Re: [mailop] Success MiTM attack

2023-10-22 Thread Matt Corallo via mailop
SSL certificates do not, and have never, "protected against MiTM". The certificate authority trust model can best be summarized as "someone else's DNS resolver and connection", it is not a statement of who actually owns the domain or what server is actually supposed to be on the other end. If y

Re: [mailop] Success MiTM attack

2023-10-22 Thread Matt Corallo via mailop
On 10/22/23 9:08 AM, Slavko via mailop wrote: Dňa 22. októbra 2023 12:50:52 UTC používateľ Philip Paeps napísal: Note that, as far as email is concerned, plaintext downgrade attacks are much more likely than fraudulent certificates. Hmm, and what about MUAs? As Philip pointed out, DNS

Re: [mailop] Success MiTM attack

2023-10-23 Thread Matt Corallo via mailop
On 10/23/23 3:26 AM, Jaroslaw Rafa via mailop wrote: Dnia 22.10.2023 o godz. 12:59:18 Matt Corallo via mailop pisze: SSL certificates do not, and have never, "protected against MiTM". The certificate authority trust model can best be summarized as "someone else's DNS res

Re: [mailop] Success MiTM attack

2023-10-23 Thread Matt Corallo via mailop
On 10/22/23 1:56 PM, Taavi Eomäe via mailop wrote: On 22/10/2023 16:08, Slavko via mailop wrote: Hmm, and what about MUAs? Without MUA-STS, it's up to the MUAs and only MUAs to enforce connection security. The next step after that would be some kind of pinning. Some have suggested DANE+DN

Re: [mailop] Success MiTM attack

2023-10-23 Thread Matt Corallo via mailop
On 10/23/23 7:11 PM, Richard Clayton via mailop wrote: In message , Matt Corallo via mailop writes On 10/23/23 3:26 AM, Jaroslaw Rafa via mailop wrote: However, all this discussion is hardly related to email, as - as many have noted - there's hardly any certificate checking a

Re: [mailop] Success MiTM attack

2023-10-23 Thread Matt Corallo via mailop
On 10/23/23 9:43 PM, Matt Palmer via mailop wrote: On Mon, Oct 23, 2023 at 10:04:25PM -0400, Ian Kelling via mailop wrote: Philip Paeps via mailop writes: On 2023-10-22 14:34:39 (+0530), Slavko via mailop wrote: Indeed: not directly related to mailops. But a very instructive example of why

[mailop] Rolling DKIM Key Disclosure

2020-07-10 Thread Matt Corallo via mailop
For various reasons, DKIM's non-repudiation property has always prevented us deploying DKIM signing on our mail. The obvious fix for this is to roll DKIM keys aggressively (eg every few minutes) and publish the private keys for revoked keys as you go. Given relay times for mail through various ho

Re: [mailop] Rolling DKIM Key Disclosure

2020-07-10 Thread Matt Corallo via mailop
frequently I've heard > personally. When I managed this for Amazon SES, I > think the policy was 6 months or a year. > > On Fri, Jul 10, 2020 at 4:39 PM Matt Corallo via mailop <mailto:mailop@mailop.org>> wrote: > > For various reasons, DKIM's non-r

Re: [mailop] Rolling DKIM Key Disclosure

2020-07-10 Thread Matt Corallo via mailop
On 7/10/20 8:36 PM, Luis E. Muñoz wrote: > On 10 Jul 2020, at 16:54, Matt Corallo via mailop wrote: > > Replies inline. > > On 7/10/20 7:50 PM, Brian Toresdahl wrote: > > Your approach and goals don't seem to make sense to me. > > TL;DR: T

Re: [mailop] Rolling DKIM Key Disclosure

2020-07-10 Thread Matt Corallo via mailop
On 7/10/20 8:59 PM, Brandon Long wrote: > > > On Fri, Jul 10, 2020 at 5:39 PM Luis E. Muñoz via mailop <mailto:mailop@mailop.org>> wrote: > > __ > > On 10 Jul 2020, at 16:54, Matt Corallo via mailop wrote: > > Replies inline. > >

Re: [mailop] Rolling DKIM Key Disclosure

2020-07-10 Thread Matt Corallo via mailop
On 7/10/20 9:05 PM, Brandon Long wrote: > If it was a one-time DKIM key, you could publish it after being read one time > or with some short timeout.  To many > providers, delivery is a matter of seconds.  > > Of course, someone could take advantage because the key would be cached up to > some

