[Mailman-Developers] Mass subscriptions as a DoS attack

2020-11-29 Thread Stephen J. Turnbull
Alessandro Vesely writes:

 > Trolls can wreak havoc by subscribing to one or more high volume
 > mailing lists on behalf of a target one.
 > 
 > Are there mechanisms to prevent that?

Don't antagonize trolls. :-/

The subscription to the high-volume list itself can't be prevented by
the victim list, because it's the high-volume list that accepts the
subscription, then sends to the victim list.  However, most lists
require confirmation, which is send by email to the list, looks like
administrivia and will most likely get filtered by the victim list's
Mailman.  I guess we could set the bar higher by requiring the
confirmation token be returned by email in a DMARC-From-aligned
message (and if From alignment fails, require moderator approval for
the subscription).  This is still a setting on the high-volume list
side, though.

On the victim side, I'm not 100% sure that the confirmation message
would be filtered as administrivia.  If necessary, we could beef up
that filter, and add RFC 2369 and 2919 header fields to the filter to
catch the actual "DoS" posts.  The RFC field filter wouldn't do
anything if the high-volume list doesn't use those fields, of course.

But even if the bad actor manages to get the victim subscribed to the
high-volume list, most lists nowadays require list membership to post.
The bad actor could try to reverse-subscribe the high-volume list to
the victim list (but now the bad actor runs into the barriers
described above again), so if you're worried about this a lot, you can
set the subscription policy at the victim list to confirm and approve.
If you're worried about this a little, you can set the victim list's
new member policy to 'moderate', which catches the garden variety
butthead as well as the sophisticated troll.

I haven't heard of an individual being attacked in this way for many
years, and I've never heard of a list attacked this way.  The
occasional attack now uses the subscription process itself, by getting
thousands of lists to send confirmation tokens to the victim.  I
suspect actually getting the victim subscribed is just not worth the
bad actor's effort to hack or social engineer the confirmation
process.  I figure XKCD 538 applies -- instead trying to hack multiple
lists, they'll just use a big pipe-wrench (eg, hire a botnet).

Steve
___
Mailman-Developers mailing list -- mailman-developers@python.org
To unsubscribe send an email to mailman-developers-le...@python.org
https://mail.python.org/mailman3/lists/mailman-developers.python.org/
Mailman FAQ: https://wiki.list.org/x/AgA3

Security Policy: https://wiki.list.org/x/QIA9


[Mailman-Developers] Mass subscriptions as a DoS attack

2020-11-27 Thread Alessandro Vesely
Trolls can wreak havoc by subscribing to one or more high volume mailing lists 
on behalf of a target one.  For example, someone could subscribe this list to 
the Linux kernel mailing list.  Everybody would see the confirmation message, 
but by the time someone realizes the need to unsubscribe, the list will have 
been flooded, thereby realizing the DoS.


Are there mechanisms to prevent that?


Best
Ale
--


























___
Mailman-Developers mailing list -- mailman-developers@python.org
To unsubscribe send an email to mailman-developers-le...@python.org
https://mail.python.org/mailman3/lists/mailman-developers.python.org/
Mailman FAQ: https://wiki.list.org/x/AgA3

Security Policy: https://wiki.list.org/x/QIA9