From unknown Mon Jun 16 23:42:40 2025 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Mailer: MIME-tools 5.509 (Entity 5.509) Content-Type: text/plain; charset=utf-8 From: bug#35617 <35617@debbugs.gnu.org> To: bug#35617 <35617@debbugs.gnu.org> Subject: Status: mml secure mode should copy headers to inside the cryptographic payload Reply-To: bug#35617 <35617@debbugs.gnu.org> Date: Tue, 17 Jun 2025 06:42:40 +0000 retitle 35617 mml secure mode should copy headers to inside the cryptograph= ic payload reassign 35617 emacs submitter 35617 Daniel Kahn Gillmor severity 35617 wishlist tag 35617 security moreinfo thanks From debbugs-submit-bounces@debbugs.gnu.org Tue May 07 01:21:07 2019 Received: (at submit) by debbugs.gnu.org; 7 May 2019 05:21:07 +0000 Received: from localhost ([127.0.0.1]:58074 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hNsXK-0004zd-OO for submit@debbugs.gnu.org; Tue, 07 May 2019 01:21:07 -0400 Received: from eggs.gnu.org ([209.51.188.92]:41865) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hNsXH-0004yk-NY for submit@debbugs.gnu.org; Tue, 07 May 2019 01:21:04 -0400 Received: from lists.gnu.org ([209.51.188.17]:50038) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hNsXC-0004MO-5g for submit@debbugs.gnu.org; Tue, 07 May 2019 01:20:58 -0400 Received: from eggs.gnu.org ([209.51.188.92]:56245) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hNsXB-0002dV-1m for bug-gnu-emacs@gnu.org; Tue, 07 May 2019 01:20:57 -0400 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on eggs.gnu.org X-Spam-Level: X-Spam-Status: No, score=0.8 required=5.0 tests=BAYES_50,URIBL_BLOCKED autolearn=disabled version=3.3.2 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hNsX9-0004Kk-Vc for bug-gnu-emacs@gnu.org; Tue, 07 May 2019 01:20:57 -0400 Received: from che.mayfirst.org ([2001:470:1:116::7]:54718) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hNsX8-0004F2-GI for bug-gnu-emacs@gnu.org; Tue, 07 May 2019 01:20:55 -0400 DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019; t=1557206449; h=from : to : subject : date : message-id : mime-version : content-type : from; bh=dHzoF1gymzIuZa1jU0pZrHtJ6xK5g+162gTZZbmZrCs=; b=35tqqqKk3p+MtIzx/ZJ3q+kKfAvyN+YAAEd9hejyn1V9Db/1ncde9xRY NkT4DJ258OWSpBrWG9vsv25UWrejAw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019rsa; t=1557206448; h=from : to : subject : date : message-id : mime-version : content-type : from; bh=dHzoF1gymzIuZa1jU0pZrHtJ6xK5g+162gTZZbmZrCs=; b=eBNMski0wqFpkpY+5j9RiAG52IWjUtpwfqO71p4LVoNlmtQNd3k7gY60 6UTYoTby+WWrGgpbK7hp3lMctmSpkK8IJmC9kVJPzI4X1rpoBw1y8ZIZHI 8sKsGBpltNtjrqRdc8Z6Ho6wvy+30DC5sAlYyiixkxOITV+O1y+mac1m1O 3m6WOwZ+s9bVD0tA153HTwSpRAX34XA7m3pT77JyBhOGsSskcMxKY9bdoo KCKyv0lXSFuZaP2OwBwC6O7vD0Z20wwoOIyuxNyTdcuqzDLoS+4Owu68Pm wZC1i8pRH5n5EtCOfw+tbDdAsOTOJwGsW7pDWSAQWbbNXCwxa5q/tA== Received: from fifthhorseman.net (ool-6c3a0662.static.optonline.net [108.58.6.