Re: [mailop] Rolling DKIM Key Disclosure

2020-07-11 Thread Matt Corallo via mailop
Fri, Jul 10, 2020 at 08:57:04PM -0400, Matt Corallo via mailop wrote: >> Hmm, that may have been confusingly worded, I admit. The point is that >> we'd like to publish the private keys after delivery. This means that if >> anyone goes and verifies an email with the DKIM key

Re: [mailop] Rolling DKIM Key Disclosure

2020-07-11 Thread Matt Corallo via mailop
Who said anything about it being a legal defense. In discovery you’d have to give over your local copies anyway, so it’s very clearly not. > On Jul 10, 2020, at 21:16, John Levine via mailop wrote: > > In article <48a3bfbe-5109-ebbb-3631-1bb604cd1...@bluematt.me> you write: >>>TL;DR: The

Re: [mailop] Rolling DKIM Key Disclosure

2020-07-11 Thread Matt Corallo via mailop
Right, maybe I’ve missed something - in my (albeit limited) experience, mail that gets forwarded a few times by various filters (most recent issue I’ve seen is someone trying to forward Rackspace -> Gmail -> ZenDesk, which, somewhere along the way didn’t make it), and without anything tying the

Re: [mailop] Rolling DKIM Key Disclosure

2020-07-11 Thread Matt Corallo via mailop
email with someone else the private key is public and that someone else only sees that the recipient either received the email or put the email in their inbox using IMAP, but has no idea which. Matt > On Jul 11, 2020, at 08:21, Ralph Seichter via mailop > wrote: > > * Matt Corall

Re: [mailop] Rolling DKIM Key Disclosure

2020-07-11 Thread Matt Corallo via mailop
11, 2020, at 07:44, Andrew C Aitchison wrote: > > On Fri, 10 Jul 2020, Matt Corallo via mailop wrote: > >> For various reasons, DKIM's non-repudiation property has always >> prevented us deploying DKIM signing on our mail. The obvious fix for >> this is to roll D

Re: [mailop] Rolling DKIM Key Disclosure

2020-07-11 Thread Matt Corallo via mailop
Hmm? SSS/TLS has never signed the content of a website. It only authenticates temporary symmetric encryption keys which are used to encrypt (not sign) the contents. Matt On 7/11/20 2:50 PM, John Levine wrote: > In article <22b8aa44-cab8-4467-a18b-ee463997c...@as397444.net> you write: >> As for u

Re: [mailop] Rolling DKIM Key Disclosure

2020-07-11 Thread Matt Corallo via mailop
"Sorry, I think what you're looking for isnt useful, you're misinformed" isn't exactly a useful response when someone, especially a customer, asks for something, sadly. On 7/11/20 3:02 PM, John Levine wrote: > In article <4ac6b77b-375b-4cc0-b2f5-84f769683...@as397444.net> you write: >> More like

Re: [mailop] Rolling DKIM Key Disclosure

2020-07-15 Thread Matt Corallo via mailop
11 Jul 2020, at 18:18, Matt Corallo via mailop > <mailto:mailop@mailop.org>> wrote: >> >> Right, maybe I’ve missed something - in my (albeit limited) experience, mail >> that gets forwarded a few times by >> various filters (most recent issue I’ve seen is s

Re: [mailop] Rolling DKIM Key Disclosure

2020-07-15 Thread Matt Corallo via mailop
Ah, I didn’t know l= existed, thanks for that! Do most hosts treat l=0 as DKIM-valid the same way as l=, or are they likely to ignore the DKIM signatures? Matt > On Jul 15, 2020, at 07:20, Ángel via mailop wrote: > > On 2020-07-11 at 15:27 -0400, Matt Corallo via mailop wrote: >

Re: [mailop] BIMI pilot @ Google

2020-07-22 Thread Matt Corallo via mailop
Maybe I'm missing something, but I don't see an answer to this question - Ted's point seems well-made and it seems like this will retrain users to be more vulnerable to phishing attacks by putting the correct logo on an unrelated domain. Matt On 7/22/20 8:30 PM, Marcel Becker via mailop wrote:

Re: [mailop] BIMI pilot @ Google

2020-07-22 Thread Matt Corallo via mailop
Right, the BIMI website doesn't mention it anywhere, silly me forgot to read the non-official source :). On 7/22/20 9:20 PM, Daniel Jakots wrote: > On Wed, 22 Jul 2020 20:59:54 -0400, Matt Corallo via mailop > wrote: > >> but I don't see an answer to this questi

Re: [mailop] BIMI pilot @ Google

2020-07-22 Thread Matt Corallo via mailop
The standard appears to provide no protection whatsoever, but the specific implementation announced by Google relies on CAs to "authenticate" the domains' logo. Seems like there should be a standard for that, too. Matt On 7/22/20 9:17 PM, Ted Hatfield via mailop wrote: > > > On Wed, 22 Jul 20

Re: [mailop] Microsoft contact for misclassified spam issue?

