▲ | asimpletune 2 days ago | ||||||||||||||||||||||||||||||||||||||||
This is terrifying. Imagine trying to explain to a relative the lesson of this post: always be suspicious, even if the email is from a trusted domain and dkim/dmarc/spf all pass… it doesn’t feel good to imagine their reaction. This is still limited in what you can do though. For example you can’t use this to forge messages from other people’s Gmail accounts. > When the message is forwarded, the original DKIM signature usually remains untouched as long as the email content and headers covered by the signature are not modified It does seem surprising the To: header isn’t one of the headers that is covered by the dkim signature. They should just change how their signing is configured, and email clients should warn when the email is legit but the intended recipient could have been changed. | |||||||||||||||||||||||||||||||||||||||||
▲ | bawolff 2 days ago | parent | next [-] | ||||||||||||||||||||||||||||||||||||||||
> Imagine trying to explain to a relative the lesson of this post: always be suspicious, even if the email is from a trusted domain and dkim/dmarc/spf all pass Imagine explaining to a relative what dkim/dmarc/spf is! These are all behind the scenes technology that users should not be aware of. Honestly this attack is not as scary as it sounds. The article is being misleading to sell their product. > It does seem surprising the To: header isn’t one of the headers that is covered by the dkim signature. I dont think that would really matter. How often do you read the To header. Keep in mind that in email the To header does not have to include the intended recipient. | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
▲ | JoshTriplett 2 days ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||
> always be suspicious, even if the email is from a trusted domain and dkim/dmarc/spf all pass This was the default state of email for a long time, and is still the level of caution some people apply to email: never trust `From`. | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
▲ | aaronmdjones 2 days ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||
> It does seem surprising the To: header isn’t one of the headers that is covered by the dkim signature It is, which is why they had to preserve it. The screenshot of delivery under the reproduction section shows the original To: address. This isn't the address that it is delivered to; you can deliver an email to any address with any other To: field in it. | |||||||||||||||||||||||||||||||||||||||||
▲ | tmdetect a day ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||
My advice here is pretty standard: If you get an email that requires an action, go to the website directly. Don't click any links. It adds friction, but does solve the problem. For banking/systems, I'd much rather have the friction. | |||||||||||||||||||||||||||||||||||||||||
▲ | thewebguyd 7 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||||||||
> This is terrifying. Imagine trying to explain to a relative the lesson of this post: always be suspicious, even if the email is from a trusted domain and dkim/dmarc/spf all pass… it doesn’t feel good to imagine their reaction. I mean, this has been policy at my work for a while now, and in general is good practice for anything on the internet. We deal with a lot of small businesses or just individual contractors, a good chunk still don't even use MFA, or if they do are still falling victim to token theft. We then get malicious emails from these compromised accounts, so to our users - they pass all checks and look legitimate, after all it appears to be actually from our customers. So yeah it's fair to treat everything with suspicion, especially email. |