On Sun, Apr 19, 2020 at 12:33:19AM +0200, Oswald Buddenhagen wrote:
> On Sat, Apr 18, 2020 at 12:04:05PM -0500, Derek Martin wrote:
> > OK, please enlighten me:  Tell me what you've learned,
> > 
> nothing, because i don't care. ;)
> 
> > how it's any worse than all the other information I demonstrated is
> > necessarily leaked from the headers, and how it is in any way
> > exploitable.
> > 
> as the initial mail indicated, this is about data-mining *habits*. i
> can use that to make a first guess about how insecure your system is
> (judging by a long uptime)

I've already explained why it's not a good guess.  And I've already
pointed out that even if you happened to guess correctly, it tells you
nothing about actual exploitable behavior.

There are things one could do that would result in always having the
same PID.  One is using $edit_headers to make it so.  A very
plausible, real-world example would be if I happen to boot my laptop
every day, and immediately start Mutt as the first thing I did, it
would very likely have the same pid, day after day, because the boot
sequence, and my behavior, are deterministic (at least until one of
those things changes).  That would look like a long uptime, but...not
be.

But it wouldn't matter, because this is not how someone with a clue
would look for ways to attack you.  And I'm not worried about someone
who doesn't have a clue.

> or make you feel paranoid by showing that i know how often you
> restart your MUA (who knows what _else_ i learned?).

I'm not interested in allaying uninformed paranoia. I'm only
interested in protecting Mutt's users from real threats, by plugging
legitimate holes.

> i'm sure one could come up with other data points if one is inclined
> so.

This is not a compelling argument, and I'm equally sure that you can't.
Since proving a negative is impossible, the burden is on you to prove
you can.  Do so, and I'll happily change my tune.  I can't know
everything so if you do find a way, I'll be wrong, and I won't be
embarrassed to admit it.  But I've been doing this kind of stuff for
quite a while, and I don't think your chances are very good.

> that my local host's name is revealed is mildly annoying, too. and
> yes, i could avoid revealing that anyway by having my MTA
> suppress/fake the Received headers appropriately for privacy (i
> didn't check what software/config i'd have to use, but i'm willing
> to bet that there _are_ options).

As I pointed out already, the first legitimate mail gateway you talk
to will add a header that includes the hostname or IP address of the
machine it was talking to, so there's really only one thing you can
do:  Use an anonymizer.  Most of those are pretty shady, and doing so
may be likely to attract the attention of law enforcement or
criminals.  Anyone who cares to will be able to determine that you're
using an anonymizer, which may suggest that you have something worth
hiding.

-- 
Derek D. Martin    http://www.pizzashack.org/   GPG Key ID: 0xDFBEAD02
-=-=-=-=-
This message is posted from an invalid address.  Replying to it will result in
undeliverable mail due to spam prevention.  Sorry for the inconvenience.

Attachment: signature.asc
Description: PGP signature

Reply via email to