2020-08-09 Thread Matt Corallo via mailop
Good luck. While its annoying, it seems possible to fix IP blocklists from Microsoft, but everything-from-IP-goes-to-junk seems to be the default for small volume senders. At least in my attempts at the support webform the only response you get is "IPs look fine, shouldn't be any issue receivin

Re: [mailop] Microsoft Consumer Email Deliverability Issue

2021-05-01 Thread Matt Corallo via mailop
If you're a small-scale sender, this is just the way it goes with Outlook.com - SNDS doesn't do anything except provide you %s, and because the number of emails from small-scale senders is so low (and the "customers" here don't even pay for the service), Microsoft isn't incentivized to fix the is

Re: [mailop] Microsoft Consumer Email Deliverability Issue

2021-05-01 Thread Matt Corallo via mailop
As far as I can tell, there's nothing you can do. You can try a non-Hetzner IP, sure, but plenty of people on here (like me!) have a dedicated IP in their own IP space for sending mail and still go straight to Hotmail-Junk. Rate limiting might help, but if you send too *few* mails Microsoft's wa

Re: [mailop] Anyone from Cisco Talos IP/domain reputation team?

2021-05-11 Thread Matt Corallo via mailop
Similarly, I'd love to get a contact with them. Have a domain which appears on one of their lists about every few months, and after going back and forth a bit on tickets, gets removed every few months, only to have it re-added under the same bogus justification a few months later. Would be nice t

[mailop] Outlook 5.7.1 block list sendersupport ignore ticket responses

2021-08-24 Thread Matt Corallo via mailop
We had a mistake in a config which resulted in some user From:s on other domains and should have been relayed through user-configured SMTP relays instead going out directly. Config persisted for all of a few minutes, which is no problem for other providers, but did result in Outlook completely bl

[mailop] Malicious In-Reply-To

2021-09-20 Thread Matt Corallo via mailop
(new thread cause separate topic) On 9/20/21 10:29, Brandon Long via mailop wrote: -snip- > authenticated mail in reply to a message is a very strong signal... but not as strong as it used to > be, spammers > and phishers exploited it. Out of curiosity, how does a spammer or phisher exploit thi

[mailop] .eml Attachments and the 1000-character SMTP Limit

2021-10-11 Thread Matt Corallo via mailop
Today I was trying to help debug an email list that wasn't properly filtering mail by the 1000-character SMTP line-length limit. This required attaching the original, SMTP-invalid .eml to send to the postmaster there. However, it seems MUAs nearly-universally do not handle this correctly. Speci

[mailop] Outbound DANE Enforced on Exchange/Microsoft 365

2022-04-19 Thread Matt Corallo via mailop
This happened a little while ago, but still maybe worth posting here. According to [1] and my own TLS-RPT reports from Microsoft, they're actively enforcing DANE on outbound mails now! It seems sans one major holdout its finally time to ditch MTA-STS entirely and not bother with the rube-goldbe

Re: [mailop] Troubleshooting MTA-STS reports

2022-04-27 Thread Matt Corallo via mailop
Not to flame but...why bother? At this point TLSA/DANE is enforced on mail coming from a number of the Big Players, and most open source mail stacks by default (well, some you have to opt in to indicate your DNSSEC resolver is behaving correctly). AFAIK, the *only* shop that enforces the rube

Re: [mailop] [EXTERNAL] Re: Troubleshooting MTA-STS reports

2022-04-28 Thread Matt Corallo via mailop
tunistic TLS" provides. -- Alex Brotman Sr. Engineer, Anti-Abuse & Messaging Policy Comcast -Original Message- From: mailop On Behalf Of Matt Corallo via mailop Sent: Wednesday, April 27, 2022 11:40 PM To: Jesse Hathaway ; mailop@mailop.org Subject: [EXTERNAL] Re: [mailop] Troublesh

