TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Why Clinton’s Private Email Server Was Such a Security Fail

91 pointsby altern8over 10 years ago

12 comments

groovylickover 10 years ago
The reporting on this story has been pretty terrible. Wired just running with the AP story without spending the couple of minutes it takes to verify the details is shameful.<p>The clintonemail.com domain was registered by Justin Cooper [1] and the MX records point to mail servers run by mxlogics.net, now owned by McAfee, not some solo server in Clinton&#x27;s home. The sole evidence from the AP report is:<p>&gt; It was not immediately clear exactly where Clinton&#x27;s computer server was run, a business record for the Internet connection it used was registered under the home address for her residence as early as August 2010. The customer was listed as Eric Hoteham.<p>A business record for an Internet connection doesn&#x27;t prove anything, let alone the location of an email server. A history of the MX records [2] is evidence of the location and management of the email server, which has always been set to a mxlogics domain. That it took me only 5 minutes to gather his information but unsourced reporting is being parroted is poor journalism.<p>[1] <a href="http://who.is/dns/clintonemail.com" rel="nofollow">http:&#x2F;&#x2F;who.is&#x2F;dns&#x2F;clintonemail.com</a> [History &amp; DNS Tabs] [2] <a href="https://dnshistory.org/dns-records/clintonemail.com" rel="nofollow">https:&#x2F;&#x2F;dnshistory.org&#x2F;dns-records&#x2F;clintonemail.com</a>
评论 #9149204 未加载
评论 #9149066 未加载
评论 #9149538 未加载
评论 #9150144 未加载
评论 #9149164 未加载
评论 #9149455 未加载
评论 #9149198 未加载
lmg643over 10 years ago
I&#x27;m still waiting for the explanation of why this was OK. &quot;Every secretary of state has done this.&quot; or, &quot;appropriate and very common among high elected officials.&quot;<p>When i think about the email requirements of any corporation, every real job I&#x27;ve had, the use of personal email for company business is against policy and would be a fireable offense.<p>Also interesting to consider the FOIA is more fearful to a politician, than having this private email service hacked by a foreign intelligence service. state department is essentially an adjunct to the CIA at the highest levels, so this is a real risk.
评论 #9149289 未加载
评论 #9149032 未加载
评论 #9149088 未加载
评论 #9149510 未加载
评论 #9149064 未加载
评论 #9149357 未加载
agwaover 10 years ago
&gt; Clintonemail.com currently uses an invalid TLS certificate, another method that a man-in-the-middle might use to intercept or spoof emails from the server; but Stanford researcher Jonathan Mayer points out to WIRED that the State Department’s own TLS certificate is currently invalid, too.<p>The invalid certificates are a red herring. These are certificates used by SMTP servers[1], and since SMTP encryption is currently opportunistic (i.e. completely optional and trivially defeated by an active attacker), it <i>does not matter</i> whether the certificate is valid or not. Virtually no SMTP client validates the certificate presented by an SMTP server on port 25, let alone care if encryption is used. The only reason why SMTP servers present certificates at all, as opposed to using an anonymous TLS ciphersuite, is because some SMTP clients choke on anonymous ciphersuites.<p>[1] <a href="https://twitter.com/jonathanmayer/status/572779239281332224" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;jonathanmayer&#x2F;status&#x2F;572779239281332224</a>
rebootthesystemover 10 years ago
This mess is an example of a much larger problem: We are being governed by a bunch of attorneys who do not hesitate to lie, cheat and steal and play all of us for the fools that we are. Recent examples include a President telling lies (keep your insurance and doctor, save $2,500 a year, etc.) without consequences. This is not limited to a single party. It travels equally well on both rails and spans from mayors and governors to senators and, yes, Presidents.<p>Not sure what the solution to this might be. This is the stuff of so-called third world countries. I have long held that we are not far from &quot;them&quot;, we just do it differently and don&#x27;t take to the streets en-masse when we are lied to and royally screwed.<p>Maybe one day we will and things will start to change. A lot of these people belong to jail for what they&#x27;ve done to this country. My guess is that if you are under, say, 30, you are going to have to suffer the consequences of what these people have been doing to the country for, say, 50 years. And your children. Well, there&#x27;s a school of thought that is of the opinion that your children migt just get to experiencethe US as a near third world country in about 50 years.<p>Our politicians must be accountable for their actions and must have consequences for misleading and manipulating the people. Not sure how that happens. Not sure what laws would deal with this. If there aren&#x27;t any, there ought to be.
rrggrrover 10 years ago
I seem to recall CIA director Deutch keeping highly classified information on his home computer. CIA Director Patraeus giving classified info to his mistress. National Security Director Berger taking national archive info? Snowden. Its alleged Leon Panetta revealed classified info in his biography. Its almost as if some of the intelligence community leadership could, possibly, lack humility and believe they are infallible. There have been one or two cases in history where a lot of power combined with secrecy has led to bad decision-making. Perhaps this is another example.
评论 #9149899 未加载
zarothover 10 years ago
Also, the bit about self-signed certificates being insecure? Arguably they are the <i>most</i> secure if you pin to them since you are trusting no third parties. Obviously if you keep them untrusted and ignore the validation error every time it&#x27;s a different story.
评论 #9149211 未加载
chrissnellover 10 years ago
Remember this: if you are a run-of-the-mill State Department staffer or a military servicemember and you put classified material on a non-classified network, you might go to prison. Even high-ranking government officials have gotten in serious crap over classified material mismanagement--GEN Petraeus did this and lost his job as a result.
评论 #9149651 未加载
评论 #9150318 未加载
drawkboxover 10 years ago
I am surprised this is such a big issue considering something very similar happened while Bush was in the White House with outside email under gwb43.com and georgewbush.com and Bush didn&#x27;t really use email: <a href="http://en.wikipedia.org/wiki/Bush_White_House_email_controversy" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Bush_White_House_email_controve...</a>
评论 #9149760 未加载
评论 #9149905 未加载
tedunangstover 10 years ago
I like that Wired takes the AP claim that the server was literally in her home (in a closet? the attic?) at face value.
评论 #9149229 未加载
jedbrownover 10 years ago
Interestingly, neither state.gov or clintonemail.com sets SPF records. (Nor does nsa.gov, army.mil, or af.mil, though cia.gov, navy.mil, and whitehouse.gov do.) From personal experience as of a few months ago, state.gov did not use DKIM for outgoing mail.
dschiptsovover 10 years ago
Because it was Windows?)
gcb0over 10 years ago
heh. they are probably safe. or should i recall the kind of people the gov gives out money for it security?