How a Google Headhunter's E-Mail Revealed Massive Misuse of DKIM 115
concealment writes with a tale of how an email sent to a mathematician led to him discovering that dozens of high profile companies were using easily crackable keys to authenticate mail sent from their domains. From the article: "The problem lay with the DKIM key (DomainKeys Identified Mail) Google used for its google.com e-mails. DKIM involves a cryptographic key that domains use to sign e-mail originating from them – or passing through them – to validate to a recipient that the header information on an e-mail is correct and that the correspondence indeed came from the stated domain. When e-mail arrives at its destination, the receiving server can look up the public key through the sender's DNS records and verify the validity of the signature. Harris wasn't interested in the job at Google, but he decided to crack the key and send an e-mail to Google founders Brin and Page, as each other, just to show them that he was onto their game."
Re: (Score:1)
Re: (Score:2)
Nope. This could be prosecuted under the Computer Fraud and Abuse Act.
"Knowingly accessing a protected computer with the intent to defraud and there by obtaining anything of value."
By suggesting that Google work with him in his email the impersonation could easily be construed as "intent to defraud" with a job offer being the "anything of value" obtained.
Re: (Score:1)
Re: (Score:2)
He was impersonating someone in order to obtain a job offer. (Or so the argument could be made.) That's defrauding.
Re: (Score:2)
Cracked encryption keys in order to send his message through a protected relay.
Re:C'mon.. (Score:5, Funny)
He is clearly lying or been living too much outside real world..
He's a professional mathematician. That's a given.
Re: (Score:2)
Wasn't there some guy who got arrested for exposing a companies security hole who was fighting extradition or something?
Re: (Score:2)
Youre mixing several cases I think. There have been cases where people have been sued for exposing holes, but I dont think those cases all turned out super well for the prosecution. Theres also the UK extradition case for the guy who hacked the pentagon.
Not aware of any extradition cases for someone exposing flaws.
Re: (Score:2)
My personal view is that neither should be illegal. However, imptersonating someone else for some kind of gain should be. I do not count a big grin as a gain in this context. You lawyer may disagre
Re: (Score:2)
The Pentagon computers in question, somewhat foolishly, allegedly used "password" as their password (or null).
That they had a password indicates that the machines were not for public use. If someone got in who was not authorized to do so, by whatever means, that is a problem.
Whether someone has boneheaded security-- for instance whether someone leaves their door unlocked-- has no bearing on your right to trespass.
Re: (Score:2)
I think in ANYONES rational estimation, leaving something at the default user and password can be considered the same as intending open access.
No, it cannot. Even if your MOTD banner says "welcome", that doesnt actually exonerate anyone who hacks in. Whether or not you are authorized to access a system has NOTHING to do with whether you can guess the password.
then complaining when somebody accessed the contents behind the lock.
So if I leave the door to my house unlocked, any old person is allowed to just enter? Because I think youll find that thats at the very least trespassing just about everywhere.
Re: (Score:2)
Seriously? Even if you aren't doing anything illegal, trying to dupe someone out of money..etc....?
Citations of law please?
Vote for me (Score:4, Funny)
This is Obama, please vote for me. This email is from me, you can verify it using DKIM public keys.
Regards
Romney
Re: (Score:1)
This is like taking a porcelain vase and a porcelain doll, smashing both on the floor, and then trying to argue which is more broken.
Re: (Score:2)
Re: (Score:3)
Re: (Score:1)
I think that would be a porcine doll.
Who are you calling a doll?
Strong DKIM keys and compatability issues (Score:1)
It's possible that some of the short DKIM keys were due to concerns over compatibility with other systems. When you have a large heterogeneous environment like email, you sometimes get caught catering to the lowest common denominator.
DKIM keys can exceed the TXT DNS record limit or the UDP byte limit. Some software may not handle joining split TXT DNS records. Others may handle DNS over UDP but not handle TCP for long records.
The Reality (Score:5, Insightful)
So the reality is that, on top of being useless as an anti-spam mechanism, it now turns out to be even worse, and in fact vulnerable to malicious attacks. In other words, it's useless and uselesser.
I was heavily involved in a lot of the discussions surrounding SPF, DKIM and related "solutions" back in the early 2000s, and about the most that we could say about these "solutions" was that you could add a positive number to the score of an email in a weighting system if things checked out, but other than that, there was little to recommend them.
Re: (Score:2)
Serious question - What does DKIM do that SPF doesn't?
