Readit News logoReadit News
monospacegames commented on Upgrading from Dovecot 2.3 to 2.4 – side by side examples   monospace.games/posts/202... · Posted by u/monospacegames
monospacegames · 14 days ago
Recently went through this process and thought my experience might save others from some headache.
monospacegames commented on Lisp project of the day   40ants.com/lisp-project-o... · Posted by u/perihelions
lispitillo · a month ago
Perhaps instead of coding many small one day projects one could program one day projects that compose with each other. For example, I was thinking about developing a library that implements a version of J in Common Lisp (but I think fuel is lacking) so that, for example, the one day project named random-sample could be just:

  randomSample =: 4 :'(x ? #y){y' NB. can't repeat.

  randomSample =: 4 :'(? x # #y){y' can repeat.

 So that, in many cases,  one day projects could be reduced to one or two lines definitions (for those that know J that is the caveat).

monospacegames · a month ago
I think they're showcasing existing projects instead of making a new one each day.
monospacegames commented on Google spoofed via DKIM replay attack: A technical breakdown   easydmarc.com/blog/google... · Posted by u/frasermarlow
atoav · a month ago
> some text that would raise suspicion in any person

As someone who worked in IT-support I have to say this sentence is doing a lot of heavy lifting. I have seen people click on shadier things that looked much less credible. In fact I have seen the same people do it multiple times, even after it has been explained to them, multiple times and they have experienced consequences in the form of locked accounrs and the likes.

Real world users can be magnitudes dumber than you think they would be, even if they otherwise simulate the appearance of functional adults.

I have seen people who have a problem click away error dialogues with the explaination of the problem without reading the text. When asking what they clicked and why, they couldn't tell you if their life depended on it.

monospacegames · a month ago
Yes, but my point is that the article is constructed in a way that deliberately obfuscates that there is unrelated text following the phishing message (quoting my initial comment: The full email is definitely in the format "scary text here" "actual google message", so something like "Give us all your money or die has been created as a google app")

This led to the initial response here being quite frantic (some people even claiming that DKIM is now pointless) because presumably not everyone read the article to its very end where the actual explanation is, and then went back to the first image to realize that the author has been intentionally misleading to sell their cybersecurity services.

monospacegames commented on Google spoofed via DKIM replay attack: A technical breakdown   easydmarc.com/blog/google... · Posted by u/frasermarlow
rkerno · a month ago
This to me just appears to demonstrate what a house of cards email security really is....surely with the collective brains on this forum we can come up with an alternative that solves all of this. And surely Google needs to serve these sites under a different domain name....why aren't these sites published under something like 'hostedbygoogle.com'?
monospacegames · a month ago
Announcing new Thiel-backed startup: Shadowfax

Our secure, centralized and proprietary offering with native AI and blockchain layers will replace the obsolete cruft that is email. Already secured several DoD contracts and expect to fully replace email for all internal and external communications of the federal government by 2027.

monospacegames commented on Google spoofed via DKIM replay attack: A technical breakdown   easydmarc.com/blog/google... · Posted by u/frasermarlow
oefrha · a month ago
This is a very confusing read. It gives the impression that the attacker managed to manipulate the email body to insert their phishing link, by talking at length about how the sites.google.com link is suspicious (of course it is, no doubt about that). But at the same time, they don’t say or show evidence that the body was manipulated; in fact quite the opposite.

My understanding is that the DKIM signature contains a bh= field with a hash of the email body. While you can technically also include an optional I= field to limit the body length for hashing, so that an attacker can append to the body, which is a pretty big security hole, it’s probably never used by Google for such short emails (I checked some of my own emails from no-reply@accounts.google.com and they certainly don’t have I=). Therefore to pass DKIM and DMARC the body had to be intact, so the “phishing link” was actually from Google, just intended for a different recipient.

If my analysis is correct then TFA really is a lot of words to say a scary email was forwarded to wrong people to scare them. Scary of course, but much less scary than the “DKIM replay attack” title implies to technical people who are not deep into this subject.

Edit: Oh, I thought “The Takeaway?” was the end of TFA since it had CTA for their product. Apparently there’s an update below explaining the link was actually part of a Google OAuth app name which was then inserted into Google’s email template. Terrible writing and structuring of the article, burying arguably the most important part of the attack that made it somewhat convincing, and misleading readers to believe the attack can be used to send arbitrary content.

Edit 2: Other commenters pointed out that the screenshot of the email is conveniently cut off so the fixed part of the Google email template isn't shown. The attack is probably even more clumsy then it seems from the quite deceptive crop.

monospacegames · a month ago
I agree, the article is intentionally deceptive. It's written to make people think the part of the mail shown in the image is the whole email when in reality it's definitely followed by some text that would raise suspicion in any person.
monospacegames commented on Google spoofed via DKIM replay attack: A technical breakdown   easydmarc.com/blog/google... · Posted by u/frasermarlow
judge123 · a month ago
Okay, the technical breakdown is wild. But my first thought was: how on earth do I explain this risk to my non-technical boss or clients? If I say 'they can bypass DKIM with a replay attack,' their eyes will just glaze over. We need a simple, powerful way to communicate this stuff. Anyone have a good one-liner for this?
monospacegames · a month ago
"Read the full email before freaking out" would probably be appropriate. This article is deceptive because it does not show the full email and only shows the phishing part. The full email is definitely in the format "scary text here" "actual google message", so something like "Give us all your money or die has been created as a google app", which would raise an eyebrow even in the most non-technical person.

u/monospacegames

KarmaCake day27April 27, 2025
About
Developer of Monospace Engine

Website: monospace.games

Email: monodev@monospace.games

View Original