
>>> - URLs that are showing interoperability problems with
>>>  OpenSSL.
>>>
>>> - URLs of independently published OpenSSL patches (that
>>>  have not yet been accepted into the OpenSSL repositories).
>>>
>>> - URLs necessitated by the byzantine legal rules regarding
>>>  which web servers are allowed to publish cryptographic
>>>  software written by which people for use by which other
>>>  people.
>>>
>>> These categories of non-openssl.org URLs occur frequently
>>> in legitimate posts to this list and cannot be replaced by
>>> some private openssl.org hosted equivalent of pastebin.com
>>> etc.
>>>
>>>
>>>> moreover, as i pointed out in a pm to Steve, this is a real security
>>>> issue for openssl's list in that such a breach (if it is one) opens
>>>> the names and email contact info of a broad range of
>>>> security-responsible people that will invariably include some in the
>>>> upper regions of the perm chain. these people are the very people
>>>> that are targeted by malicious attempts (and some startling
>>>> successes) to breach much more than an organization's email system.
>>> You are now going way outside anything discussed previously,
>>> please enlighten the list as to what you are possibly
>>> talking about here.
>>>
>>> So far the only known breach is an apparent breach of
>>> *Google owned* e-mail servers, allowing perfect spoofing
>>> of gmail.com addresses by causing the fake mail to be
>>> sent by *exactly* the same servers with *exactly* the
>>> same headers as legitimate mails by the legitimate user of
>>> the spoofed e-mail address.
>>>
>>> This does not expose any of the names of any e-mail
>>> addresses stored by the OpenSSL organization, unless
>>> that data can be extracted by e-mailing a command to
>>> listserv from a spoofed administrator e-mail address and
>>> any of those administrator e-mail addresses are actually
>>> hosted by Google.
>>>
>>>>
>>>> yes, this person has seemingly stopped with postings, but i am
>>>> hearing no assurance that they have even been eliminated from the
>>>> subscription database. just being able to listen will garner a wealth
>>>> of sensitive info obtainable re a most desirable crowd of
>>>> people/victims.
>>>>
>>> Posts by others indicate that the *spoofing* activity
>>> seemed to have stopped for multiple gmail addresses,
>>> including the e-mail address of one person posting such
>>> an observation, indicating a likelihood that Google fixed
>>> the underlying security issue.
>>>
>>>
>>>
>>>> even the most simplistic listserv app has the ability to withhold
>>>> subscriber email addr's and still provide a secure pm capability. now
>>>> that it is apparent|perceived that the list is vulnerable, i believe
>>>> the prudent route to go is to keep those addr's and subscriber
>>>> real-world names out of the "limelight". i see no reason why a
>>>> sanitized subscriber profile available from a link within the
>>>> person's public handle would not be adequate for identification
>>>> purposes and would actually become an enhancement to the listserv
>>>> app's usefulness to subscribers. this would certainly shield the
>>>> subscriber in a reliably meaningful way, serve to protect a
>>>> subscriber's own email system, and enhance the security of openssl's
>>>> own listserv ops.
>>> The issue that the FROM addresses of OpenSSL e-mail list posters
>>> (not other subscribers) can be seen by anyone receiving or
>>> otherwise finding their postings is age-old and completely
>>> unrelated to any issue related to this discussion (the spammer
>>> in this case obviously did not know that this was a mailing
>>> list, given the incorrect textual name used with the list
>>> SMTP address).
>>>
>>> Even if OpenSSL were to switch to a surveillance vulnerable
>>> design where PMs between users would have to go through the
>>> OpenSSL servers, the list administrators will probably remain
>>> reachable using well known mandatory e-mail addresses such as
>>> "Postmaster".  A similar issue would apply to most of the other
>>> high value subscribers.
>>>
>>> Any such people would already be required (in order to perform
>>> their function safely at all) to employ security measures to
>>> isolate their publicly known e-mail addresses from any e-mail
>>> addresses that are not intended to be publicly known.  As an
>>> example, all my (non-blocked) postings on this list use a
>>> dedicated mail address and mail box which allows me to dismiss
>>> e-mails on other subjects to this address as Spam while not
>>> exposing other e-mail addresses used for more trusted uses, and
>>> I obviously employ similar measures for any well known role
>>> accounts I handle myself.
>>>
>>>
>>>
>>>> *original anchor description (100% of the message content):*
>>>> Attn:__here__is__your___$l??
??
??
__Faceb????k__giftcard.
>>>>
>>>> __W??__N????d__Y????r__Shi??me??t__Inf??rmati????s__
>>>>
>>>> Click_Here
>>>>
>>>> On 2016.Apr.04 09:08, Jeffrey Walton wrote:
>>>>>> And anyway, this seems to be a case where the genuine
>>>>>> operator of an e-mail domain is failing to correctly
>>>>>> authenticate submissions by their own users, which no
>>>>>> amount of 3rd party automation (other than blacklisting
>>>>>> the failing provider, in this case gmail) could stop.
>>>>> Yeah, I'm guessing there was a vulnerability in one of the other
>>>>> Google services, and that Google service was allowed to make web-based
>>>>> email submissions on behalf of the user. Classic injection and failure
>>>>> to validate sessions or parameters...
>>>>>
>>>>> I'm also guessing Google fixed it because it has stopped.
>>>
>
>
>
> Enjoy
>
> Jakob


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux