ISPs caught stripping STARTTLS from email

by
in security on (#2V0A)
Those evil ISPs are at it again:
Recently, Verizon was caught tampering with its customer's web requests to inject a tracking super-cookie. Another network-tampering threat to user safety has come to light from other providers: email encryption downgrade attacks. In recent months, researchers have reported ISPs in the US and Thailand intercepting their customers' data to strip a security flag-called STARTTLS-from email traffic. The STARTTLS flag is an essential security and privacy protection used by an email server to request encryption when talking to another server or client.1

By stripping out this flag, these ISPs prevent the email servers from successfully encrypting their conversation, and by default the servers will proceed to send email unencrypted. Some firewalls, including Cisco's PIX/ASA firewall do this in order to monitor for spam originating from within their network and prevent it from being sent. Unfortunately, this causes collateral damage: the sending server will proceed to transmit plaintext email over the public Internet, where it is subject to eavesdropping and interception.
Although I wouldn't trust the content of your non-PGP email to ever be secure, this could potentially lead to your email account password being transmitted in-the-clear, depending on how your email client and server are configured.

Re: Yes but... (Score: 2, Interesting)

by tanuki64@pipedot.org on 2014-11-12 14:59 (#2V0G)

And even if there is... is it valid? I don't know much about US laws, but e.g. in Germany there is a high probability that such an unexpected condition would be invalid. High probability =In court and on the high seas, a man's fate lies in god's hands.
Post Comment
Subject
Comment
Captcha
What is eighty seven thousand four hundred and forty three as digits?