Re: [Full-disclosure] Microsoft Outlook Vulnerability: S/MIMELossof Integrity

2013-06-17 Thread ACROS Security Lists
Valdis, No, that's how to do it *hardline*. There's many in the security industry that will explain to you that it's also doing it *wrong*. Hint - the first time that HR sends out a posting about a 3-day window next week to change your insurance plan without penalty, signs it with

Re: [Full-disclosure] Microsoft Outlook Vulnerability: S/MIMELossof Integrity

2013-06-17 Thread Jeffrey Walton
On Mon, Jun 17, 2013 at 11:19 AM, ACROS Security Lists li...@acros.si wrote: Valdis, No, that's how to do it *hardline*. There's many in the security industry that will explain to you that it's also doing it *wrong*. Hint - the first time that HR sends out a posting about a 3-day window

Re: [Full-disclosure] Microsoft Outlook Vulnerability: S/MIMELossof Integrity

2013-06-17 Thread Daniël W . Crompton
Jeff, how would that work? AKAIK S/MIME is public key cryptography, how would you decrypt a message which is not encrypted with your public key? D. On 17 June 2013 20:17, Jeffrey Walton noloa...@gmail.com wrote: On Mon, Jun 17, 2013 at 11:19 AM, ACROS Security Lists li...@acros.si wrote:

Re: [Full-disclosure] Microsoft Outlook Vulnerability: S/MIMELossof Integrity

2013-06-17 Thread Jeffrey Walton
On Mon, Jun 17, 2013 at 2:49 PM, Daniël W. Crompton daniel.cromp...@gmail.com wrote: how would that work? AKAIK S/MIME is public key cryptography, how would you decrypt a message which is not encrypted with your public key? Exactly. How does one decrypt when they don't hold the private key.