Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Businesses Communications Google The Internet IT

Gmail Messages Are Vulnerable To Interception 460

Michael Wally writes "GMail messages are vulnerable to interception. An attacker has only to transmit malformed test messages to himself, and information left over in memory, from previous messages destined for other people, will appear with the test messages, in the attacker's inbox. Sometimes, this information may include usernames and passwords... Do you use GMail? Are your communications private? Should they be? Well, here's what we figured out about the issue, that may or may not help you - or perhaps GMail, if anyone can get ahold of their developers, to tell them about it." Update: 01/12 22:21 GMT by T : Good news for Gmail users; those malformed messages are no longer being accepted; read below for a message from Chris DiBona.

chrisd writes "Just so you know, at 10:15am PST mails with the problematic formatting as described in your previous story stopped being accepted into Gmail. Previous emails that had this problem will also no longer will be accessible. If you don't mind, I'd like to take the time to remind Slashdot readers that they can send bugs that may have a security aspect into security@google.com. If they like, they should feel free to cc me at cdibona@google.com. We appreciate your patience and we're sorry about the bug."

This discussion has been archived. No new comments can be posted.

Gmail Messages Are Vulnerable To Interception

Comments Filter:
  • Wow (Score:5, Funny)

    by bperkins ( 12056 ) * on Wednesday January 12, 2005 @01:24PM (#11336923) Homepage Journal
    Did any of this "left over" information happen to be spurious commas?
    • Re:Wow (Score:4, Funny)

      by TedCheshireAcad ( 311748 ) <ted@fUMLAUTc.rit.edu minus punct> on Wednesday January 12, 2005 @01:27PM (#11336972) Homepage
      ,,,, no, ret,u,rn to yo,ur work. ,,
      ,do,not,,worry abou,t t,he com,mas.
    • Broken XML (Score:4, Insightful)

      by Glonoinha ( 587375 ) on Wednesday January 12, 2005 @01:57PM (#11337427) Journal
      Jesus - am I the only one to recognize this bug?
      This is just the most publicly seen instance but broken XML does this every single day.

      Use the greater than and less than signs as data delimiters in the 'next generation' of data encoding (XML)? WTF were they thinking?

      I'm not 100% they are using true XML but from the looks of it if they aren't they are using a home-built XML wanna-be and - well it looks like I was right a few years ago when I (unsuccessfully) campaigned against doing it that way. Not that I campaigned very loud, as I am basically a nobody.
      • This is just the most publicly seen instance but broken XML does this every single day.

        XML never does this. XML parsers, upon finding a problem must stop parsing and throw a fatal error. It's in the specification.

        Instead of mindlessly knee-jerking because you don't like XML, try reading the article. The greater-than symbol that causes problems is the delimiter for the email address - syntax that goes back to 1982's RFC 822 - long before XML's time.

  • by dolo666 ( 195584 ) on Wednesday January 12, 2005 @01:24PM (#11336925) Journal
    Is it just me or do you find it strange that in the list of known Gmail bugs [google.com], there is no catagory for Security? I'm trying to find out if this bug is one of the known bugs, but I'm guessing it's not? And I'm also guessing that Security is not a concern for Google at this point, which is a very bad thing, IMHO. People are relying on Gmail because of its awesome features, but if someone can read insecured data directly from memory, it's a really big problem -- perhaps even a global design flaw of the system. No wonder Google plays their cards so close to their chest... I just hope they take some amazing measures to prevent these types of bugs in the future... like when somone does >>> or >>>> etc...

    I use Gmail and this bug sort of disturbs me. Aren't they using a proper preg check to see if the fields are enclosed with < > ? I'm not even sure how this bug could exist in any normal computing system. I guess the gmail system is a hybrid of some kind? This is indeed very telling...

    But it doesn't make me want to stop using Gmail. It's a random security breech that looks like they could fix it in an hour if they wanted to. Time to stop checking my email for a while until this is fixed...
    • by TrippTDF ( 513419 ) <{moc.liamg} {ta} {dnalih}> on Wednesday January 12, 2005 @01:29PM (#11336996)
      This is just a shot in the dark, but I'm willing to bet Google left Security off the list on purpose. a security flaw becomes a lot harder to exploit if the general public does not know it is there.

      I don't hold this against Google at all. I'm glad they are not telling the world how to break into my account...
      • a security flaw becomes a lot harder to exploit if the general public does not know it is there.

        I don't really see what difference the general public makes. The general public isn't interested in exploiting security flaws, even if there is a pre-rolled application which makes it easy, because the general public isn't script kiddies.

        If one bad guy who can write a script for the script kiddies finds out about this, then the general public is at risk, even if he never releases that script. The general p

      • As I said in another post yesterday. We can never expect to be secure without full disclosure at every turn. Bring pressure to bear upon the developers, whether it's Microsoft or Google or Linus of the BSD coding corpses, whenever there is a vulnerability. Keeping it a secret only protects the black hats.
        • I'm all for full disclosure in public software. But gmail and other web services aren't public software.

          Full disclosure has a purpose: to educate users/admins in order to prevent damage to them. It should not be goal in itself.

          In case of proprietary software running on a machine nobody but the developer has access to, why bother. It's not as if the users run more risk if FD isn't practiced. Au contraire.

          The only reason I can think of that would warrant FD, is when you want to keep tabs on the developer,
    • I'm not even sure how this bug could exist in any normal computing system.

      It happens the same way that many (most?) bugs happen -- the human programmer forgot to check for boundary conditions in the data interpretation. As the old saying goes, "garbage in, garbage out" -- if you don't validate your data, you may be surprised at the results you'll get. Here the result is that it's exposing someone else's message to you. But it's not that surprising.

      These things usually boil down to human error and inco

    • by PhilHibbs ( 4537 ) <snarks@gmail.com> on Wednesday January 12, 2005 @01:36PM (#11337104) Journal
      What do you mean, "I'm not even sure how this bug could exist in any normal computing system"? Buffer overruns are everywhere. Although the classic buffer overrun involves getting the app to write beyond the buffer's bounds and into the stack, this one is getting it to read beyond the point that it should. Unless the system has memory protection built in (and that is only possible on very recent processors) then this is entirely unsurprising. "Some kind of hybrid"? You're not making sense.
  • One Key Word (Score:5, Insightful)

    by wcitechnologies ( 836709 ) on Wednesday January 12, 2005 @01:25PM (#11336933)
    BETA. It is unlike google to release half-assed web services. Keep in mind GMail is still being offered as a preview, you can't even sign up unless you know somebody else who has it.

    Google will work out the kinks, they always do.

    • by Anonymous Coward on Wednesday January 12, 2005 @01:31PM (#11337036)
      Next up on Slashdot: the Google apologists vs. the Apple apologists in a brown nose-off...
    • Re:One Key Word (Score:3, Interesting)

      by Richie1984 ( 841487 )
      Even though GMail is still being offered as a preview, there seem to be more invites then there are people willing to sign up, in my experience. Basically, in my opinion, if you want an account it isn't too hard to get one nowadays

      And while GMail is still in Beta, it is still a widespread and widely used email service. So, while I can understand that there are still bugs in the service which Gmail could iron out without too much trouble, I would disagree with people who underestimate the severity of tho
    • Re:One Key Word (Score:5, Insightful)

      by MightyMartian ( 840721 ) on Wednesday January 12, 2005 @01:34PM (#11337083) Journal
      > Google will work out the kinks, they always do.

      Let me know when they fix the disaster known as Google Groups 2. They've buggered up a ton of archive references, and don't exactly seem to responding in a stellar fashion to the problems.
    • Agreed.