Re: (Score:2)
DKIM has a key. Not that that makes it any more useful.
Re: (Score:3, Insightful)
DKIM is intended to allow mail sent through any server to be shown to be originally from a specific domain, thus preventing spoofing which is the basis of most spamming. SPF just allows server(s) to be identified as valid mailers for a domain, it doesn't work if you forward mail through other undesignated systems (which is still pretty significant, and covers most legitimate use cases).
If you're not checking SPFv1 on incoming mail, you're not a competen
Re: (Score:3)
Except SPF is broken by design and shouldn't be used nor its use encouraged, ever.
Re: (Score:2)
Care to explain why?
Re: (Score:2)
http://david.woodhou.se/why-not-spf.html [woodhou.se]
Re: (Score:2)
And that's why they created DMARC. DMARC allows you to specify exactly how mail servers should treat your SPF and DKIM policies. Additionally, you'll get reports from the providers processing it what the origin IPs claiming to deliver email from you are and whether or not they were allowed.
There's also one little note that the entire linked "why not spf" article is based on too...the DMARC reports also include whether or not the mail was forwarded so that mail servers know how to handle it.
The three techn
Re: (Score:3)
If you are doing mail forwarding or certain kinds of mailing list paradigms, you can have difficulties with SPF - you'll have to go straight to DKIM or change the way you use mail.
However, the absolute statement the prior poster made is the cry of a butthurt spammer - SPF keeps him from spoofing your address, so it's hurting his v14gr/-\ sales. Spammers hate SPF more than taxes... it's so trivially easy to implement that it's a real threat to their business model. DKIM's even worse for them, but it's also
Re: (Score:2)
Thats why I like SPF. If it doesnt fit your needs, dont use it. But for those of us who have SMB clients who mail from one mailserver and dont use forwarders, its wonderful-- the first time someone reports forged email from our addresses, I can take 5 mins and implement SPF, problem solved for folks with decent spamfiltering.
Re: (Score:2)
Oh, and also DKIM serves as a message checksum, so you can be reasonably sure an email wasn't tampered with after it left the sender.
Re: (Score:2)
Thanks for the explanation.
Re: (Score:3)
In a nutshell:
In DKIM
-Email provider sets up DNS records with a public DKIM key.
-Email provider's MTA signs valid outgoing email with the private key.
-Recipient MTAs can verify the signature of incoming mail from the email provider with the public key and use this when classifying the message.
-The MTA has to receive the message contents to verify the signature.
In SPF
-Email provider sets up DNS TXT records that specify which hosts are allowed to send mail for a domain.
-Email recipient verifies that the mail
Re: (Score:3)
I wonder how many convictions and court judgments relied solely on DKIM evidence that an email came from a defendant, all other evidence being circumstantial. I wonder what potential exist for such decisions to be overturned.
Re: (Score:2)
As for convictions, very few. Based first on my small amount of exposure to trial related forsensics, lawyers are nowhere near so familiar with technology that I am willing to believe that this type of technological point comes up that often.
Beyond that though, very few cases ever actually go to trial, mostly because the past few decades have seen the "justice" system ramp up its program of making sure that the list of charges that you are threatened with if you don't take a plea deal is so large, that even
Re: (Score:2)
As for convictions, very few. Based first on my small amount of exposure to trial related forsensics, lawyers are nowhere near so familiar with technology that I am willing to believe that this type of technological point comes up that often.
Plus of course the fact that DKIM usually identifies the domain, rather than the user, so it would generally only be evidence that the email came from a specific ISP (or company), rather than a specific person, which is much less useful.
Re: (Score:2)
was that you could add a positive number to the score of an email in a weighting system if things checked out
If things don't check out, I have spamassassin assign -4 (out of -5 to be spam). If things check out it gets +0.
Re: (Score:2)
Oh Christ! The last thing on Earth I would ever do is give a negative score to SpamAssassin's rating based on failed or missing SPF and DKIM records. Hell, even missing reverse records, which is popular with some anti-spam folks, lead to way too many false positives.
Re: (Score:1)
Hell, even missing reverse records, which is popular with some anti-spam folks, lead to way too many false positives.
There is a current email by radio system that is intended for use in catastrophic events as a way of communicating outside the disaster area for things like requests for aid and other important traffic. The radio to internet mail transport checks for MX records for every destination server, and silently throws the email away if there isn't one. The sender gets no notice of failure. The recipient doesn't get anything. Just no communications.
And none of the inbound email servers for the internet to radio si
Re: (Score:2)
I can understand using SPF and DKIM to that degree in specialized situations. But if you're running a general-use mail server, I think negative scoring based on faulty or missing SPF and DKIM records is asking for an unacceptable number of false positives. I know a lot of mail admins over the years have stood on principle over this sort of thing, and the ISP I was working for did for a while, but increased customer complaints finally lead us to the conclusion that the amount of spam SPF and DKIM scoring sto
Re: (Score:2)
So the reality is that, on top of being useless as an anti-spam mechanism, it now turns out to be even worse, and in fact vulnerable to malicious attacks. In other words, it's useless and uselesser.
So if the reality is that it was already useless as an anti-spam mechanism, who cares if it is made "uselesser" as an anti-spam mechanism? Less that zero is still less than zero. If you already can't trust it to mean what it says, why is there such a tizzy that you still can't trust it to mean what it says?
Re: (Score:2)
The problem is that inexperienced mail admins seem to have a considerable amount of faith in SPF and DKIM, and a good decade or so has passed since these methods were first developed, so the debate around why they are fundamentally flawed is in the past.
The only reason I even have SPF and DKIM records on our mail servers is because some dumb-asses out there do negative weight based on an absence of those records.
Re: (Score:2)
How exactly do you spoof SPF without having the ability to redirect mail flow (ie, control over DNS records)?
Re: (Score:2)
Who said anything about spoofing SPF? It's near worthless without spoofing.
There was no misuse (Score:5, Insightful)
This was not a misuse of DKIM, or perhaps it was his own misuse in that he thinks DKIM validates the sender of an email. All it does is validate that the email originated from Google's mail servers, but it doesn't neccessarily mean that the address in the From: header wasn't spoofed before it was signed.
In any case, he found that Google (and others) are using an easily cracked 512 bit key, which they silently fixed with a 1024 bit key after he reported it to them by spoofing an email to appear as though it originated at Google.
There was no misuse, 512 bit keys are allowable under the DKIM spec, though they aren't recommended for long-lived keys.
Re: (Score:1)
Yeah, one guy cracks a key and sends two emails with it. Where is the "massive misuse"?
Re: (Score:2)
It was bad phrasing. Google didn't misuse DKIM as much as it negligently implemented DKIM. The big news was that HSBC and other high-security websites were using weak implementations of DKIM. The problem is that people may rely on DKIM authentication as a sign that it's not phishing. ("Hey, this email from HSBC was signed by DKIM so it's not fake. I guess I'll send a $10,000 check to these guys.")
I am also curious how many keys is used in the Google Apps Premier DKIM. I have a domain with Google Apps, and i
Re: (Score:3)
It's more than "aren't recommended".
RFC6376: "Signers MUST use RSA keys of at least 1024 bits for long-lived keys."
Given Google were using a long-lived key, they were violating a MUST provision in the DKIM spec. (Pedantically, that means they weren't sending DKIM compliant mail at all).
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Slight Correction (Score:2)
which they silently fixed with a 1024 bit key after he reported it to them...
From TFA:
Harris made sure the return path for the e-mails went to his own e-mail account, so that Brin and Page could ask him how heâ(TM)d cracked their puzzle. But Harris never got a response from the Google founders. Instead, two days later, he noticed that Googleâ(TM)s cryptographic key had suddenly changed to 2,048 bits. And he got a lot of sudden hits to his web site from Google IP addresses.(emphasis mine)
Re: (Score:2)
DKIM my not validate the sender, but it is supposed to validate the mail server as you say. If you break a DKIM key you can send a mail from anywhere making it appear to be legitimately from a particular mail server even though it wasn't. If your mail servers allow unauthenticated email to be sent from them that is another problem that ought to be fixed. If you allow people to pretend to send email from your server than you are aiding spammers and spear fishers quite a bit.
But it's a misuse of DKIM to assume that a DKIM signed message validates the sender since it does no such thing. It makes it more likely that the sender is who he said it is since it validates the sending server, but it really does no validation of the sender himself. It's possible, even likely, that the mail server validated the sender, but that's outside of the scope of DKIM. Even the DKIM signature includes the entire message envelope, there's no guarantee that the message content wasn't altered.
DKIM is
Ain't this a classic ?? (Score:2)
It seems from the photo (Score:2)
that Swordfish was a premonition — Hugh Jackman really does crack encryption...
Re: (Score:2)
that Swordfish was a premonition - Hugh Jackman really does crack encryption...
