Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Flag providers that leak IP addresses of SMTP users in Received header #313

Open
link2xt opened this issue Oct 27, 2024 · 6 comments
Open

Comments

@link2xt
Copy link
Contributor

link2xt commented Oct 27, 2024

Some providers like Gmail leak IP addresses in Received headers: https://ylukem.com/blog/apple-mail-leaks-your-ip-address

Posteo, mailbox.org, mailo, yandex, outlook, fastmail, riseup and systemli do not leak IP address as far as I see from my mail archives.

Also all Mailcow and chatmail instances do not leak the IP.

Leaking providers: Gmail, web.de, 163.com, gmx.net.
icloud leaked in the past but this has since changed, need to be checked again.

@missytake
Copy link
Contributor

Should we also show this information in-app?

IP address leakage isn't related to onboarding, so while it is a warning, the PREPARE flag doesn't really fit. Should we add a WARNING flag beside that?

When I think about it - how useful is an IP address for the email recipient (and their server) anyway? It can't be pinned down to a postal address by non-state attackers; and they don't need to look at the email headers to get the IP address, they can just ask those providers as they log them certainly. It can mostly be used for tracking, which is not nice, but doesn't warrant for a visible warning.

@bkil
Copy link

bkil commented Jan 6, 2025

As mentioned on chat before we created this issue, anyone can easily track others by consulting a geoip database. Even when the location is only accurate up to street or town, it can leak information about the sender such as when and where they work, study, whether they are having an affair, whether they are lying, etc. Describing this as "not nice" is an understatement.

No modern communication network is expected to leak client IP to every other client. Even most popular IRC networks started offering free cloaks to every user in the past decades to mitigate this. It is a valid user expectation and it must be present with huge red letters if this expectation will not hold when using a communications app.

@hpk42
Copy link
Contributor

hpk42 commented Jan 6, 2025 via email

@bkil
Copy link

bkil commented Jan 6, 2025

I agree that such a self test after installation would be beneficial.

So would collecting and publishing its results in a public chart (such as one generated using provider-db)!

@hpk42
Copy link
Contributor

hpk42 commented Jan 6, 2025 via email

@bkil
Copy link

bkil commented Jan 6, 2025

No self-test result would be automatically collected. A user could file an issue or PR on this repo just as before.

The app may check its built-in cache of the last published list first and only ask the user to submit an update if no (recent) information is present in the published chart about the given provider.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants