Security Request: Fundamentally change the way non-mailto links work
Moderator: athenian200
-
- Astronaut
- Posts: 666
- Joined: 2018-05-17, 02:34
- Location: Los Berros Canyon, California
Security Request: Fundamentally change the way non-mailto links work
I ran into this concept a few months ago, and I think it's the greatest security advancement for E-Mail clients I've ever heard - Make hyperlinks copy-to-clipboard on click rather than immediately opening a browser and navigating to them.
-
- Pale Moon guru
- Posts: 35651
- Joined: 2011-08-28, 17:27
- Location: Motala, SE
Re: Security Request: Fundamentally change the way non-mailto links work
Please don't do this. There's no security risk associated with opening clicked hyperlinks in the system browser and it's essential behaviour for pretty much all notification e-mails.
"Sometimes, the best way to get what you want is to be a good person." -- Louis Rossmann
"Seek wisdom, not knowledge. Knowledge is of the past; wisdom is of the future." -- Native American proverb
"Linux makes everything difficult." -- Lyceus Anubite
"Seek wisdom, not knowledge. Knowledge is of the past; wisdom is of the future." -- Native American proverb
"Linux makes everything difficult." -- Lyceus Anubite
-
- Contributing developer
- Posts: 1537
- Joined: 2018-10-28, 19:56
- Location: Georgia
Re: Security Request: Fundamentally change the way non-mailto links work
Well, the only way I would be willing to implement this is if it were something that could be disabled by a preference, because I'm sure a lot of people like being able to follow links in e-mails.
Though honestly, I have to admit that if most e-mail clients started working this way, I would probably find webmail to be a better alternative, since it's trusted by default whereas an e-mail client has to jump through a lot of extra hoops.
Though honestly, I have to admit that if most e-mail clients started working this way, I would probably find webmail to be a better alternative, since it's trusted by default whereas an e-mail client has to jump through a lot of extra hoops.
"The Athenians, however, represent the unity of these opposites; in them, mind or spirit has emerged from the Theban subjectivity without losing itself in the Spartan objectivity of ethical life. With the Athenians, the rights of the State and of the individual found as perfect a union as was possible at all at the level of the Greek spirit." -- Hegel's philosophy of Mind
-
- Fanatic
- Posts: 240
- Joined: 2017-11-18, 04:24
Re: Security Request: Fundamentally change the way non-mailto links work
That security enhancement would be more relevant/useful in corporate environments where they still need to monitor web destinations and train people with "Do not click links in emails!1!". Preference would default to Off / traditional behavior, but managed environments could turn it On as needed to comply with corporate policy.
-
- Moon Magic practitioner
- Posts: 2411
- Joined: 2012-08-19, 20:32
Re: Security Request: Fundamentally change the way non-mailto links work
What would be the purpose of this, to better verify the link before opening it? Isn't it already visible on mouse hover?
Perhaps pasting directly on a browser has some security advantage over the email client passing the link?
Perhaps pasting directly on a browser has some security advantage over the email client passing the link?
Safe Mode / clean profile info: Help/Restart in Safe Mode
Information to include when asking for support - How to apply user agent overrides
How to auto-fill passwords
Windows 10 Pro x64
Information to include when asking for support - How to apply user agent overrides
How to auto-fill passwords
Windows 10 Pro x64
-
- Astronaut
- Posts: 666
- Joined: 2018-05-17, 02:34
- Location: Los Berros Canyon, California
Re: Security Request: Fundamentally change the way non-mailto links work
Not to better verify - to FORCE verify. Pasting the link into your address bar draws your attention to it naturally in the process. And mouse hover is great, if you know about it and you're not using a touch screen. From personal experience with clients and family, though, many users forget that it exists at all, since it's always in the bottom corner where their eyes have no reason to look.back2themoon wrote: ↑2023-09-24, 22:38What would be the purpose of this, to better verify the link before opening it? Isn't it already visible on mouse hover?
Perhaps pasting directly on a browser has some security advantage over the email client passing the link?
-
- Pale Moon guru
- Posts: 35651
- Joined: 2011-08-28, 17:27
- Location: Motala, SE
Re: Security Request: Fundamentally change the way non-mailto links work
That's a good point too. browsers will never force this kind of behaviour on hyperlinks.athenian200 wrote: ↑2023-09-24, 19:20I would probably find webmail to be a better alternative, since it's trusted by default
It's not a security enhancement, at all. Clicking links in e-mails in itself is also, contrary to the mantra repeated on the web, in itself not an insecure or dangerous operation. It's only what the user does once they land on a malicious website afterwards that is the problem, and that is no longer in the realm of Epyrus. Proper training in the use of the browser would be more important than telling people to not click links. Of course if the browser in use is not displaying domain identities properly (like some mainstream ones) then that would add even more issues.
In addition, I'd expect corporate environments to handle their endpoint security in different (better) ways.
Of course it will not help at all if you're given a long URL that will not show the domain name when pasting (because it's scrolled off to the left) and at that point the first check one would do to verify the domain would be after navigation, which would be exactly equal to what would be the case when just clicking a link and it opening in the browser directly. After all, what is put on the clipboard is not visible/directly viewable to the user. A smart length could even make a spoofed domain inside the URL be the first thing the eye trains on after pasting on common resolutions.RealityRipple wrote: ↑2023-09-24, 23:10Pasting the link into your address bar draws your attention to it naturally in the process.
I just don't see how this routine would be more beneficial. One can train someone to manually open a browser and paste a URL, but not make a user aware of the status bar?...
"Sometimes, the best way to get what you want is to be a good person." -- Louis Rossmann
"Seek wisdom, not knowledge. Knowledge is of the past; wisdom is of the future." -- Native American proverb
"Linux makes everything difficult." -- Lyceus Anubite
"Seek wisdom, not knowledge. Knowledge is of the past; wisdom is of the future." -- Native American proverb
"Linux makes everything difficult." -- Lyceus Anubite
-
- Knows the dark side
- Posts: 4984
- Joined: 2015-12-09, 15:45
Re: Security Request: Fundamentally change the way non-mailto links work
Corporate environments already scan and quarantine external emails as well as any external links not on a whitelist. Office 365 has had this feature for a while.
"One hosts to look them up, one DNS to find them and in the darkness BIND them."
Linux Mint 21 Xfce x64 on HP i5-5200 laptop, 12 GB RAM.
AutoPageColor|PermissionsPlus|PMPlayer|Pure URL|RecordRewind|TextFX
Linux Mint 21 Xfce x64 on HP i5-5200 laptop, 12 GB RAM.
AutoPageColor|PermissionsPlus|PMPlayer|Pure URL|RecordRewind|TextFX
-
- Astronaut
- Posts: 588
- Joined: 2015-06-01, 12:52
- Location: US Southeast
Re: Security Request: Fundamentally change the way non-mailto links work
This is completely untrue, and quite surprising coming from you.Moonchild wrote: ↑2023-09-24, 23:51It's not a security enhancement, at all. Clicking links in e-mails in itself is also, contrary to the mantra repeated on the web, in itself not an insecure or dangerous operation. It's only what the user does once they land on a malicious website afterwards that is the problem
If a web site has CSRF or XSS vulnerabilities that the user is a member of and logged into, then that user following a link in an e-mail can certainly cause them trouble. It could be a bank balance transfer they didn't authorize, or any manner of other obnoxious outcome.
Or of course there are the much more traditional zero-click attacks and drive-by downloads that don't require any action from the user other than clicking on a hyperlink (in an e-mail perhaps).
https://www.wired.com/story/sneaky-zero ... den-menace
https://www.kaspersky.com/resource-cent ... y-download
I could go on, but I'm just going to assume you were high/sleep-deprived when you wrote the above and leave it at that.
Last edited by BenFenner on 2023-09-25, 05:01, edited 1 time in total.
-
- Fanatic
- Posts: 132
- Joined: 2018-08-03, 17:00
Re: Security Request: Fundamentally change the way non-mailto links work
I personally would probably use a feature like that, but I bet 99% of users "being forced" would just copy-paste automatically and never check the url, so it would only help with accidental clicks, and at that point it's like a popup asking if you want to follow the link or not.
-
- Fanatic
- Posts: 240
- Joined: 2017-11-18, 04:24
Re: Security Request: Fundamentally change the way non-mailto links work
It's only partly about modifying behavior and making people browse smarter (which will never work) ... it's more about tracking what people do. You can monitor and log clicks but you can't track where people look and what they see (yet).Train someone to manually open a browser and paste a URL, but not make a user aware of the status bar?
