Jonathan Rudenberg

debugger.

Jonathan Rudenbergtitanous@infosec.exchange
2023-06-19

@glauca Hey, any chance you’re going to support configuring webauthn as the sole 2FA option for accounts?

Jonathan Rudenbergtitanous@infosec.exchange
2023-06-19

@tomlowenthal And this is why I’ve been putting off moving somewhere else for years now

Jonathan Rudenbergtitanous@infosec.exchange
2023-06-19

@tomlowenthal Google Workspace is the only other option that I’m aware of…

Jonathan Rudenbergtitanous@infosec.exchange
2023-06-16

Annnd tagging @fastmail here got an immediate response to the ticket confirming that as of this week they "now require an aligned DKIM pass for BIMI".

Jonathan Rudenbergtitanous@infosec.exchange
2023-06-16

@acdha @fastmail Yes, exactly, I think this will be what finally pushes me to move off.

Jonathan Rudenbergtitanous@infosec.exchange
2023-06-16

So @fastmail didn’t respond at all to my report sent to security@ about the BIMI spoofing issue. The auto reply from their ticket system claimed that it may take “10 business days to respond” which elapsed this morning (and is way too long for an initial response to a security issue).

Jonathan Rudenbergtitanous@infosec.exchange
2023-06-07

Great coverage of the BIMI spoofing issue from AJ: cyberscoop.com/security-profes

Jonathan Rudenbergtitanous@infosec.exchange
2023-06-06

@bascule @filippo Codespaces is wired up to sign commits, there’s no reason they couldn’t use the same infra for pushes…

Jonathan Rudenbergtitanous@infosec.exchange
2023-06-05

@aliu I did in the next post in my thread! Great paper!

Jonathan Rudenbergtitanous@infosec.exchange
2023-06-05

@kurtseifried BIMI doesn't show up if you're using the native Mail app on iOS with Gmail because they aren't adding the message headers that it is looking for. The logos do show up in the Gmail app.

My only complaint is about the extremely misleading verified checkmark/tooltip (and equivalent UI in Apple Mail). I agree that the logos have no meaningful impact given that Gmail shows profile images.

Jonathan Rudenbergtitanous@infosec.exchange
2023-06-05

@kurtseifried It only shows up in Mail if you are using iCloud for mail or another mail server that adds some BIMI verification headers (currently Fastmail).

Jonathan Rudenbergtitanous@infosec.exchange
2023-06-05

@kurtseifried This what it looks like in Apple Mail (note that iCloud does check DKIM but Fastmail doesn’t, which is how I spoofed this)

Screenshot of message from Mail on iOS 

Digitally Certified Email
This email was verified as coming from the owner of
the logo shown and the domain "ups.com".
Apple uses the Brand Indicators for Message
Identification (BIMI) standard.Screenshot of message in Mail on iOS with UPS logo.

From: spoofed@ups.com
Digitally Certified (Learn More)
Subject: helo from telnet, BIMI sucks
Could we just not?
Jonathan Rudenbergtitanous@infosec.exchange
2023-06-05

@kurtseifried Of course the phishing risk already exists.

There is now a tooltip with an explanation on the checkmark.

I'm absolutely not saying that BIMI will ever fix anything at all related to phishing, just that the current verified checkmark/tooltip makes BIMI _more dangerous_ than not having it given how lax the email validation is.

Jonathan Rudenbergtitanous@infosec.exchange
2023-06-05

@kurtseifried That makes sense in the abstract, but Gmail and Apple have decided to add misleading security-critical indicators to the BIMI UI treatment. So by enabling it you expose users to a pretty scary additional phishing risk due to the ease of spoofing.

Jonathan Rudenbergtitanous@infosec.exchange
2023-06-04

@daniel_ess @filippo For starters, the part where it doesn't require DKIM _at all_

Jonathan Rudenbergtitanous@infosec.exchange
2023-06-03

I replicated the Microsoft 365 spoofing issue after Chris Plummer spotted it being exploited in the wild against ups.com: twitter.com/chrisplummer/statu

Chris eventually posted the headers and after a bit of fiddling in Exchange Online, and many cursed Powershell cmdlet errors from the web UI, I figured out how it worked.

I reported it to MSRC, but I think they failed to triage properly because they closed the report as wontfix yesterday. Today I noticed that they fixed it by rewriting the envelope sender, presumably because either Google or UPS contacted them about it.

UPS also removed outlook.com from their SPF at some point yesterday.

Jonathan Rudenbergtitanous@infosec.exchange
2023-06-03

@glyph Google is looking into it: twitter.com/chrisplummer/statu

I emailed Fastmail but haven't heard back.

Jonathan Rudenbergtitanous@infosec.exchange
2023-06-03

@glyph For some reason they overindexed on DMARC and technically messages that have aligned SPF and any DKIM state (including none or a different domain!?) are considered valid by DMARC. Buried in a separate draft there is suggestion that _maybe_ just relying on DMARC isn't enough: datatracker.ietf.org/doc/html/

Jonathan Rudenberg boosted:
2023-06-03

@filippo @titanous BIMI is basically just "browsers took away our cash cow EV, so we needed a new cash cow". Do you expect they thought this through technically? The thing I don't understand is why google supports this.

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst