Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

crypt_protected_headers_write should be removed, or at least default to yes #4236

Open
alejandro-colomar opened this issue Apr 8, 2024 · 2 comments · Fixed by #4227
Open
Labels
bug:upstream Also exists in upstream Mutt topic:security Security issue type:bug Bug

Comments

@alejandro-colomar
Copy link
Member

As seen in recently reported security vulnerabilities, we need to protect more headers.

Link: #4223
Link: #4226

This makes me wonder...

crypt_protected_headers_write defaults to no. This is insecure. Is there any reason why we would want to support the feature?

I strongly suggest:

  • Change the default behavior to yes. This is a silent breaking change.

And secondarily, it might be good to

  • Remove the variable. This is a Breaking Change.

Although the latter suggestion would be more controversial.

@alejandro-colomar alejandro-colomar added bug:upstream Also exists in upstream Mutt topic:security Security issue type:bug Bug labels Apr 8, 2024
@alejandro-colomar alejandro-colomar changed the title crypt_protected_headers_write should be removed, or at least ignored crypt_protected_headers_write should be removed, or at least default to yes Apr 8, 2024
@flatcap
Copy link
Member

flatcap commented Apr 8, 2024

Change the default behavior to yes

That sounds reasonable...

Remove the variable

We can easily do that too.
The config system has a flag D_INTERNAL_DEPRECATED which means options can be silently ignored.

@alejandro-colomar
Copy link
Member Author

Change the default behavior to yes

That sounds reasonable...

Remove the variable

We can easily do that too. The config system has a flag D_INTERNAL_DEPRECATED which means options can be silently ignored.

Hmmm, sounds good! I'll add those changes to the current PR (#4227).

alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 8, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 8, 2024
Closes: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 8, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 8, 2024
Closes: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 8, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 8, 2024
Closes: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
@alejandro-colomar alejandro-colomar linked a pull request Apr 8, 2024 that will close this issue
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 11, 2024
They are part of the crypto message, which means the sender considers
them part of the important data, and should not be carelessly weeded.

Link: <neomutt#4223>
Link: <neomutt#4226>
Link: <neomutt#4227>
Link: <neomutt#4236>
Link: <neomutt#4237>
Cc: Richard Russon <rich@flatcap.org>
Cc: наб <nabijaczleweli@nabijaczleweli.xyz>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 11, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 11, 2024
Closes: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
flatcap pushed a commit to alejandro-colomar/neomutt that referenced this issue Apr 12, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
flatcap pushed a commit to alejandro-colomar/neomutt that referenced this issue Apr 12, 2024
Closes: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
flatcap pushed a commit to alejandro-colomar/neomutt that referenced this issue Apr 12, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
flatcap pushed a commit to alejandro-colomar/neomutt that referenced this issue Apr 12, 2024
Closes: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
flatcap pushed a commit to alejandro-colomar/neomutt that referenced this issue Apr 12, 2024
They are part of the crypto message, which means the sender considers
them part of the important data, and should not be carelessly weeded.

Link: <neomutt#4223>
Link: <neomutt#4226>
Link: <neomutt#4227>
Link: <neomutt#4236>
Link: <neomutt#4237>
Cc: Richard Russon <rich@flatcap.org>
Cc: наб <nabijaczleweli@nabijaczleweli.xyz>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 12, 2024
Protected header fields are part of the crypto message, which means the
sender considers them part of the important data, and should not be
carelessly weeded.

If the user want to do it, allow them via this variable, but default to
not weeding them.

Link: <neomutt#4223>
Link: <neomutt#4226>
Link: <neomutt#4227>
Link: <neomutt#4236>
Link: <neomutt#4237>
Cc: Richard Russon <rich@flatcap.org>
Cc: наб <nabijaczleweli@nabijaczleweli.xyz>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 14, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 14, 2024
Closes: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 15, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 15, 2024
Closes: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 15, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 15, 2024
Closes: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
flatcap pushed a commit to alejandro-colomar/neomutt that referenced this issue Apr 16, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
flatcap pushed a commit to alejandro-colomar/neomutt that referenced this issue Apr 16, 2024
Closes: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
flatcap pushed a commit to alejandro-colomar/neomutt that referenced this issue Apr 16, 2024
Protected header fields are part of the crypto message, which means the
sender considers them part of the important data, and should not be
carelessly weeded.

If the user want to do it, allow them via this variable, but default to
not weeding them.

Link: <neomutt#4223>
Link: <neomutt#4226>
Link: <neomutt#4227>
Link: <neomutt#4236>
Link: <neomutt#4237>
Cc: Richard Russon <rich@flatcap.org>
Cc: наб <nabijaczleweli@nabijaczleweli.xyz>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
flatcap pushed a commit to alejandro-colomar/neomutt that referenced this issue Apr 16, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
flatcap pushed a commit to alejandro-colomar/neomutt that referenced this issue Apr 16, 2024
Closes: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 17, 2024
Protected header fields are part of the crypto message, which means the
sender considers them part of the important data, and should not be
carelessly weeded.

If the user want to do it, allow them via this variable, but default to
not weeding them.

Link: <neomutt#4223>
Link: <neomutt#4226>
Link: <neomutt#4227>
Link: <neomutt#4236>
Link: <neomutt#4237>
Cc: Richard Russon <rich@flatcap.org>
Cc: наб <nabijaczleweli@nabijaczleweli.xyz>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 17, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 17, 2024
Closes: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 17, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 17, 2024
Closes: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 17, 2024
Protected header fields are part of the crypto message, which means the
sender considers them part of the important data, and should not be
carelessly weeded.

If the user want to do it, allow them via this variable, but default to
not weeding them.

Link: <neomutt#4223>
Link: <neomutt#4226>
Link: <neomutt#4227>
Link: <neomutt#4236>
Link: <neomutt#4237>
Cc: Richard Russon <rich@flatcap.org>
Cc: наб <nabijaczleweli@nabijaczleweli.xyz>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 17, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 17, 2024
Closes: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 17, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 17, 2024
Closes: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 22, 2024
Protected header fields are part of the crypto message, which means the
sender considers them part of the important data, and should not be
carelessly weeded.

If the user want to do it, allow them via this variable, but default to
not weeding them.

Link: <neomutt#4223>
Link: <neomutt#4226>
Link: <neomutt#4227>
Link: <neomutt#4236>
Link: <neomutt#4237>
Cc: Richard Russon <rich@flatcap.org>
Reviewed-by: наб <nabijaczleweli@nabijaczleweli.xyz>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 22, 2024
Protected header fields are part of the crypto message, which means the
sender considers them part of the important data, and should not be
carelessly weeded.

If the user want to do it, allow them via this variable, but default to
not weeding them.

Link: <neomutt#4223>
Link: <neomutt#4226>
Link: <neomutt#4227>
Link: <neomutt#4236>
Link: <neomutt#4237>
Cc: Richard Russon <rich@flatcap.org>
Reviewed-by: наб <nabijaczleweli@nabijaczleweli.xyz>
Cc: Pietro Cerutti <gahr@gahr.ch>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue Apr 25, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Reviewed-by: наб <nabijaczleweli@nabijaczleweli.xyz>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
flatcap pushed a commit to alejandro-colomar/neomutt that referenced this issue Apr 29, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Reviewed-by: наб <nabijaczleweli@nabijaczleweli.xyz>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
flatcap pushed a commit to alejandro-colomar/neomutt that referenced this issue Apr 29, 2024
Protected header fields are part of the crypto message, which means the
sender considers them part of the important data, and should not be
carelessly weeded.

If the user want to do it, allow them via this variable, but default to
not weeding them.

Link: <neomutt#4223>
Link: <neomutt#4226>
Link: <neomutt#4227>
Link: <neomutt#4236>
Link: <neomutt#4237>
Cc: Richard Russon <rich@flatcap.org>
Reviewed-by: наб <nabijaczleweli@nabijaczleweli.xyz>
Cc: Pietro Cerutti <gahr@gahr.ch>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue May 2, 2024
Protected header fields are part of the crypto message, which means the
sender considers them part of the important data, and should not be
carelessly weeded.

If the user want to do it, allow them via this variable, but default to
not weeding them.

Link: <neomutt#4223>
Link: <neomutt#4226>
Link: <neomutt#4227>
Link: <neomutt#4236>
Link: <neomutt#4237>
Cc: Richard Russon <rich@flatcap.org>
Reviewed-by: наб <nabijaczleweli@nabijaczleweli.xyz>
Cc: Pietro Cerutti <gahr@gahr.ch>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
alejandro-colomar added a commit to alejandro-colomar/neomutt that referenced this issue May 2, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Reviewed-by: наб <nabijaczleweli@nabijaczleweli.xyz>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
flatcap pushed a commit to alejandro-colomar/neomutt that referenced this issue May 8, 2024
Protected header fields are part of the crypto message, which means the
sender considers them part of the important data, and should not be
carelessly weeded.

If the user want to do it, allow them via this variable, but default to
not weeding them.

Link: <neomutt#4223>
Link: <neomutt#4226>
Link: <neomutt#4227>
Link: <neomutt#4236>
Link: <neomutt#4237>
Cc: Richard Russon <rich@flatcap.org>
Reviewed-by: наб <nabijaczleweli@nabijaczleweli.xyz>
Cc: Pietro Cerutti <gahr@gahr.ch>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
flatcap pushed a commit to alejandro-colomar/neomutt that referenced this issue May 8, 2024
Link: <neomutt#4236>
Link: <neomutt#4223>
Link: <neomutt#4226>
Reviewed-by: наб <nabijaczleweli@nabijaczleweli.xyz>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
flatcap pushed a commit that referenced this issue May 8, 2024
Link: <#4236>
Link: <#4223>
Link: <#4226>
Reviewed-by: наб <nabijaczleweli@nabijaczleweli.xyz>
Cc: Richard Russon <rich@flatcap.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
flatcap pushed a commit to alejandro-colomar/neomutt that referenced this issue May 8, 2024
Protected header fields are part of the crypto message, which means the
sender considers them part of the important data, and should not be
carelessly weeded.

If the user want to do it, allow them via this variable, but default to
not weeding them.

Link: <neomutt#4223>
Link: <neomutt#4226>
Link: <neomutt#4227>
Link: <neomutt#4236>
Link: <neomutt#4237>
Cc: Richard Russon <rich@flatcap.org>
Reviewed-by: наб <nabijaczleweli@nabijaczleweli.xyz>
Cc: Pietro Cerutti <gahr@gahr.ch>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
flatcap pushed a commit that referenced this issue May 8, 2024
Protected header fields are part of the crypto message, which means the
sender considers them part of the important data, and should not be
carelessly weeded.

If the user want to do it, allow them via this variable, but default to
not weeding them.

Link: <#4223>
Link: <#4226>
Link: <#4227>
Link: <#4236>
Link: <#4237>
Cc: Richard Russon <rich@flatcap.org>
Reviewed-by: наб <nabijaczleweli@nabijaczleweli.xyz>
Cc: Pietro Cerutti <gahr@gahr.ch>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug:upstream Also exists in upstream Mutt topic:security Security issue type:bug Bug
Projects
None yet
2 participants