He also apparently likes to channel DaVinci and write backwards from his POV
Sigh (Score:5, Insightful)
If you, you know, actually read the standard, or even the Wikipedia page, you'll see that DKIM is not intended to be used as a signature mechanism in the same way as S/MIME or PGP. Rather, it's a means to assert responsibility for sending the message, it's done at the domain rather than user level, and verification results are intended to be used for message filtering, not for asserting that so-and-so actually signed the message.
Sure, the underlying technology is based on hashes, signatures, signature verification, and so on but that's because there's no other way to do it. The fact that DKIM allows for the application of relaxed interpretation of both message header and body data kinda tells you it's not intended to be used to provide an absolute assurance that what you got is authentic in every way.
DKIM is also not intended to be the ultimate source of information for filtering. Rather, DKIM results are supposed to be combined with other metrics to form an overall assessment of message validity. And that's a very good thing, since I get all sorts of spammy stuff that makes it through Google, including getting a legitimate DKIN signature attached. Other filtering mechanisms are needed to block such crap.
All that said, it's very disappointing to see yet another case where Google has seen fit to play fast and loose with standards. This is happening much too often.
Re: (Score:1)
The problem is that signing implies a level of trust that spam filters at Google take into account. So, unless you are a spammer, it is indeed a giant problem to have weak keys.
Re: (Score:2)
Rather, DKIM results are supposed to be combined with other metrics to form an overall assessment of message validity.
Which is exactly how my Tuffmail account is configured to use it. Unfortunately, there are many borderline cases where using DKIM is just enough to make my filters decide to forward it. I'm seeing the protocol as pretty useless.
Re: (Score:2)
All that said, it's very disappointing to see yet another case where Microsoft has seen fit to play fast and loose with standards. This is happening much too often.
Fixed that for you. Well, at least it's true in general if maybe not so much in this specific case.
Re: (Score:2)
But this doesn't mean Google doesn't also have a lot to answer for. Gmail IMAP compliance in particular is pretty bad, and SMTP handling of error conditions pushes things ri
"onto their game"? (Score:2)
Is it this guy's supposition that Brin and Page were using weak, crackable keys deliberately?
Re: (Score:3)
It's a horrible article. It's really trying to make out like it was some cloak and dagger, crypto-cracking fu used by this 'mathmatician' against the founders of Google. He mentions ( many times, like The Lady Doth Protest Too Much, methinks... ) that he thought it was an elaborate test. I read his take on this to be a defensive argument, in case they choose to go after him for spoofing e-mails. Which is what he did.
Re: (Score:3)
Backscatter (Score:1)
I had until more recently been getting a bunch of "backscatter" hits to my gmail hosted account.
While the return message seemed legit, the email that supposedly went out from (an nonexistent account) at my domain was not.
I wonder if the spammers were already taking advantage of this vulnerability. I do notice that more recently I haven't got any of these.
Not Seeing Any Use For DKIM (Score:2)
Half the spam that makes it through my filters is DKIM-signed. Spammers use it to make the email look less bogus. Of course, that means that they have to use a real domain and hosting provider that they eventually lose — but domains are cheap, and changing hosts is no big deal.
Re: (Score:2)
> Half the spam that makes it through my filters is
> DKIM-signed.
Same here, and half of that is signed by Yahoo. I'm seriously considering telling Spamassassin to increase the spam score of DKIM-signed messages, not decrease it.
Re: (Score:2)
I've configured Sieve to bounce all mail from Yahoo, except for a few relatives who use it.
Google Apps DKIM (Score:1)
I'd better take a closer look at the automatically generated DKIM keys for the several Google Apps domains I oversee....
Vulnerability Note VU#268267 (Score:5, Informative)
This problem has been reported by the US-CERT (part of the US Department of Homeland Security [Insecurity?]) at http://www.kb.cert.org/vuls/id/268267 [cert.org]. See that link for an authoritative report on the meaning of this problem and how to avoid it.
That's what I would think as well! (Score:3)
From the article, the line:
Harris thought there was no way Google would be so careless, so he concluded it must be a sly recruiting test to see if job applicants would spot the vulnerability.
That's exactly how I would think.
Guys longer keys would run afoul with DoD (Score:2)
Was it a centithread on misc? (Score:2)
So, googlers: How'd misc react to this? I can see all sorts of spoofing fun going on...
