this post was submitted on 28 Nov 2023
1152 points (95.5% liked)

memes

10334 readers
2236 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to [email protected]

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/AdsNo advertisements or spam. This is an instance rule and the only way to live.

Sister communities

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 2 points 11 months ago (1 children)

Yeah, you're right - it's SMTP not NNTP. Considering that back in the day I used to telnet to port 25 of my uni's server to send e-mails portraying as one of my teachers to take the piss of my friends and hence knew at least some of the protocol, I must be getting old to confuse the acronyms.

But yeah, the main point is not the network being "public" (in the sense that anybody can access it) it's that - as I explained but you seemed to have missed - the intermediate hops for an e-mail travelling on the internet can be owned by just about anybody and, worse, not necessarilly in your country working under local laws - routing will often send things around in quite unexpected tours on a physical sense depending on network topology - whilst the nodes the fax data travels on a phone network are generally owned by just 1 company or 2 (the latter in countries with multiple landline providers if you send it from a phone in one to the phone in another, as the network topology is much simpler and all providers connect to each other directly).

If your data goes over at most only 2 networks owned by very specific companies it is inherently safer from eavesdropping that if it goes over an unknown number of networks owned by an unknow number of companies. This is not the same as saying it's "safe" - it's just one relative to the other, rather than an endorsment of faxing.

Also there are usually laws around eavesdropping on phone calls, from the old days, whilst it's the Wild West out there when it comes to those operating intermediate nodes eavesdropping on e-mails.

Frankly, if you can't send the data encrypted, then faxing is probably safer from a privacy point of view (it would take a crooked telecoms operator risking their license, a Court Order or physical access to eavesdrop on it), but if encrypted e-mail is safer at least content-wise, though as I pointed out plain e-mail with unencrypted headers leaks meta data even if the contents is encrypted.

[–] [email protected] 1 points 11 months ago* (last edited 11 months ago) (2 children)

to send e-mails portraying as one of my teachers to take the piss of my friends and hence knew at least some of the protocol

Nowdays client-server and server-server communication is ecrypted and signed, so no an issue now.

not necessarilly in your country working under local laws

Scary part when they do

[–] [email protected] 2 points 11 months ago* (last edited 11 months ago) (1 children)

Yeah, those were the "good old days" before the openning of the Internet to the broader public when most protocols were all naive and innocent, with zero security consciousness, and SMTP servers didn't even require a username:password pair from clients to send e-mails with specific From fields.

Mind you, it's still possible to connect to most SMTP servers using the unencrypted protocol - as it sits on a different port than the stuff using TLS so can be enabled alongside the encrypted protocols - though it's highly inadvisable to use the plain text protocols (the reason for which, by the way, goes back to my point about how IP can route packets through who-knows-were, so unencrypted stuff - most dangerously your password to access your e-mail - can be more easilly eavesdroped), but at least even the non-encrypted stuff nowadays requires a username and password.

As for your "point" about local law well, if you live in a coubtry next to those guys faxes will not go via there, ever, e-mails might very well go via there and end up in the modern equivalent of those tapes. Interestingly enough on this, when Snowden revelatiosn came out it was discovered that the UK surveillance apparatus (which is way more abusive than even the US) was eavesdropping on their side of the submarine cables that crossed the Atlantic from their coast and thus managed to eavesdrop on a significant proportion of the internet communications to and from all of Europe.

[–] [email protected] 1 points 11 months ago (1 children)

if you live in a coubtry next to those guys

What if I live in country WITH those guys? Using phone is less safe(as in police knocking down your door) than sending unencrypted email.

If you live next to those guys, you will be surprised how insecure phone networks are.

most dangerously your password to access your e-mail

Are we talking about client-server or server-server?

[–] [email protected] 1 points 11 months ago* (last edited 11 months ago) (1 children)

Do you genuinelly think a surveillance society would refrain from watching people's Internet use but not refrain from doing so for their phone landlines?!

Because that makes no sense at all, especially considering that in earlier days it was actually easier to record Internet usage (less data and already in digital format) than phone lines, though nowadays data storage, processing power and even speech-to-text engines make eavesdropping on phone lines easier.