      Not only that, as always, e-mail from one network to another across unknown intermediaries is not private. It travels on public wires across public networks. If there's a value in someone targetting you and you're not technically competent enough to know you shouldn't use gmail for important discussions, they can just snap a packet sniffer onto your gateway and watch everything you send and receive right at the source with little fuss and no muss.

      First thing's first: you ought not be relying on gen
    • Re:One Key Word (Score:5, Insightful)

      by phats garage ( 760661 ) on Wednesday January 12, 2005 @01:50PM (#11337310) Homepage Journal
      I disagree.

      I know that its everyones darling, Google, but its not any less of a privacy spilling bug. Look at everyone who jumped on gmail already. Look at the bug itself, their servers trust the email client to terminate a string.

      Never trust an internet client to provide properly formatted strings. Google blew it. (Besides, they're on my bad list for screwing up the usenet archives anyways, they're turning evil.)

  • Beta.. (Score:5, Insightful)

    by ackthpt ( 218170 ) * on Wednesday January 12, 2005 @01:25PM (#11336937) Homepage Journal
    Beta...beta... Golly, I wonder what that means.

    Oh, sure, it means ready to be shipped/used in production by some companies, but has that line gotten to fuzzy for some people?

    "that's not a feature, that's a bug"

    • yes, it's a beta... but shouldn't beta be a functional version being tested for bugs?

      if my email and/or account can be compromised, in a way that cripples its basic functionality as an email service, i am not sure if you can call it a "beta" to begin with. how do you work out bugs in the program if it can't be trusted to function as intended at the very basic level?

      if a beta version of a photoshop, as an example, couldn't even reliably open a JPEG file, that's a serious problem i'd be unwilling to dismi

      • Re:Beta.. (Score:2, Insightful)

        by ackthpt ( 218170 ) *
        yes, it's a beta... but shouldn't beta be a functional version being tested for bugs?

        Certainly, and as a Gmail user you should view your use of Gmail as evaluation, not something you depend upon for any critical application.

        if my email and/or account can be compromised, in a way that cripples its basic functionality as an email service, i am not sure if you can call it a "beta" to begin with. how do you work out bugs in the program if it can't be trusted to function as intended at the very basic level?

      • Re:Beta.. (Score:2, Insightful)

        What again about GMail on "a very basic level" is not functional?

        It does have bugs. It's in beta and it has bugs. I honestly don't see where this is even news.

        if a beta version of a photoshop, as an example, couldn't even reliably open a JPEG file, that's a serious problem i'd be unwilling to dismiss simply as a "bug" just because "it's a beta."

        That metaphor is flawed. A better one would be, "If a beta version of Photoshop couldn't open a JPEG with a bad header reliably, it's a serious problem."
    • If this was an open source project, "Beta" would translate to something like... "I'm bored, let's do something else."

      =Smidge=
    • Re:Beta.. (Score:5, Insightful)

      by ad0gg ( 594412 ) on Wednesday January 12, 2005 @02:00PM (#11337474)
      news.google.com has been in beta for 3 years now. Same with google groups, same with froogle. Pretty much the only thing that google hasn't labeled beta is their main search engine.
    • We recently had a discussion at work over whether or not to label something as "Beta". One side said users will think beta == crappy. The other side said users think beta == cutting-edge. I'm sure, as with most two-sided issues, reality lies somewhere in the middle.
      • I think beta here means no warranties, no more, no less. Google has many services labled as beta, but the said services are working as if they were ready. The only diference is that if any find a bug, and some of them have tons of it (orkut comes to mind), they can simply state that this is a beta test.
  • Email isn't secure (Score:5, Informative)

    by krog ( 25663 ) on Wednesday January 12, 2005 @01:26PM (#11336951) Homepage
    and should never be treated as such. If you want security, use strong encryption.