Re: [mailop] Troubleshooting MTA-STS reports

2022-04-28 Thread Matt Corallo via mailop
On 4/28/22 2:34 PM, Michael Ströder via mailop wrote: On 4/28/22 05:40, Matt Corallo via mailop wrote: AFAIK, the *only* shop that enforces the rube-goldberg machine that is MTA-STS that doesn't also enforce TLSA/DANE is Google. I'm really wondering why people have so strong

Re: [mailop] Troubleshooting MTA-STS reports

2022-04-28 Thread Matt Corallo via mailop
> On Apr 28, 2022, at 18:58, Michael Ströder via mailop > wrote: > > On 4/29/22 00:27, Matt Corallo wrote: >>> On 4/28/22 2:34 PM, Michael Ströder via mailop wrote: >>> I'm really wondering why people have so strong objections against MTA-STS. >>> Actually it's pretty easy to setup and it's

[mailop] Microsoft Sending DMARC Reports From IP In SBL

2022-07-19 Thread Matt Corallo via mailop
Hi, it looks like my Microsoft DMARC Reports are getting spamfiltered by default SpamAssassin, notably because Spamhaus has listed their origin server in the CSS SBL (among a few other tests). Should my DMARC reports not go through spam checks? Probably yes, sure. But still, figured I'd mention

Re: [mailop] Microsoft Sending DMARC Reports From IP In SBL

2022-07-25 Thread Matt Corallo via mailop
On 7/20/22 3:19 PM, Mark Milhollan via mailop wrote: On Tue, 19 Jul 2022, Matt Corallo wrote: Relevant headers below, but note that its actually the very first Received header that matches SBL-CSS. You are via Spamassassin doing what Google does and I guess at least some other Spamassassin us

Re: [mailop] Microsoft Sending DMARC Reports From IP In SBL

2022-07-25 Thread Matt Corallo via mailop
On 7/25/22 3:58 PM, Al Iverson via mailop wrote: On Mon, Jul 25, 2022 at 2:37 PM Matt Corallo via mailop wrote: I don't believe SA does authentication checks on all Received: lines, no, it only runs them through the various DNSBLs. I don't see why "you relayed mail from

Re: [mailop] Microsoft Sending DMARC Reports From IP In SBL

2022-07-25 Thread Matt Corallo via mailop
On 7/25/22 4:31 PM, Al Iverson via mailop wrote: On Mon, Jul 25, 2022 at 3:25 PM Matt Corallo wrote: On 7/25/22 3:58 PM, Al Iverson via mailop wrote: On Mon, Jul 25, 2022 at 2:37 PM Matt Corallo via mailop wrote: I don't believe SA does authentication checks on all Received: line

Re: [mailop] Microsoft Sending DMARC Reports From IP In SBL

2022-07-25 Thread Matt Corallo via mailop
On 7/25/22 4:50 PM, Bill Cole via mailop wrote: On 2022-07-25 at 15:33:13 UTC-0400 (Mon, 25 Jul 2022 15:33:13 -0400) There is no useful model for "authenticaton checks" on Received headers. I believe we're on the same page here. No one is doing "authentication checks" on Received headers, to

Re: [mailop] Gmail spam scoring via IPv6 different than IPv4?

2022-08-16 Thread Matt Corallo via mailop
On 8/12/22 6:03 PM, Simon Arlott via mailop wrote: -snip- Ideally random outgoing address selection across all IP address families should be used to avoid this but Exim can't do that. Sure it can, set your router to include ipv4_prefer = ${randint:2} __

Re: [mailop] Blacklisting of Microsoft Exchange Online Nov. 2024

2024-11-11 Thread Matt Corallo via mailop
Has SpamCop been integrated into the Talos Intelligence handling flow yet? Talos has historically been one of those "we label everything as bad with a quarter of a braincell so we can tell clients we've blocked a million billionty attacks for them and they should pay us more" operations, I imagi

Re: [mailop] .eml Attachments and the 1000-character SMTP Limit

2021-10-12 Thread Matt Corallo via mailop via mailop
On 10/12/21 10:26, Brandon Long via mailop wrote: Also, there is a tension in the rfc's here, because you aren't allowed to encode message/rfc822, so you would have to edit the attached file. Ah, that's the piece I was missing, explains why no one encodes it and sends long lines :) Thanks!