siv-org / siv

Secure Internet Voting protocol
https://siv.org
Other
12 stars 8 forks source link

Vulnerability to email delivery manipulation by Mailgun #214

Open dglittle opened 2 months ago

dglittle commented 2 months ago

Mailgun is depended upon for email (and therefore authkey) delivery.

They could change the authkey to an arbitrary value, deny access to the email, and/or vote using the authkey link themselves

Denial could be selective & targeted – Mailgun could just refuse to deliver the email to users that identified w/ particular political positions

Note that this also includes the entire email ecosystem as well – all of the users’ mail hosting companies (e.g their university, or gmail), MTAs that are used in transit for spam protection, etc. This is a really really strong (read: huge) trust assumption.

[...]

The goal is not to cast aspersions on the vendor, but to point out that the system is fundamentally trusting them in a way that might not be safe in the case of nation-state level adversaries.

Originally posted by @mspecter in https://github.com/siv-org/siv/issues/195

arianabuilds commented 2 months ago

Entry Summary for HACK SIV @ DEF CON 2024

Thanks again for participating! This submission earned $113.38 from SIV and $178.60 from the Public Vote, for a total of $291.98.

Here's what we noted in our evaluation:

What's interesting about this submission

What takes away from it

Issue to track getting paid: https://github.com/siv-org/hack.siv.org/issues/11