-B
Test argument purely for defense. (Score:2)
There's no way he seriously believed this was a sly test the recruiters were sending out to weed applicants. He's just saying that to cover his ass if Google actually peruses him legally for what he did.
But really though, all this system is for is for certifying that mail actually did come from a specific domain, not a specific sender. I'm not seeing the huge misuse here.
Re: (Score:3)
Email wasn't broken. DKIM was. Or rather DKIM wasn't really broken, just being misused by Google.
Re:This just in... (Score:4, Insightful)
If it's easy to misuse, doesn't that make it broken?
Re: (Score:3)
Re:This just in... (Score:5, Insightful)
Re: (Score:2)
So if the pilots all die for whatever reason while flying the plane, then it will crash as designed? Because regular passengers can try to fly it?
Re: (Score:1)
And how does an airplane distinguish between pilots and "regular passengers" so that only the former can fly them?
Re: (Score:3)
And how does an airplane distinguish between pilots and "regular passengers" so that only the former can fly them?
The pilots are up front, and the regular passengers sit behind. There's a wall between the two sets of people.
Re: (Score:3)
And how does an airplane distinguish between pilots and "regular passengers" so that only the former can fly them?
The pilots are up front, and the regular passengers sit behind. There's a wall between the two sets of people.
OMFG!!!1! HUNDREDS of Pilots!? Only TWO passengers?! What the --Oh, never mind, "behind" is that way... For a second there I had an signed integer overflow in the velocity vector and thought we were just flying backwards, which means that behind and forwa-- Oh, never mind. Sorry about that, I'll try to be a good auto-pilot from here on out.
Boy, the sky sure is blue today... And shiny. I think I can see my reflectioOOOOOOO!!!!!
Re: (Score:2)
No it means the building was built in the wrong place.
Re:This just in... (Score:5, Informative)
If it's easy to misuse, doesn't that make it broken?
No.
If I convince ignorant people that PGP signatures prove that they've actually won $47,325,443 in the Nigerian lottery, and all they need to do is send their account details so I can deposit their winnings, is PGP broken?
This wasn't even a true misuse of DKIM. It was use of a 512 bit key.
Something that many people seem to forget is that the strength of the security should be matched against the risk and costs of being broken. If I'm sending you a message that says "meet me at the corner of 5th and Smith St in five minutes", and it takes someone who intercepts the message an hour to break it, then the encryption has done its job just fine. By the time they break it, we will no longer be at 5h and Smith St, and they will have had no time to set up surveillance.
Given the intended use of DKIM, 512 bits is plenty.
Re: (Score:1)
The DKIM key isn't changing. Once you have broken the DKIM key you can spoof as many emails from that source as you want until they change their key. This is not like SSL. It doesn't encrypt the message in any way, it is a way to verify the source of the message.
Re:This just in... (Score:5, Informative)
The DKIM spec itself (RFC6376) says: "Signers MUST use RSA keys of at least 1024 bits for long-lived keys."
It's pretty unequivocal. Google just misconfigured their mailserver.
Re:This just in... (Score:5, Insightful)
The DKIM spec itself (RFC6376) says: "Signers MUST use RSA keys of at least 1024 bits for long-lived keys."
Keep in mind that RFC 6376 was issued in September of 2011. Prior versions did allow 512-bit keys, though they cautioned against them.
It's pretty unequivocal. Google just misconfigured their mailserver.
More likely, I think, is that Google failed to reconfigure their server. When Google started using DKIM, cracking 512-bit keys was significantly harder than it is now. The change is less due to increases in computing power (though that has helped) than it is to the availability of cloud-based compute clusters. Granted that it was always a little risky to use such small keys, it was much more reasonable than it is today.
So my guess is that it went down like this: A few years ago when Google implemented DKIM someone looked at RFC 4871's discussion of key sizes, which says:
... and thought "yeah, we can use 512-bit keys and change them occasionally, that will provide higher performance for less CPU load, and as the RFC says the security goals here really aren't that high". I imagine that the decision to implement DKIM at all may have been a tad controversial given the additional load it was going to place on the servers, so that 512-bit key usage may even have been an important design point. Then the "change them occasionally" bit got dropped on the floor.
Fast-forward a few years, the problem is discovered and fixed -- but this time the engineers decided to make sure it doesn't happen again and jumped to 2048-bit keys even if it required provisioning more capacity.