    This is as it was 10 years ago, 5 years ago, now, and in the future. Plaintext should be treated as though you were sending a postcard in the mail.
    • email isn't secure, sure. but accounts should be, at least to a reasonable level. afterall, we have many examples of web-based services that depend on the security of account id/paassword, like banking and credit card sites.

      it's one thing for the email being sent to be intercepted. it's quite another to leave a hole such that your account name and password can be obtained by strangers.

    • Plaintext should be treated as though you were sending a postcard in the mail.

      Most people have the reasonable expectation that their postcards are at least being delivered to the right recipients. The gmail bug is equivalent to the post office making photocopies of a postcard and stuffing them in all your neighbors' postboxes. It allows lots of technically illiterate people with no hacker/secret-agent/NSA training to read your mail.
    • OK, but if someone found a short perl script that would reveal random selections from recently sent postcards in the mail, that would sure as hell be news. The fact that it can be read in theory by other means doesn't mean that a particularly easy way to read it is irrelevant.
  • by American AC in Paris ( 230456 ) * on Wednesday January 12, 2005 @01:27PM (#11336957) Homepage
    When you find a bug like this, you should first and foremost submit it to the party responsible for the maintenance of the code. You should at least give the responsible party the opportunity to review/respond/repair before making vulnerabilities public knowledge.

    Security exploits are a serious matter, and they need to be handled properly. Throwing this kind of thing out in the open willy-nilly is, at best, irresponsible. For one, it means that Google must now rush a fix for something which may have already been in the bugfix queue; rush jobs can disrupt the entire project and increases the odds of human error--which can lead to unnecessary security vulnerabilities.

    As for these guys getting hired by Google--being smarmy twits about Google's code review practices probably isn't gonna help their case any. Shame, because a little tact and professional courtesy would have given them a damn good running start at it...

    • What's this - the 10 commandments? You seem rather opinionated. Clearly the guys concerned don't agree with you. I use Gmail and I'm glad I'm aware of how insecure it is - something which wouldn't be the case if they'd not made me aware of it.

      I guess it's the hat thing. You've decided you have to choose what colour they're wearing and what they've done doesn't match. I'd leave the hats alone and think for yourself. They've spotted a bug in beta code and decided it was easier to tell the public rather than
      • It doesn't matter what colour hat you classify them as, or whether you personally are glad that you know gmail is insecure - and you are also somehow happy that every script kiddie now knows how to attack your account.

        There is no excuse whatsoever for releasing something like this to the public, especially without notifying the service and giving a long enough period for them to fix it (IMO even going public then doesn't achieve anything). All that this achieves is self-glorification for the people findin
      • What's this - the 10 commandments? You seem rather opinionated. Clearly the guys concerned don't agree with you. [...] They've spotted a bug in beta code and decided it was easier to tell the public rather than Google. Good luck to them.

        Because it has become standard practice in the industry to inform the vendor and give them a reasonable amount of time to come out with a patch before publically annoucing the exploit. It's called professionalism a.k.a. an endangered species here at slashdot.

        • by pthisis ( 27352 ) on Wednesday January 12, 2005 @02:49PM (#11338139) Homepage Journal
          Because it has become standard practice in the industry to inform the vendor and give them a reasonable amount of time to come out with a patch before publically annoucing the exploit.

          Key here is "reasonable amount of time", which should be no more than a couple of weeks. Even that may be too long and many vendors will threaten you with lawsuits for going public once you've privately informed them of security holes.

          As Bruce Schneier (author of Applied Cryptography, creator of Blowfish/Twofish, etc) writes:

          What we've learned during the past eight or so years is that full disclosure helps much more than it hurts. Since full disclosure has become the norm, the computer industry has transformed itself from a group of companies that ignores security and belittles vulnerabilities into one that fixes vulnerabilities as quickly as possible.


          Note that Schneier does say:

          I believe in giving the vendor advance notice. CERT took this to an extreme, sometimes giving the vendor years to fix the problem. I'd like to see the researcher tell the vendor that he will publish the vulnerability in a few weeks, and then stick to that promise.