I *already* use links this way, in clients that don't support an Open With extension, especially when the default browser and its current config don't properly support the site I'm opening.I would use a feature like that
Agree. How about <AltKey>+Click to actually auto-open links, while bare <Click> only copies the link to the clipboard? This reserves auto-open for users who know what they're doing.users would just copy-paste automatically and never check the url ... and at that point it's like a popup asking if you want to follow the link
-
- Moon Magic practitioner
- Posts: 2411
- Joined: 2012-08-19, 20:32
Re: Security Request: Fundamentally change the way non-mailto links work
I can see the value of this feature, but the usability change -for the worse- is too great to become the default.
The problem with enforcement, for the average user at least and assuming this becomes default behaviour, is that after a while they'll soon get annoyed by the extra steps (open browser/address bar/paste/enter) and start moving past them as fast as possible, thus paying less or no attention to the link - defeating the purpose. Reminds me of websites that enforce a password change every 3 months. At some point this becomes so annoying you either stop using them, or create a new password as quickly as possible: a weaker password.
Sounds very good but again, as an optional feature.
Safe Mode / clean profile info: Help/Restart in Safe Mode
Information to include when asking for support - How to apply user agent overrides
How to auto-fill passwords
Windows 10 Pro x64
Information to include when asking for support - How to apply user agent overrides
How to auto-fill passwords
Windows 10 Pro x64
-
- Contributing developer
- Posts: 1537
- Joined: 2018-10-28, 19:56
- Location: Georgia
Re: Security Request: Fundamentally change the way non-mailto links work
I have no idea what it would take to implement this, whether it could be done without modifying any platform code with conditionals, etc. But there are a couple of prefs you can flip that might help...
network.protocol-handler.warn-external.http
network.protocol-handler.warn-external.https
If you flip these over to true, Epyrus will prompt you with a dialog box asking whether you're sure you want to proceed, and which application you want to use to open the link. It's not precisely what is being asked for, I know, but it does involve the same idea of making a user think twice about whatever link they are following and giving them a chance to reconsider.
I suspect if you really wanted to, you could make Epyrus attempt to handle http and https links with something other than a web browser, so that clicking on links either does nothing at all or copies the links to the system clipboard. All without any actual modification to Epyrus itself.
network.protocol-handler.warn-external.http
network.protocol-handler.warn-external.https
If you flip these over to true, Epyrus will prompt you with a dialog box asking whether you're sure you want to proceed, and which application you want to use to open the link. It's not precisely what is being asked for, I know, but it does involve the same idea of making a user think twice about whatever link they are following and giving them a chance to reconsider.
I suspect if you really wanted to, you could make Epyrus attempt to handle http and https links with something other than a web browser, so that clicking on links either does nothing at all or copies the links to the system clipboard. All without any actual modification to Epyrus itself.
"The Athenians, however, represent the unity of these opposites; in them, mind or spirit has emerged from the Theban subjectivity without losing itself in the Spartan objectivity of ethical life. With the Athenians, the rights of the State and of the individual found as perfect a union as was possible at all at the level of the Greek spirit." -- Hegel's philosophy of Mind
-
- Pale Moon guru
- Posts: 35651
- Joined: 2011-08-28, 17:27
- Location: Motala, SE
Re: Security Request: Fundamentally change the way non-mailto links work
I was neither. Well maybe a bit sleep-deprived but I stand by what I wrote.
I repeat that clicking links in e-mail in itself is not an insecure or dangerous operation, and that the danger happens afterwards and invariably by the user's action.
Really, if that's the case then that would be squarely in the court of that website to take responsibility for. This isn't the task of a mail client. URLs by themselves are not malicious -- all they are are addresses. Throwing roadblocks in the user's way actually making use of hyperlinks will not help in that case either. Copy/pasting a URL that exploits a CSRF or XSS vulnerability will be equally potent as clicking the link and spawning a browser with that click would be.
Now, don't get me wrong, if users are having trouble employing best practices when browsing the web, then it's a good and simple practice to teach people to not click ANY links in ANY e-mails, but that doesn't actually address where the danger lies, and gives the wrong impression that "links are evil". They aren't.
In addition, how would this ever help anyone where the links in an e-mail are click-tracking domains (very common practice)? Those never show the target domain either (and while Epyrus shows a potential scam warning in that case, it's pretty much something everyone ignores these days because notification mails, newsletters etc. etc. all employ statistical trackers these days). How could a user know before navigation whether it's a statistical tracker or a malicious site?