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by che.mayfirst.org (Postfix) with ESMTPSA id 880A6F99D for ; Tue, 7 May 2019 01:20:48 -0400 (EDT) Received: by fifthhorseman.net (Postfix, from userid 1000) id 69E822094F; Tue, 7 May 2019 01:20:44 -0400 (EDT) From: Daniel Kahn Gillmor To: bug-gnu-emacs@gnu.org Subject: mml secure mode should copy headers to inside the cryptographic payload Autocrypt: addr=dkg@fifthhorseman.net; prefer-encrypt=mutual; keydata= mDMEXEK/AhYJKwYBBAHaRw8BAQdAr/gSROcn+6m8ijTN0DV9AahoHGafy52RRkhCZVwxhEe0K0Rh bmllbCBLYWhuIEdpbGxtb3IgPGRrZ0BmaWZ0aGhvcnNlbWFuLm5ldD6ImQQTFggAQQIbAQUJA8Jn AAULCQgHAgYVCgkICwIEFgIDAQIeAQIXgBYhBMS8Lds4zOlkhevpwvIGkReQOOXGBQJcQsbzAhkB AAoJEPIGkReQOOXG4fkBAO1joRxqAZY57PjdzGieXLpluk9RkWa3ufkt3YUVEpH/AP9c+pgIxtyW +FwMQRjlqljuj8amdN4zuEqaCy4hhz/1DbgzBFxCv4sWCSsGAQQB2kcPAQEHQERSZxSPmgtdw6nN u7uxY7bzb9TnPrGAOp9kClBLRwGfiPUEGBYIACYWIQTEvC3bOMzpZIXr6cLyBpEXkDjlxgUCXEK/ iwIbAgUJAeEzgACBCRDyBpEXkDjlxnYgBBkWCAAdFiEEyQ5tNiAKG5IqFQnndhgZZSmuX/gFAlxC v4sACgkQdhgZZSmuX/iVWgD/fCU4ONzgy8w8UCHGmrmIZfDvdhg512NIBfx+Mz9ls5kA/Rq97vz4 z48MFuBdCuu0W/fVqVjnY7LN5n+CQJwGC0MIA7QA/RyY7Sz2gFIOcrns0RpoHr+3WI+won3xCD8+ sVXSHZvCAP98HCjDnw/b0lGuCR7coTXKLIM44/LFWgXAdZjm1wjODbg4BFxCv50SCisGAQQBl1UB BQEBB0BG4iXnHX/fs35NWKMWQTQoRI7oiAUt0wJHFFJbomxXbAMBCAeIfgQYFggAJhYhBMS8Lds4 zOlkhevpwvIGkReQOOXGBQJcQr+dAhsMBQkB4TOAAAoJEPIGkReQOOXGe/cBAPlek5d9xzcXUn/D kY6jKmxe26CTws3ZkbK6Aa5Ey/qKAP0VuPQSCRxA7RKfcB/XrEphfUFkraL06Xn/xGwJ+D0hCw== Date: Tue, 07 May 2019 01:20:43 -0400 Message-ID: <878svi2638.fsf@fifthhorseman.net> MIME-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature" X-detected-operating-system: by eggs.gnu.org: Genre and OS details not recognized. X-Received-From: 2001:470:1:116::7 X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.6.x X-Spam-Score: -1.3 (-) X-Debbugs-Envelope-To: submit X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -2.3 (--) --=-=-= Content-Type: text/plain Content-Transfer-Encoding: quoted-printable In secure mode, during message composition, mml crafts a MIME message before applying the necessary transformations for cryptographic protections. I think the function of preparing this stuff happens in message-encode-message-body and in mml-generate-mime. It would be great if those preparations were to copy all the headers from *outside* of the cryptographic protections (the "cryptographic envelope") to the top-level part *inside* the cryptographic envelope, so that they're covered by the cryptographic protections. The only header you probably don't want to copy is Content-Type, since the Content-Type outside the cryptographic protections is pretty clearly different from the one on the inside. If this simple copy is done, then the subject line of a signed message can be verified by the client (as can other headers, but Subject is probably most relevant). The request above doesn't keep the subject line secret in the case of an encrypted message, but it sets the stage for doing so. It is concretely useful on its own in any case for signed-only messages, and has no downsides. Once the headers are regularly copied into the top-level part of the cryptographic payload, the *outer* Subject for an encrypted message can be replaced with "Subject Unavailable" -- then mail user agents like enigmail and K-9 will be able to read the subject of encrypted messages, but they won't leak outside. I'll open that as a separate issue once we've gotten the first part described here taken care of So this particular feature request is *just* about outbound message composition and only covers header protection for signed messages. For incoming message