          Also from the same article:
          http://www.schneier.com/crypto-gram-0111.html [schneier.com]

          During the early years of computers and networks, bug secrecy was the norm. When users and researchers found vulnerabilities in a software product, they would quietly alert the vendor. In theory, the vendor would then fix the vulnerability...There were incidents of vendors threatening researchers if they made their findings public, and smear campaigns against researchers who announced the existence of vulnerabilities (even if they omitted details). And so many vulnerabilities remained unfixed for years.

          The full disclosure movement was born out of frustration with this process. Once a vulnerability is published, public pressures give vendors a strong incentive to fix the problem quickly. For the most part, this has worked. Today, many researchers publish vulnerabilities they discover on mailing lists such as Bugtraq. The press writes about the vulnerabilities in the computer magazines. The vendors scramble to patch these vulnerabilities as soon as they are publicized, so they can write their own press releases about how quickly and thoroughly they fixed things. The full disclosure movement is improving Internet security.
    • When you find a bug like this, you should first and foremost submit it to the party responsible for the maintenance of the code. You should at least give the responsible party the opportunity to review/respond/repair before making vulnerabilities public knowledge.

      Security exploits are a serious matter, and they need to be handled properly. Throwing this kind of thing out in the open willy-nilly is, at best, irresponsible.


      You state that as fact, yet full disclosure is probably the most widely accepted way
    • Sorry to bother you, Microsoft. It won't happen again.
    • I wager most of their pre IPO developers are a little busy watching the value of their stock, debating whether to buy a Porsche or Mercedes, shopping for the country estate, and trying to decide when the perfect time to retire to maximimize their wealth.

      The 60 minutes piece on them suggests the company culture is try to compel them to not flaunt their wealth and keep their head screwed on straight but when people become millionaires and billionaires overnight chances are high that they are going to lose th
  • Well... (Score:2, Insightful)

    by grub ( 11606 )

    Yeah, it's a potential privacy breach. That said, using a web-based email system for top secret or potentially embarassing mail is pretty dumb. You get what you pay for, gmail is no different. (nb: I'm a happy gmail user)
  • by account_deleted ( 4530225 ) on Wednesday January 12, 2005 @01:28PM (#11336993)
    Comment removed based on user account deletion
  • Newsflash (Score:5, Insightful)

    by hackstraw ( 262471 ) * on Wednesday January 12, 2005 @01:29PM (#11337000)
    Speaking loudly in a public place can be intercepted!

    Although this appears to be a valid bug in GMail (that is still beta mind you, and will probably be fixed very quickly), who in the world considers plain text communication secure?

    I have no idea who at my ISP has root access (or others that can gain root access) to read my plaintext mailbox.

    Nothing to see here... please move along.
    • Re:Newsflash (Score:5, Informative)

      by Country_hacker ( 639557 ) <country.hacker@gmail.com> on Wednesday January 12, 2005 @01:41PM (#11337181)
      Looks to me like they already fixed it, I tried sending an email without putting the end bracket on the address (Just like the guys in TFA) and it popped an error message. Those guys at Google are on the ball today. :-)
      • No, it still works.

        Net::SMTP>>> Net::SMTP(2.29)
        Net::SMTP>>> Net::Cmd(2.26)
        Net::SMTP>>> Exporter(5.58)
        Net::SMTP>>> IO::Socket::INET(1.27)
        Net::SMTP>>> IO::Socket(1.28)
        Net::SMTP>>> IO::Handle(1.24)
        Net::SMTP=GLOB(0x182eb00)<<< 220 mx.gmail.com ESMTP 35si124276wra
        Net::SMTP=GLOB(0x182eb00)>>> EHLO localhost.localdomain

        Net::SMTP=GLOB(0x182eb00) <<< 250-mx.gmail.com at your service
        Net::SMTP=GLOB(0x182eb00)<<< 250-SIZE 20

        • The problem wasn't that it was accepting mail that looked like that, it was that when reading the email that contained the faulty send line, it would read past the end of the "From" line looking for the matching >, which could result in a sort of buffer overflow that would read into other people's messages.