Giving a warning that the user should verify they are on the website they intended to visit after opening the browser is a good practice if necessary for the audience using Epyrus. The biggest danger dealing with "bad" links in e-mail is phishing and social engineering attacks, and that is something easily verified after the browser is opened. The problem is that this becomes a case of "passing the buck" who should allegedly be responsible for the resulting PEBCAK.
As for zero-click downloads, I actually did file a BZ bug about abuse of the click() event scripting element clicks on page visits to automatically initiate downloads, but even with that situation in mind, what is downloaded is not automatically executed. Many websites unfortunately rely on click() for legitimate downloads because they want to have download timers etc. for ad revenue; with that comes the risk of drive-by downloads (but not executions). But even those should not be considered a mail client's responsibility.
"Sometimes, the best way to get what you want is to be a good person." -- Louis Rossmann
"Seek wisdom, not knowledge. Knowledge is of the past; wisdom is of the future." -- Native American proverb
"Linux makes everything difficult." -- Lyceus Anubite
"Seek wisdom, not knowledge. Knowledge is of the past; wisdom is of the future." -- Native American proverb
"Linux makes everything difficult." -- Lyceus Anubite
-
- Astronaut
- Posts: 588
- Joined: 2015-06-01, 12:52
- Location: US Southeast
Re: Security Request: Fundamentally change the way non-mailto links work
This is incorrect, as exemplified by my hypotheticals, and the links I provided.
I'm not saying the proposed feature is a good idea (it's not), but to say clinking hyperlinks (or clicking hyperlinks outside of a browser that auto-visit through your default browser) is always safe is just completely ignorant of the facts.
-
- Knows the dark side
- Posts: 4984
- Joined: 2015-12-09, 15:45
Re: Security Request: Fundamentally change the way non-mailto links work
That's not at all what he said. Maybe you're the one that's sleep deprived
"One hosts to look them up, one DNS to find them and in the darkness BIND them."
Linux Mint 21 Xfce x64 on HP i5-5200 laptop, 12 GB RAM.
AutoPageColor|PermissionsPlus|PMPlayer|Pure URL|RecordRewind|TextFX
Linux Mint 21 Xfce x64 on HP i5-5200 laptop, 12 GB RAM.
AutoPageColor|PermissionsPlus|PMPlayer|Pure URL|RecordRewind|TextFX
-
- Keeps coming back
- Posts: 940
- Joined: 2021-01-26, 11:18
Re: Security Request: Fundamentally change the way non-mailto links work
If an attacker sends emails containing a unique link for each email address, then once the link is clicked, the attacker can associate the email address with the user's IP address. Using IP, an attacker can find out the user's location and place of work or school (IP owner, organization domain, domain owner, etc.). This information becomes associated with the email address. And this is extremely undesirable.
It is better not to open any links in emails at all and the email client should not go online for any external content when displaying the email.
-
- Knows the dark side
- Posts: 4984
- Joined: 2015-12-09, 15:45
Re: Security Request: Fundamentally change the way non-mailto links work
All of this and previous comments are a technological solution for what is essentially PEBKAC. And that's why it never works.
Off-topic:
I mean right here on this forum despite having posting instructions and a freaking template for reporting site errors, people still blithely ignore all of that and expect us to read their mind to find out what URL isn't working
In this case - the user has to use their brains and not click on links in unknown emails, or even known ones (confirm from the person who sent it whether they really did, or it was an automated virus spamming attachments to their contacts).I mean right here on this forum despite having posting instructions and a freaking template for reporting site errors, people still blithely ignore all of that and expect us to read their mind to find out what URL isn't working
That's not what happens unless the client is itself loading the external website in some embedded browser control (which hasn't been the case for years if ever). The client just hands off URL opening to whatever is set as the default browser. Testing with Interlink, if I click an email link while Interlink is offline, it stays offline and the link just opens in my default browser (Pale Moon). I imagine Epyrus behaves the same way. And both of these clients have inherited the long standing Mozilla Suite or Thunderbird feature of not loading external images and blocking javascript in emails by default.
"One hosts to look them up, one DNS to find them and in the darkness BIND them."