(Disclaimer: I work for Google, and do cryptographic security stuff for Google, but I don't have any more information than the rest of you about how all of this happened. The above is pure speculation based on my 15 years as a security consultant before joining Google. I saw lots of stuff just like it from the few companies I worked with who were actually quite good about security. And even more insanely stupid stuff from all the rest.)
Re:This just in... (Score:4, Insightful)
Yup, all of that is likely what happened.
A critical part of DKIM is selector-based key rotation (as even the 2048 bit key won't help you at all when an ex-employee or a contractor walks off with the private key, while key rotation will reduce the window of exposure from that sort of event). Google aren't the only ones to have missed that.
(Many of the original - and current - examples of how to set up DKIM suggest using a date as part of the selector, so as to make it clear that the key was supposed to be fairly transient. That leads to the lovely situation that you can look at a lot of peoples DKIM setups and see that they created their key pair once, several years ago, using the current date and haven't changed it since - their failure to rotate keys is self-documenting.)
There are many reasons why DKIM doesn't need to be "really strong crypto" - it's intended just for someone to assert that they're responsible for an email message, that they're prepared to accept complaints about the mail they send, and that you should pay attention to their previous behaviour when deciding whether or not to deliver a message. Stealing someones DKIM private key lets you piggy back on their good reputation to get spam or phishing emails into an inbox rather than a spam folder for a short time period, and that's about it. It's nowhere near as high value a target as anything like TLS certificates.
Googles reputation is certainly worth more than the estimated $75 it would cost to crack their short key, so it's good they've fixed that. And even though much of the media coverage of this has been tech-tabloid drivel it's a good thing if it gets other companies to look at key length and rotation frequency.
(Disclaimer: I've been working with the DKIM spec since the early days of DomainKeys. http://dkimcore.org/ [dkimcore.org] is me.)
Re: (Score:2)
This is public key cryptography we're talking about. 512 bit is not plenty, because it allows you to break the key and then pose as the legitimate private key owner.
It would only be OK if this was a one-time key, and that's not the case.
Re: (Score:2)
I dont understand. Obviously there are different crypto algos out there... but why is a 512-bit DKIM key insecure, when AES-192 is considered very secure (actually more secure than 256 due to some flaws AFAIK) with a 192 bit key?
I mean, AES is like a decade old. DKIM is AFAIK much more recent than that. Why do they need larger keys for the same security?
Re: (Score:2, Interesting)
AES is synchrounous, same (secret) key used for encrypting and decrypting. Those are generally much harder to break than public key cryptos (with the same key-size), but also not usable for the same things.
Re: (Score:3)
AES is synchrounous
I think you meant "symmetric" :-)
Re:This just in... (Score:4, Informative)
To add more detail to the AC's response.
AES is based on a subsitution-permutation network.
DKIM is based on the RSA signature algorithm which relies on the difficulty of factoring large integers.
Elliptic curve public key cryptography is based on the difficulty of solving a discrete logarithm problem.
The difference in the size of keys between one type of algorithm or another is an expression of the difficulty in solving the underlying problem. Factoring a large integer of X bits (RSA) is relatively easy compared to working through the substitutions and permuations of X bits of AES.
The link below provides a guideline for comparing the key sizes of AES, EC, RSA/DH.
http://www.nsa.gov/business/programs/elliptic_curve.shtml [nsa.gov]
Re: (Score:3)
Others gave good answers, but I'd just take it a step further - you can't really directly compare key lengths for different algorithms.
How long does it take you to solve 100 math problems by hand? Well, when I was in elementary school I was expected to do it in 5 minutes, but those were single-digit add/subtract/multiple/divide problems.
If I asked you to calculate the log of 10 10-digit numbers by hand it would take you a LOT longer than 5 minutes, though a computer could do this quickly.
If I asked you to
Re: (Score:2)
Email wasn't broken. DKIM was. Or rather DKIM wasn't really broken, just being misused by Google.
Misused implies some sort of dishonest intent, whereas they were actually just negligent in using a really weak key that the researcher could break on his laptop.
Not only Google but a bunch of other important web sites as well, such as Yahoo, eBay, major banks etc.
Re: (Score:3)
The core E-mail protocol itself is supposed to be a brain-dead simple protocol that almost any machine can understand, thus the "S" in SMTP.
It is the additions which are used by the MTAs to allow who can and cannot connect and relay, as well as MUAs to figure out what to do with incoming messages.
Realistically, the ideal for verifying authentication would be an OpenPGP plugin and a far-reaching WoT that each user maintains. However, because certs and having domains sign outgoing mail is "good enough", that