[Mailman-Developers] SUBMIT and OpenID, was Two more DMARC mitigations

John Levine johnl at taugh.com
Mon Jun 16 20:47:34 CEST 2014


>>> At least one of the large providers has told me they plan to do OAUTH
>>> submission, presumably with long lived tokens, which would greatly
>>> mitigate the security issues.
>
>I'm trying to track down what's actually going on here.  It's SUBMIT 
>either way, so everything in the code except the way that authorization is 
>sent to the SUBMIT server is the same.

After digging through a festival of acronyms, I ended up at RFC 6616.

Mail submission (port 587) is defined in RFC 4409.  It refers to RFC
2554, now replaced by RFC 4954, which defines the AUTH extension to
SMTP.  That in turn punts to SASL, defined in RFC 4422, which
describes the authorization framework and the initial schemes.  RFC
6616 adds OpenID as a SASL authorization scheme.  It's fairly
impenetrable, but I know the guy who wrote it, so I can probably get
some help, and it's definitely a standards track document so we can
expect everyone who implements it to do so in the same way.  OpenID
tokens can be very long lived -- I've been doing programmed posts to
my Twitter account using the same token for several years.

There are certainly OpenID libraries, but I don't know to what extent
anyone has written the code to splice them into SASL.  It (SASL) is
used for many mail applications including POP and IMAP.  Considering
how easily malware can scrape passwords out of software on PCs, I
expect that the providers have considerable incentive to replace them
with OpenID tokens in MUAs.

I would propose doing the submission hack, explicitly noting that SASL
has a variety of different ways to authenticate with different
usability and security trade offs.

R's,
John


More information about the Mailman-Developers mailing list