On Fri, May 17, 2024 at 1:07 PM John Levine via mailop <mailop@mailop.org>
wrote:

> It appears that Taavi Eomäe via mailop <ta...@zone.ee> said:
> >-=-=-=-=-=-
> >-=-=-=-=-=-
> >Hi!
> >
> >As part of coordinated disclosure, I am sharing it here as well. In
> >short, using the approach described below, attackers can replace the
> >entire contents of a letter, in a way the letters still pass DKIM’s
> >cryptographic checks. ...
>
> There is nothing whatsoever new here.
>
> We knew l= was a bad idea when we published it, and that you could do
> all sorts of naughty things by adding or fiddling with MIME parts.
> Some loud people insisted that it would solve the mailing list
> problem, which of course it didn't, but we're stuck with it now.
>
> I suppose it couldn't hurt to remind people that using l= is a bad
> idea but if they haven't already gotten the memo sometime in the past
> decade, I wouldn't hold my breath.
>

I guess the part that's new to me is the apparent widespread (enough) use
of the l=
parameter.  I don't recall ever noticing its use before, though can't say
it was ever top
of mind when looking at various headers of messages.

The example in the post of someone using l=1 really sounds like a
workaround for
receivers requiring DKIM signing but senders having fear of messages getting
modified and rejected.  I am both in awe at the hacker make it work ethos
displayed
as well as the complete disregard for authentication.  I'm curious what
mitigation
gmail deployed short of just ignoring the l= value entirely, which would be
my
impulse though depending on how widespread it might require an annoying
amount
of outreach and rollout time to force correction.

Brandon
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to