How I "hacked" Dustin Curtis's Posterous.
298 points| robinduckett | 16 years ago | reply
Dustin mentioned in his article that he didn't require a password, and I wanted to see if he had used the confirmation skip.
Just wanted to apologise to Dustin about any inconvenience, but I do hope I opened his eyes to security a little!
EDIT: A little bit of backstory.
Dustin seems to think, that I did this because of a comment he made, on how the headers could be forged. I had not read this comment. Infact, I read his article, and using the knowledge that I picked up years ago, that you could change the outgoing email address in Outlook (Although, it was Outlook Express in them days) I changed my email to his email.
I saw his email on his website ([email protected]) and thought, "No, he wouldn't be sending his personal emails from that address, that's silly."
I checked the WHOIS on his domain, and saw another email address there. I changed my email, sent a quick "Apparently..." message, and then changed it back to my original email address. I checked his blog, and it didn't seem to work.
I then went to sign up for my own posterous, to play a bit more, and I saw that you had to authorise your posts. Then I saw how this could be disabled for convenience. A few minutes later and the post showed up.
I am a Web Developer, I have experience with bash scripting, curl, sendmail and everything else you would need to fake headers.
I did not fake headers, I changed one field in Outlook. I didn't do this maliciously, and I just did it to prove a point.
Posterous should not be using email alone to authorise posts, and they should not let you disable submission checking.
[+] [-] a4agarwal|16 years ago|reply
Yes, someone did figure out how to post to Dustin's site today. This security hole is now fixed.
We had a specific problem with the way we dealt with SPF records. Dustin didn't set any up, and there was a specific way that Robin Duckett's email server responded that caused us to flag it as a false negative for spoofing.
For the vast majority of users who use gmail, hotmail or other services, this was never an issue.
Since our launch on day one, we have taken email spoof detection very seriously. It's one of our core differentiators: to be able to securely post to your blog by emailing a single, easy to remember address. We don't want to do secret addresses or secret words.
Over the past 2 years, we've developed robust spoof detection ip and spend a ton of time trying to stay a step ahead of hackers. Fortunately, we've only had a few very specific, isolated cases where one of our sites was spoofed and each time we have improved our system.
Thanks for bringing this to our attention. We always need to be one step ahead of the hackers/spoofers, and we thank the Hacker News community for keeping us on our toes!
[+] [-] robinduckett|16 years ago|reply
[+] [-] sh1mmer|16 years ago|reply
That would probably improve your security too.
[+] [-] jseeba|16 years ago|reply
Posterous:email spoof detection PayPal:credit card fraud detection
See the section in Founders at Work on the value that better fraud detection created for PayPal.
[+] [-] DanielRibeiro|16 years ago|reply
[+] [-] coderdude|16 years ago|reply
The only other person so far to comment under the co-founder on this thread (at time of writing) is jseeba, who has had very little activity and one of the few comments he's ever made was in a thread called "Ask YC: Your favorite startups" where he said "Posterous. It just works." So jseeba doesn't do much around here in the 2 or so years he's been a member but made time to chime in for Posterous again.
[+] [-] jgrahamc|16 years ago|reply
[+] [-] there|16 years ago|reply
[+] [-] lhorie|16 years ago|reply
This way, grandpa talking about his dog doesn't need to bother learning about security he doesn't really care about and the power user can post securely if it so happens that someone decides to spam his blog
[+] [-] jey|16 years ago|reply
[+] [-] unknown|16 years ago|reply
[deleted]
[+] [-] d0nk|16 years ago|reply
[+] [-] webwright|16 years ago|reply
Certainly not ideal. Typos would confuse matters and the idea of secret word authentication is not exactly common/obvious for the masses.
[+] [-] jcromartie|16 years ago|reply
Nice hack, BTW.
[+] [-] robinduckett|16 years ago|reply
[+] [-] sahaj|16 years ago|reply
[+] [-] ErrantX|16 years ago|reply
Fraud, maybe, but only at a long stretch.
It certainly would never reach prosecution.
