TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Why you should not trust emails sent from Google

353 pointsby tomvangoethemover 11 years ago

14 comments

iamshsover 11 years ago
Now compare this with the attitude of their Security researcher, Tavis Ormandy, bashing Microsoft&#x27;s lackadaisical approach towards fixing bugs and has publicly published 0-days twice [1, 2, 3, 4]. Google only moved upon fear of public disclosure, and that too inspite of researcher being meticulous and patient.<p>Also, thank you Tom for your patience and being responsible. Also, I could not find your name in Hall of Fame list.<p>[1] - <a href="http://www.computerworld.com/s/article/9239477/Google_engineer_bashes_Microsoft_s_handling_of_security_researchers_discloses_Windows_zero_day" rel="nofollow">http:&#x2F;&#x2F;www.computerworld.com&#x2F;s&#x2F;article&#x2F;9239477&#x2F;Google_engine...</a><p>[2] - <a href="http://www.zdnet.com/google-researcher-publishes-windows-zero-day-exploit-7000016403/" rel="nofollow">http:&#x2F;&#x2F;www.zdnet.com&#x2F;google-researcher-publishes-windows-zer...</a><p>[3] - <a href="http://nakedsecurity.sophos.com/2010/06/15/tavis-ormandy-pleased-website-exploits-microsoft-zeroday/" rel="nofollow">http:&#x2F;&#x2F;nakedsecurity.sophos.com&#x2F;2010&#x2F;06&#x2F;15&#x2F;tavis-ormandy-ple...</a><p>[4] - <a href="http://www.computerworld.com/s/article/9177948/Google_researcher_gives_Microsoft_5_days_to_fix_XP_zero_day_bug" rel="nofollow">http:&#x2F;&#x2F;www.computerworld.com&#x2F;s&#x2F;article&#x2F;9177948&#x2F;Google_resear...</a>?
评论 #6365674 未加载
评论 #6368839 未加载
f-over 11 years ago
Hey folks,<p>I am one of the co-founders of the Vulnerability Reward Program at Google. It&#x27;s one of the longest-running and most generous programs of this kind: since 2010, we have paid out around $1M in rewards for more than 1,500 qualifying bug reports in web applications alone. We take great pride in keeping the process responsive, friendly, and hassle-free.<p>Of course, it takes just one bad experience to undo much of that. Tom&#x27;s report is a valid issue. The reward panel - of which I am a member - decided that it did not meet the bar for a financial reward. I stand by this decision, but I think we should have been more forthcoming, precise, and responsive when communicating that. In other words, I think we messed up.<p>PS. If you ever run into any problems of this type - or just want a friendly soul to chat - please do not hesitate to poke me at lcamtuf@google.com :-)
评论 #6365803 未加载
评论 #6365784 未加载
评论 #6365858 未加载
zmmmmmover 11 years ago
No matter what he tried to explain they just kept replying that he didn&#x27;t qualify for the reward. It sounds like they have become super defensive about acknowledging bugs because the reporter will immediately try to claim a reward. If so, it&#x27;s the exact opposite of the intent of the program.<p>I once reported Chrome because it crashed when I tried to load a 65536x65536 bitmap image. Since it was a crash I, of course, claimed it was a security issue, in the hope that was enough to get a reward. Of course, they didn&#x27;t accept that, but it does make me think the other side of this issue may be that Google is now receiving so many of these they are unable to properly evaluate them all and applying the &quot;HR&quot; solution (employ someone underqualified explicity to fob off as many people as possible so that only super-qualified candidates get through).
评论 #6365852 未加载
评论 #6366244 未加载
评论 #6366166 未加载
kevingaddover 11 years ago
Arbitrary content injection into signed emails from Google, and it&#x27;s not a security risk??? Incredibly poor response from them. Props to the author for being patient and trying multiple times to convince them to actually fix it.
评论 #6364973 未加载
roel_vover 11 years ago
Here&#x27;s an honest question: why do people still bother with the &#x27;responsible disclosure&#x27; nonsense? What&#x27;s in it for them? Days of work, weeks of waiting and frustration, for a &#x27;mention&#x27; in some imaginary &#x27;hall of fame&#x27;? $1mm over 1500 bugs, that&#x27;s $666 &#x2F; bug. That&#x27;s about a day worth of work if your rates are low and you are in a low CoL area, or half a day or less if you work for Google.<p>I take it that people who find these vulns do it for fun, even if it&#x27;s their job - if you don&#x27;t have a contract to start looking for issues, there is no reason to do so other than fun. So the only reason people bother with &#x27;responsible disclosure&#x27; is, as far as I can tell, because not doing so would damage their public persona. But it only got to that point because big vendors pushed the moral superiority of &#x27;responsible disclosure&#x27; on us over the last decade. Back in the 1990&#x27;s (when I was last sort of active in the scene), nobody would think of giving vendors weeks or months of time to fix their own damned bugs - if your PoC exploit worked at 3am (with real, working shell code, none of that &#x27;call ::MessageBox(NULL, &quot;U got 0wned&quot;) nonsense), you&#x27;d post it to bugtraq at 3:15 so that you could see the responses when you got out of bed in the morning.