          You need to actually look at the message you sent in the GMail interface to see if it has been fixed.

    • Ideally, the machines at the ISP would be set up so that even Root couldn't read the mail under normal circumstances - it would be encrypted and only tranlated to something readable at the request of the user.

      But then again, I doubt that's actually the setup in many, many places.
  • Well hey.. (Score:5, Funny)

    by sinner0423 ( 687266 ) <sinner0423&gmail,com> on Wednesday January 12, 2005 @01:31PM (#11337029)
    Google = best & brightest, right?

    I mean, their aptitude tests & hiring policies makes me believe they've got a few nobel prize winners working there..

    Shouldn't they be able to fix this during lunch break?
  • by Idaho ( 12907 ) on Wednesday January 12, 2005 @01:32PM (#11337039)
    From the description, the way you can read messages of other people has nothing to do with 'intercepting' messages. Man in the middle attacks are always possible, but this looks like a simple serverside bug (buffer overflow or string formatting problem, most likely) which will probably be fixed on short notice.

    I don't think you can do directed attacks either (e.g. 'intercept' only the mail of a specific target). So I think it's not a real showstopper.

    Still, it shows that even Google can make mistakes in their code...who would have thought! ;)
  • by jxyama ( 821091 ) on Wednesday January 12, 2005 @01:32PM (#11337051)
    headless $500 Mac and $99 iPod...

    now Google messes up...

    with all the natural disasters happening, i cannot think of a good reason why the world wouldn't end the day after tomorrow.

  • Oh shit!


    Couldn't they have notified Google first, before going public? Given them time to take action? I don't like the fact that my email is suddenly vulnerable now that everyone and their brother knows how to intercept gmail messages.
  • Well... (Score:3, Insightful)

    by slavemowgli ( 585321 ) on Wednesday January 12, 2005 @01:34PM (#11337081) Homepage
    Serious as it may be, this does not allow you to selectively attack a specific person or account - you just have to "hope for the best", so to speak. While I wouldn't underrate it (is that a word?), I wouldn't overrate it, either, and I'm pretty sure that the Google people will plug this in no time. It's been my experience that they do look at reports that are coming in (just like they claim), and that they are generally quite quick to fix even minor issues, so something that is security-related *and* (by the sounds of it) easily fixable shouldn't last long.

    That being said, did the authors actually contact Google about this prior to making the whole thing public? Full disclosure is good, of course, but it's also nice to give the vendor a chance to fix things before you inform every script kiddie in the world about what you found. :)
  • by pavon ( 30274 ) on Wednesday January 12, 2005 @01:37PM (#11337134)
    To everyone expressing concern about using gmail in light of this exploit - I hope you know that all email is vulnerable to interception. It is sent as plaintext across the internet, and hops though a dozen servers before ending up at it's final destination. This exploit is just another way to do something that has been possible by design ever since email was created.

    If you want your email to be secure you have to encrypt it. Otherwise don't have any expectation for privacy.
  • E-mail messages succeptable to interception!!
  • GMail vs Hotmail (Score:5, Insightful)

    by kevin_conaway ( 585204 ) on Wednesday January 12, 2005 @01:42PM (#11337201) Homepage
    Why is everyone brushing this off by saying "well you should have known that email isnt secure, tough luck!"

    If Hotmail had this bug, everyone here would be up in arms.

    Just because email isnt secure doesnt mean this isn't serious. I would hate to think of all the people reading my responses to craigslist postings :)
    • What does the word at the bottom right of this image [google.com] say? (Clue: you won't find it on the Hotmail site...)
  • GMail messages are vulnerable to interception.

    Can anyone name a form of message that isn't vulnerable to interception?