[+] [-] aquateen|16 years ago|reply
[+] [-] notaddicted|16 years ago|reply
EDIT: Although it is fun to think of solutions ... Posterous could mail you back a link; when you hit the link the post goes live. Then you would clearly need control of the sending address to post. And the link could just go to the new article, which you'll likely want to look at anyway.
[+] [-] olalonde|16 years ago|reply
[+] [-] extension|16 years ago|reply
This is going to be a serious issue for Posterous if they ever go mainstream. Opt-in authentication schemes won't be enough to prevent scores of naive people from being humiliated the first time, particularly teenagers.
[+] [-] city41|16 years ago|reply
I realize the security implications of all of the latest Posterous musings. But the fact is if Posterous didn't allow you to disable this I'd stop using their service. Posterous knows this.
My use case for Posterous is my phone. It has a nice 8 megapixel camera, and with literally two clicks I can have a picture sent to my Posterous blog. Is it secure? Not at all. Is it extremely convenient and productive? Absolutely.
[+] [-] WiseWeasel|16 years ago|reply
[+] [-] obvioustroll|16 years ago|reply
This worked very well the day I played a prank on my boss - the boss had sent out an email forged to appear it came from a co-worker that was supposed to be funny but hurt the co-worker's feelings badly. Co-worker wanted revenge, so I created a "letter of resignation" that appeared to come from the boss and that appeared to have been sent to every member of our company - but was really only sent to the boss himself.
Co-worker later told me he saw the boss running from office to office trying to do "damage control" before he realized no one else had actually gotten the email.
[+] [-] icey|16 years ago|reply
What's different between the way they did it and the way you did it? I'm assuming they also simply changed their email address in their mail client to try to send to my account.
[+] [-] noodle|16 years ago|reply
he was successful.
seriously, though, the difference probably is that you put more time and effort into creating a posterous that was more secure. something as simple as "create it using a difficult email address" should cover most bases. something that most people likely don't do.
[+] [-] latj|16 years ago|reply
We were using posterous fairly often a while back, until my friend got into an argument with the posterous founder. He (my friend) had a few beers and then wrote a stupid message, basically saying that the posterous idea in general was bad (using different words :> ).
Then posterous founder replied saying he was banning my friend. We never found out if he actually followed through- because all of us (~15 guys) stopped using it completely the next day.
We, as users, have many options when choosing where to host our data, and we want services that are useful, secure, ethical, and beautiful.
http://charisma.posterous.com/
This one is not ready for us.
[+] [-] martian|16 years ago|reply
[+] [-] rantfoil|16 years ago|reply
[+] [-] frognibble|16 years ago|reply
I assumed that Posterous did something clever using the IP address of the SMTP peer or the headers in the message. Does Posterous fallback to just checking the sender email address?
[+] [-] robinduckett|16 years ago|reply
Apparently so, I didn't even change my name.
[+] [-] shalmanese|16 years ago|reply
[+] [-] drp|16 years ago|reply
[+] [-] coderdude|16 years ago|reply
[+] [-] rapind|16 years ago|reply
[+] [-] notphilatall|16 years ago|reply
Just registering the "usual" smtp sender / relay and prompting the user before posting something from a different spot could help. I don't know enough about MX records yet, but matching up the domain and sending IP could be another good measure. How else can this be improved?
[+] [-] guinness|16 years ago|reply
[+] [-] ergo98|16 years ago|reply
SPF solves almost all of the issue. Unique mailing addresses should be available for users who want it (yeah most people can handle an address book). The absence of those is just grossly incompetent.
[+] [-] some1else|16 years ago|reply
[+] [-] robinduckett|16 years ago|reply
Would half fix this problem.
[+] [-] jheriko|16 years ago|reply
Warning him would have been nice, this IS, by definition almost, malicious - regardless of how you chose to interpret the word yourself.
[+] [-] code_duck|16 years ago|reply
[+] [-] unknown|16 years ago|reply
[deleted]
[+] [-] mjijackson|16 years ago|reply
[+] [-] unknown|16 years ago|reply
[deleted]