评论 #6366032 未加载
评论 #6366137 未加载
评论 #6366054 未加载
jrochkind1over 11 years ago
Maybe they can justify thinking it wasn&#x27;t really a security vulnerability, or maybe they can say, hey, everyone makes mistakes, we didn&#x27;t realize it was a security vulnerability.<p>But what the heck is the justification for deciding it&#x27;s a security vulnerability that needs to be fixed only when the guy says he&#x27;s going to advertise it publicaly? What the hell is that?<p>If he had sold it privately, without telling Google, instead of letting them know he&#x27;d be advertising it publicly -- then it still wouldn&#x27;t be worth fixing?
评论 #6365399 未加载
kintamanimattover 11 years ago
I don&#x27;t understand this pervasive mentality among companies that run such a cash-for-bugs scheme. Isn&#x27;t the idea to encourage people to properly report bugs by rewarding them financially, thereby discouraging them from selling the details to the highest unrelated bidder?<p>All Google is doing is damaging its reputation.
turingover 11 years ago
I definitely commend the author for his work, but I think that there might have been a slight misunderstanding here. In his last email, the author talks about how public disclosure would &quot;force&quot; Google to fix the vulnerability. But I read Google&#x27;s response as simply saying that they did not think the bug qualified for the program, not that they didn&#x27;t intend to fix it. Then again, my reading is definitely influenced by my time at Google and how seriously my team took this sort of thing.
评论 #6365428 未加载
r0bbboover 11 years ago
I think I might be missing something - as a Google service user, I&#x27;d have to update my own name to be Mr Test&lt;!--BAD STUFF HERE in order to perform a phishing attack on myself?
评论 #6365202 未加载
评论 #6365210 未加载
评论 #6365211 未加载
cryptbeover 11 years ago
Wow. Give me a break, please. What the OP reported was a super minor issue, and he&#x27;s already got what he deserves.<p>His bug allowed him to inject links into verification emails sent by Google Scholar. He claimed that he could inject CSS links too, but that didn&#x27;t make this problem any worse. Why? Because it&#x27;s up to mail clients to load the linked CSS stylesheets or not. Gmail, for example, would never load those remote CSS files. If your webmail client does that, it&#x27;s time to switch to a better one.<p>So he could inject links, which is annoying, but still a very minor issue. It may make phishing a bit easier, but you know what phishing has always worked against average Joe if you try hard enough. That means that this problem doesn&#x27;t really give an attacker any advantages that he couldn&#x27;t do by himself.<p>Disclaimer: I&#x27;m a member of the team that handles VRP.
评论 #6365772 未加载
评论 #6366279 未加载
benatkinover 11 years ago
I don&#x27;t see the author&#x27;s name in the linked Honorable Mentions page. Did someone from Google pull it because they didn&#x27;t like this blog post? Searched for &quot;tom&quot;, &quot;Mathias&quot;, and &quot;vago&quot;. No recent results for any of these search terms.
评论 #6365196 未加载
molochover 11 years ago
You should not trust emails.
评论 #6365240 未加载
thrownaway2424over 11 years ago
It looks like your options for formatting the content are pretty limited and you can&#x27;t change the subject line nor the preamble about Google Scholar, so you wouldn&#x27;t be able to, say, masquerade as a password recovery email or anything like that. Still, I personally feel like any content injection should be treated seriously.
评论 #6365301 未加载
wahsdover 11 years ago
Re. current discussions of security and code review because of NSA and other government entities corrupting standards. If Google and Facebook cannot find such simple errors and then even balk at implementing a fix, which turns out to reveal an even larger flaw, what hope is there.