In fact even supposedly Democratic nations have been caugh doing mass surveillance of people's Internet use (that's what the Snowden revelations were all about) - because there were no clear laws on that - all the while phone line surveillance does have clear laws, dating from way back, that require a Court Mandate for it to be lawfully done: it was and is legally easier to do mass surveilance on the Internet even in supposedly Rule Of Law Democratic nations that phone line surveillance.

[–] [email protected] 1 points 11 months ago

Both of course, but landlines are low hanging fruit.

[–] [email protected] 1 points 11 months ago (1 children)

Nowdays client-server and server-server communication is ecrypted and signed, so no an issue now.

This is probably true, but in a very unsatisfying way. It's not accurate to say this is not an issue now because mail servers talk to each other with opportunistic encryption


if both ends say "hey, I support TLS" they'll talk over TLS, but if either end claims to not support TLS they'll default to plain text. This is deeply concerning because it's very possible for somebody to mimic another server and get the connection downgraded to plain text, bypassing TLS altogether. There are standards to deal with this, like DANE, but most large e-mail providers don't support this... The other more recent standard to address this is called MTA-STS, but it's much weaker than DANE and can potentially be exploited (but at least gmail and outlook support it, I guess). E-mail security is in a weird place. It's slightly better than the "completely unencrypted" situation that people seem to think it is... But it's also pretty much impossible to guarantee that your e-mail will not be sent over plain text.

[–] [email protected] 1 points 11 months ago* (last edited 11 months ago) (1 children)

AFAIK DKIM/DMARC now is mandatory on most servers.

But it's also pretty much impossible to guarantee that your e-mail will not be sent over plain text.

GPG. Or other E2EE.

[–] [email protected] 1 points 11 months ago (1 children)

AFAIK DKIM/DMARC now is mandatory on most servers.

DKIM and DMARC don't have anything to do with this. DKIM is a way for e-mail servers to sign e-mails with a key that's placed in DNS in an attempt to prevent e-mail spoofing, but this in no way protects e-mails you send from potentially being read in plain text. DKIM is also not necessarily mandatory, and you can potentially get away with just SPF. Many mail servers also do not have strict sender policies, which could potentially allow for spoofing in certain situations. Also neither DKIM / SPF provide any protections if an attacker is able to poison DNS records.

GPG. Or other E2EE.

I mean, yes, but that's not really the point. PGP has essentially nothing to do with the e-mail protocols aside from the S/MIME extensions. Almost no institution is using PGP to secure e-mails. You could also encrypt something using PGP before you sent it over the fax lines in theory.

[–] [email protected] 1 points 11 months ago (1 children)

Also neither DKIM / SPF provide any protections if an attacker is able to poison DNS records.

Neither TLS provide in such case. Attacker can request ACME cert.

[–] [email protected] 1 points 11 months ago* (last edited 11 months ago)

Neither TLS provide in such case. Attacker can request ACME cert.

Depends whose DNS you can mess with, but yes! It may be possible to poison DNS records for one e-mail server, but ACME certificate providers like letsencrypt (supposedly) try to do DNS lookups from multiple locations (so hopefully a simple man-in-the-middle attack will not be sufficient), and they do lookups directly from the authoritative DNS servers. This is, of course, not perfect and theoretically suffers from all of the same mitm problems, but it's more thorough than most mail servers will be and would potentially limit who would be in the position to perform these attacks and get a bogus certificate issued.

With DNSSEC and DANE you are even able to specify which TLS certificate should be used for a service in a TLSA record, and you can protect your A records and your CAA record which should make it much harder to get bogus certificates issued. Of course you need to trust the TLDs in order to trust DNSSEC, but you already do implicitly (as you point out, if you control the TLD you can get whatever certificate you want issued through ACME). The reality right now is that all trust on the web ultimately stems from the TLDs and DNS, but the current situation with CAs introduces several potential attack vectors. The internet is certainly a lot more secure than it used to be even 10 years ago, but I think there's still a lot of work to be done. DNSSEC, or something like it, would go a long way to solving some of the remaining issues.