These are not MSA or MDAs so its a different set of assumed preconditions.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


Murray S. Kucherawy wrote:
>> -----Original Message-----
>> From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] 
>> On Behalf Of John R. Levine
>> Sent: Tuesday, October 19, 2010 2:47 PM
>> To: DKIM List
>> Subject: [ietf-dkim] double header reality check
>>
>>> So it establishes a false sense of resolving a security issue.
>> Hmmn.  I could reiterate for a fourth time why the double header thing
>> is only a security issue in the context of DKIM, but there's clearly
>> something else going on that prevents people from getting it.
> 
> Obviously you believe your view is unassailable, but please stop asserting 
> that people who don't see it your way are automatically thick.
> 
>> Here's a question: in the absence of DKIM, does anyone think that
>> doubled headers present a security problem?
> 
> I have also repeatedly said "yes" to this question.
> 
>> If so, what is the
>> problem, and how has it been addressed in the past?
> 
> Any filter or agent that makes any kind of filtering, routing or sorting 
> decision based on any header field which in turn presumes there's only one 
> such field without actually checking is a potential security concern.  That 
> extends not only to routing and filtering of messages, but also to their 
> rendering.
> 
> Examples:
> 
> - procmail, which by default acts on the first match it finds without first 
> confirming RFC5322 validity, so if I know or can figure out your rule sets I 
> can do something that will get bad mail into a good folder or other internal 
> mail stream, and then an MUA could render the From: or whatever field that 
> wasn't the one subjected to filtering (as your own experiment showed)
> 
> - SpamAssassin, which can reformat possible spam by wrapping it in MIME 
> content using new header fields extracted from the original message, but only 
> takes one (the last) of each of the ones listed in its man page when doing 
> so, meaning a filtering action can be taken that results in false data being 
> rendered in the report; then the user sees that something he/she wanted was 
> tagged as spam and complains (there may be worse exploits, that's just the 
> most obvious one after my code review)
> 
> - Mailman authenticates postings and subscription requests based on the first 
> instance of From or Sender it finds, but relays both so a downstream filter 
> or MUA would see both and thus potentially make a wrong handling 
> (rendering/filtering/routing) decision
> 
> - majordomo, same as Mailman
> 
> There were several instances I found as well in other lesser-known filtering 
> tools, but these ones will hopefully provide some context.  And since those 
> problems are there in the code for each I just downloaded and reviewed, I 
> would say they have not yet been addressed.
> 
> Since the issue is an attempt to fool users, those seem to me to be in the 
> same family as the other thing we're talking about.  And none of them have 
> anything at all to do with DKIM.




_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to