There was one interesting thread yesterday about p9sk1 and the leaking of info allowing, in some cases, to break easily the whole security.
Here is another rather trivial example but it may be interesting to some---and it may explain why on some lists, mails appear in chronological disorder. (Not specific to Plan9: general problem.) Context: when it comes to mail, I'm no specialist and just an end user. Since I'm getting old, I kept with the "old" scheme that my outcoming mail was to be fed to the Internet connection provider smtp server. But since I may have to change the ISP---for whatever reason, generally technical: lack of connection...---, I have a principal email address, that is independent from the ISP domain, and, to segregate mails, I may have alternate domain addresses. Not this long ago, there was no problem. But eventually, the service was provided with STARTTLS. No real problem too, except to put the service in place. Then some ISP started, while being authenticated both by the IP provided and furthermore by user account, to disallow sending mail if the envelop address was not the user account address, trying to force to use their provided mail address. I then set the envelop address to the one required, but still set the From: header address to my principal email address. It worked. Then, some days ago, I decided to send a message to an organization, say foo.org (french political organization). On their website, they advertised (they still do) some: contact_...@foo.org. Unpersonal address. I had then the surprise to have Gmail bouncing a message to me about a real person address, with the headers explaining that Google has changed the policy and that mail without at least SPF or DKIM was not anymore delivered. The leak of information is here: the contact_...@foo.org was in fact forwarded to a real account. My ISP, apparently, doesn't set SPF or DKIM to mail that have not the From: address matching the envelop one (while both SPF and DKIM have nothing to do with that, if I'm not mistaken: that's DMARC; and I'm perfectly identifiable by both my IP and my user account). So my message bounced to me because this lack of "security" feature but displaying a personal information. First note: I changed my configuration to use, from now on, because it exists (but this may not be at disposal for everybody), the smtp linked to the domain of my principal email address, and set both SPF and DKIM. The result is that the mails are delivered without delay -> this may explain why some addresses appear in mailing lists in chronological disorder, because messages are put in quarantine, along the way, due to lack of SPF or DKIM (not DMARC). To add to the fun, it appears that the real person behind the generic "contact_...@foo.org" is known to me. The information leaked, in this case, is not that this person has something to do with the organization (it was known). The fun is that this person left the organization almost two years ago, for a concurrent one (and in political organizations, to be a traitor to one's country is not a problem, but to be a traitor to the political organization is unforgivable). That foo.org have changed their contact email address but not updated their website still advertising an old address. Hence, people trying to contact foo.org using their published contact email address were sending information to a concurrent organization... Splendid! Security is a two edges blade: it can cut the throat of a opponent, or cut your hand if you don't have a safety handle. In this case, it can be used to probe for information precisely by crafting an incorrect message to trigger error. -- Thierry Laronde <tlaronde +AT+ kergis +dot+ com> http://www.kergis.com/ http://kertex.kergis.com/ http://nunc-et-hic.fr/ Key fingerprint = 0FF7 E906 FBAF FE95 FD89 250D 52B1 AE95 6006 F40C ------------------------------------------ 9fans: 9fans Permalink: https://9fans.topicbox.com/groups/9fans/T629509e6dbb32f37-Mf366d007d0da2425cff92a2d Delivery options: https://9fans.topicbox.com/groups/9fans/subscription