Linux Mint 21 Xfce x64 on HP i5-5200 laptop, 12 GB RAM.
AutoPageColor|PermissionsPlus|PMPlayer|Pure URL|RecordRewind|TextFX
Linux Mint 21 Xfce x64 on HP i5-5200 laptop, 12 GB RAM.
AutoPageColor|PermissionsPlus|PMPlayer|Pure URL|RecordRewind|TextFX
-
- Keeps coming back
- Posts: 940
- Joined: 2021-01-26, 11:18
Re: Security Request: Fundamentally change the way non-mailto links work
You may laugh, but this is what I do with links in emails - I copy the link to the clipboard, and then paste it into a special browser (not the default one). Of course, only if I really need to open that link and those are very rare cases.
So I understand where the idea the OP is proposing came from...
It seems to me more and more that too much responsibility is placed on the user to make decisions about trust or distrust. Despite the fact that the user has no real information. “Do you trust this program?”, “do you trust this site?”, “do you trust this link?” etc. And this is taking into account the fact that each license has a disclaimer. So on what basis can I trust?
In my opinion, there is some big ideological problem in operating systems that leads to placing unnecessary responsibility on the user...
-
- Contributing developer
- Posts: 1537
- Joined: 2018-10-28, 19:56
- Location: Georgia
Re: Security Request: Fundamentally change the way non-mailto links work
Kris_88 wrote: ↑2023-09-26, 12:55It seems to me more and more that too much responsibility is placed on the user to make decisions about trust or distrust. Despite the fact that the user has no real information. “Do you trust this program?”, “do you trust this site?”, “do you trust this link?” etc. And this is taking into account the fact that each license has a disclaimer. So on what basis can I trust?
In my opinion, there is some big ideological problem in operating systems that leads to placing unnecessary responsibility on the user...
Off-topic:
You are absolutely correct that it's a question of ideology, and the truth is that most major governments and trade associations are increasingly coming down on the side of things that says the user should not be given the responsibility, and decisions should be made for them by large corporations or the government about what should or shouldn't be trusted. Increasingly, that kind of policy (and ideology) leads to Epyrus simply not being trusted by a lot of services simply because I can't afford to buy trust by going through verification processes and partnerships that larger projects and corporations can afford to go through. Everything from code signatures to OAuth2 is a sign that the world is going in precisely the direction you suggest, of not trusting the user, not giving them the responsibility, and instead placing their safety in more capable hands. And that direction is pretty much the reason why one day there will be no Epyrus.
You're not the only one in the world that thinks this way, a lot of very smart people have come to the same conclusions as you. But I will say that Epyrus is primarily for people who don't think this way, for those who are upset that control is being taken from the user and decisions are being made for them. In other words, you've given me enough information about your philosophy on security to rather confidently say that Epyrus is not for you, and you probably shouldn't use it, because it really isn't headed in the direction you want, and will likely cease to exist one day because broader forces are pushing in the direction you suggest.
You are absolutely correct that it's a question of ideology, and the truth is that most major governments and trade associations are increasingly coming down on the side of things that says the user should not be given the responsibility, and decisions should be made for them by large corporations or the government about what should or shouldn't be trusted. Increasingly, that kind of policy (and ideology) leads to Epyrus simply not being trusted by a lot of services simply because I can't afford to buy trust by going through verification processes and partnerships that larger projects and corporations can afford to go through. Everything from code signatures to OAuth2 is a sign that the world is going in precisely the direction you suggest, of not trusting the user, not giving them the responsibility, and instead placing their safety in more capable hands. And that direction is pretty much the reason why one day there will be no Epyrus.
You're not the only one in the world that thinks this way, a lot of very smart people have come to the same conclusions as you. But I will say that Epyrus is primarily for people who don't think this way, for those who are upset that control is being taken from the user and decisions are being made for them. In other words, you've given me enough information about your philosophy on security to rather confidently say that Epyrus is not for you, and you probably shouldn't use it, because it really isn't headed in the direction you want, and will likely cease to exist one day because broader forces are pushing in the direction you suggest.
"The Athenians, however, represent the unity of these opposites; in them, mind or spirit has emerged from the Theban subjectivity without losing itself in the Spartan objectivity of ethical life. With the Athenians, the rights of the State and of the individual found as perfect a union as was possible at all at the level of the Greek spirit." -- Hegel's philosophy of Mind