  • That's what you get for writing your OWN web server instead of using Apache or Zeus or whatever:
    Server: GFE/1.3

    For more fun, check out how ebay's static and images server returs responses null-padded to 4KB boundaries (usually).

  • Way to go, jerks. (Score:3, Insightful)

    by Canthros ( 5769 ) on Wednesday January 12, 2005 @01:45PM (#11337248)
    You did notify Google and give them a reasonable period to time in which to respond, right? Because you've just shouted, in the loudest possible way, how to access all that data you're so worried about protecting.
  • SPAM! (Score:3, Insightful)

    by knitterb ( 103829 ) on Wednesday January 12, 2005 @01:45PM (#11337251) Homepage
    Chances are, since most email these days are spam, an attacker is going to have to go through a lot of spam before finding something interesting.
  • i tried... (Score:2, Interesting)

    by tcollier ( 125367 )
    sending my own malformed message, but I didn't see any extra info in the headers....
  • Yawn... (Score:3, Funny)

    by revery ( 456516 ) <charles@NoSpam.cac2.net> on Wednesday January 12, 2005 @01:52PM (#11337341) Homepage
    I already read about this in a newsletter that I received in the "Reply To" field of an email.

    --
    Was it the sheep climbing onto the altar, or the cattle lowing to be slain,
    or the Son of God hanging dead and bloodied on a cross that told me this was a world condemned, but loved and bought with blood.
  • by EvilFrog ( 559066 ) on Wednesday January 12, 2005 @01:53PM (#11337350)
    Many other people have pointed out that GMail is still in beta, and that if they would have told Google first it probably would have gotten quietly fixed without any damage being done.

    Of course, they acknowledge that, but they're arguing that they're helping protect people by making them aware of the problem.

    I call bullshit. This is about them wanting recognition for finding the bug. If they would have sent it to Google, it would have been fixed and no one would care who discovered it. Because they went public with it they can boast that they were the ones who found the bug.

    Of course, it swings both ways. Now if someone uses this exploit and steals your password (which is honestly rather unlikely), you know who to blame for making it public knowledge before Google had the chance to fix it.
  • Need it be said: You get what you pay for.
  • The strangest thing happened to me when using gmail a few weeks ago. First I tried to send an .exe file, and of course gmail told me, "you're not allowed to send .exe files". So I changed the file extension and still got the same response somehow. Ok, then it gets weird:
    I figured I could hide it in a zip file so gmail wouldn't notice, and it still tells me I can't send an exe file!, then I encrypt the zip file, figuring there would be no way gmail could see what's inside, and it still finds the .exe fi
  • Hacker Hubris (Score:5, Insightful)

    by Jtheletter ( 686279 ) on Wednesday January 12, 2005 @02:06PM (#11337574)
    Wow, are these guys full of themselves. I write complex automation code for a living, in an environment that demands rigorous QA practices and documentation, but guess what? We still create bugs, find latent bugs that have gone undiscovered for many builds, and even get some real DUH! headslappers from time to time. Fact of the matter is, when you've got a couple hundred thousand lines of code there are going to be errors and unintended consequences, mostly arising out of missed checks, such as this gmail problem (assuming they're right about the end tag check being the cause).

    For these people to find a single issue in such a system, then say it's a shortcoming of gmail's QA process, and in the same breath ask for work - implying they've got the skills to even handle such a job - is insulting. Please, just because you're smart enough to expose a flaw once you stumbled onto it in no way means you are qualified to correct that or any other issue. Sometimes our QA team finds a flaw and even digs in the logs enough to pinpoint the problem but it can still take the developer who designed the code days to correct.

    In other words, noticing that you're bleeding does not qualify you as a surgeon. Instead of publishing their finidings in a detailed how-to, these asshats should have forwarded the info to gmail and let them deal with it, and that's assuming that the gmail team didn't already have it in their list of bugs. I just don't understand why people feel the need to not only describe a security problem, but give every hacker on the net a roadmap as to just exactly how to use it and what illicit activity it might be good for.

  • From what I read on the site you could protect your message from interception by placing a '>' character at the start of yout subject line or message body. If you are concerned about privacy use a > until they fix the bug.
  • by Lank ( 19922 ) on Wednesday January 12, 2005 @02:07PM (#11337589)
    At the bottom of TFA:

    Screen Capture #5 [milatic.net]
    Jack Rabbit Vibrator Features

    This message describes the features of one "Jack Rabbit Vibrator," a 7.5" Multi-Speed toy of sorts.


    What are the odds of finding that?
  • I have two gmail accounts (I'm evil). I tried to open both simultaneously in separate Firefox tabs. A short time after opening the second tab / account, I switched back to the first, to find the inbox listing the messages from the second account. Refreshing the page brought the entire page display to reflect the second account.

    I've also witnessed on at least one occasion an https session surviving overnight, with the POTS connection severed during this time.

    These experiences have already led me to cons
  • NOTHING is secure. Everything on the net lasts forever. It can easily be intercepted, archived and screwed with in a hundred different places, and since it's around so long, eventually someone is going to figure out the encryption.

    So if you are worried about your companies cooked books, your mistress and your assanitation plan being discovered--DON'T write Email about them!

    Also, by the way, if it's that important: Don't post it in a chat room or BBS, even "Anonymously", don't write or type it anywhere,
  • A Job? (Score:5, Insightful)

    by jayloden ( 806185 ) on Wednesday January 12, 2005 @03:18PM (#11338548)
    lots of comments here are noting the hubris of these guys in asking for jobs.

    I'd just like to add that not only are they criticizing the company's QA process and releasing the bug without having notified google first, as others pointed out...

    They found the exploit by MISTAKE! It was a bug in their own code that caused the problem, something as stupid as a missing caret at the end of a line. So, in other words, they are looking for work looking for bugs in Google's software that they found solely because of a bug in the software they wrote.

    On another note, bugs in software happen, no matter WHO you are, the trick is just to be able to fix them in a timely fashion and deal with the situation effectively. I believe that Google will do this, especially if the previous comment stating that it has been patched is true. Everyone is making too big a deal out of something that has happened to every developer on every software ever. The reason MS gets crap for it is simply because they continuously produce buggy code ridden with security issues, but deny this is the case, and often ignore security problems until they are found out by the general public.

    -Jay
  • by ahsile ( 187881 ) on Wednesday January 12, 2005 @04:07PM (#11339231) Homepage Journal
    I'm assuming this is until the problem is fixed:

    "APPLICATION" 516 "2005-01-12 20:01:48" "SMTPDeliverer - Message 15213: Delivering message from xxxxxxxxx@xxxxx.com to xxxxx@gmail.com."
    "TCPIP" 516 "2005-01-12 20:01:48" "DNSResolver - MX Lookup: gmail.com"
    "TCPIP" 516 "2005-01-12 20:01:48" "DNSResolver - MX Lookup result for gmail.com: 3 servers"
    "APPLICATION" 516 "2005-01-12 20:02:09" "SMTPDeliverer - Message 15213: Failed to connect to gsmtp185.google.com."
    "APPLICATION" 516 "2005-01-12 20:02:30" "SMTPDeliverer - Message 15213: Failed to connect to gsmtp171.google.com."
    "APPLICATION" 516 "2005-01-12 20:02:51" "SMTPDeliverer - Message 15213: Failed to connect to gsmtp57.google.com."
    "APPLICATION" 516 "2005-01-12 20:03:13" "SMTPDeliverer - Message 15213: Failed to connect to gmail.com."
    "APPLICATION" 516 "2005-01-12 20:03:13" "SMTPDeliverer - Message 15213: Failed to connect to all xxxxx@gmail.com's mail servers."

"Look! There! Evil!.. pure and simple, total evil from the Eighth Dimension!" -- Buckaroo Banzai

Working...