Microsoft, you have a problem
Eitan Caspi
An Information Security leader and expert, for more than 25 years, living by the motto of ever improving. *** Open to relocation *** (expressed views are my own and not of my employer or clients)
Recently (some will say – for many years by now) 微软 is being criticized for its #Information #Security capabilities, as that it is slow to do the move from on-premises products security to also, in addition, a cloud provider security, which is, in my opinion, even harder.
?
This is my recent incident about it:
I recently accepted an email from one of Microsoft's subdomains.
I use a commercial cloud #email security service to protect my email traffic, and this system stopped this email from entering because the subdomain did not have any #SPF record, so my email security service stopped this email as a possible email impersonating to be from #Microsoft).
This subdomain still doesn't have an SPF record, as I write this.
?
It is not a big security issue, but I know that if I was in charge of this online asset and I had such an issue – I will be glad if someone would alert me about it, so I tried to find a way to report this to Microsoft, but I did not find any explicit content directing where to report online security issues, so I opened a case at #MSRC (Microsoft Security Response Center)
I am aware it is not a vulnerability but a missing security measure that MS better fix and I had no better place to report this to #MS.
?
This is the response I got as my report was set by the MSRC analyst to a status of "This closed as a non-MSRC case." (bold text was highlighted by me):
"
Hello,
Thank you for contacting the Microsoft Security Response Center (MSRC). We appreciate the time taken to submit this assessment.
?
Upon investigation we have determined that this does not meet the definition of a security vulnerability.
The website you reported does not contain a MX record, which indicates we do not use the domain to send email messages.? In which case SPF/DMARC records are not considered required and would not meet the bar for security servicing.
As such, this thread is being closed and no longer monitored. We apologize for any inconvenience this may have caused.
?
If you believe this to be a misunderstanding of the report, submit a new report at https://aka.ms/secure-at
?
Please include:
领英推荐
Relevant information previously provided in your initial report
Detailed steps required to consistently reproduce the issue
Short explanation on how an attacker could use the information to exploit another user remotely
Proof-of-concept (POC), such as a video recording, crash reports, screenshots, or relevant code samples
For more information on what qualifies as a security vulnerability please see the following:
Definition of a Security Vulnerability: https://www.microsoft.com/msrc/definition-of-a-security-vulnerability
We thank you again for taking the time to submit this report!
Regards,
<name of the analyst>
MSRC
"
?
This is sad for at least two reasons:
?
If Microsoft put at its MSRC frontline an analyst with such level of understanding how email works – then Microsoft really, really, have a problem.
And no, I will not open a new case at MSRC to prove them wrong. I will just go on with my life and Microsoft will need to live with the consequences of how it operates.
I will not make the extra mile effort when MS doesn't even do the basics.
CEO and security engineer
6 个月???? ??? ?? ?? ?????? ??????? ??? ???? ???? ????? ???? ?????? ???: https://chat.whatsapp.com/HWWA9nLQYhW9DH97x227hJ