handling of encrypted messages with protected headers, I have a patch queue ready to handle that (for Subject: at least) in notmuch-emacs. --dkg --=-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEARYKAB0WIQTJDm02IAobkioVCed2GBllKa5f+AUCXNEVrAAKCRB2GBllKa5f +HpbAQCmseTe3AhNBYDKcoGyu2EYnM6qT6FydTXovXtiW+YxGQEAwx/Tx8u6aJyr tAh+aCIt/uYRy/h6wBcpruv++veQcw0= =mtJm -----END PGP SIGNATURE----- --=-=-=-- From debbugs-submit-bounces@debbugs.gnu.org Fri Jun 21 06:20:25 2019 Received: (at control) by debbugs.gnu.org; 21 Jun 2019 10:20:25 +0000 Received: from localhost ([127.0.0.1]:49720 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1heGef-0007va-HR for submit@debbugs.gnu.org; Fri, 21 Jun 2019 06:20:25 -0400 Received: from mail-io1-f41.google.com ([209.85.166.41]:45334) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1heGed-0007vN-C2 for control@debbugs.gnu.org; Fri, 21 Jun 2019 06:20:24 -0400 Received: by mail-io1-f41.google.com with SMTP id e3so490595ioc.12 for ; Fri, 21 Jun 2019 03:20:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:date:message-id:mime-version; bh=oBqgcMl9XwN3PETXtvtPgqvL08oQgnMy/8f3Wq33QOU=; b=dFR31ED8yRY37/wlONNcFZQWdZxptawtneWPEzg1lqYCTThkEUrnc0JNJEVFKArof8 MKZ+JHyeuLoRg2/iiRPLjmF4AyD4r3BeQVCTLkPbY/DH71jn5GMng+pSiXXXB2AV+xp8 s4xwGyYAjLXA/NbC8BD3I1I6eeS6LtijDU4KSvunAplhDAIWgMZ3ukMpLfoCevhOsL45 ZIvEtfsZ+TX0yIkGRModUXO2C/vbA3Sa64e3ZUtjN1iDBZ6gHWfgDcxHjhbfNe8XDhpP vky9BMDSg0+dBZFDnAxi+Du/6FW+0+HfiyX1pEb62iHutJChkshao6R9bmIm4i2EG2lJ 0/iw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:mime-version; bh=oBqgcMl9XwN3PETXtvtPgqvL08oQgnMy/8f3Wq33QOU=; b=tCx/DJXz13IzuMUVUsenWEjMk+y7+87Dy6AETR6SXn5hNXR75r8QHkfvo9FHtxrMGF z38Yh7kZkjP0no3wo7s7GS5lAhfktBbaAV4gbD2sZYV9Apy9pPEAF5ssfUsVvoi1dETx xhPXHlEXiJ7ooOr5Iaa9gEp3hF7UHnqPBzAqMs9LkvuZb1Tnf58rjWEg3oQ5DNROMhT3 PV4oxAnsrPlNZjlGG0DIppZHLqDl6b/KPMTcqVuJrTpjbtDxbeb5uvEPlkDI+ilOrabN B4jPMCpw4dKpOYQRcLA9y0or8Jukwcbgr0my7HvVar673bD/6LkpkKF1V7gOnFuEOTDn HKXA== X-Gm-Message-State: APjAAAWCtKDKNXpmIJs05HGmURenDjzsatovnxSScpULbS9bzMG0oed4 7s4urUCYIWsk7CECpOAX0QlJBPJ7 X-Google-Smtp-Source: APXvYqxgl9gy/mRJMC7/qYvTSih2TeK2Cs6E985Cv+Go0JKNddh75gIMxOj0zQsvLWpgK/Vw2bfUFg== X-Received: by 2002:a5d:9c4d:: with SMTP id 13mr13486732iof.47.1561112417617; Fri, 21 Jun 2019 03:20:17 -0700 (PDT) Received: from minid (cbl-45-2-119-34.yyz.frontiernetworks.ca. [45.2.119.34]) by smtp.gmail.com with ESMTPSA id u26sm2830841iol.1.2019.06.21.03.20.17 for (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Fri, 21 Jun 2019 03:20:17 -0700 (PDT) From: Noam Postavsky To: control@debbugs.gnu.org Subject: control message for bug #35617 Date: Fri, 21 Jun 2019 06:20:16 -0400 Message-ID: <87tvcjutnj.fsf@gmail.com> MIME-Version: 1.0 Content-Type: text/plain X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: control X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) tags 35617 + security severity 35617 wishlist quit From debbugs-submit-bounces@debbugs.gnu.org Mon Aug 26 02:09:30 2019 Received: (at 35617) by debbugs.gnu.org; 26 Aug 2019 06:09:30 +0000 Received: from localhost ([127.0.0.1]:45439 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1i28C1-000703-Vt for submit@debbugs.gnu.org; Mon, 26 Aug 2019 02:09:30 -0400 Received: from quimby.gnus.org ([80.91.231.51]:48314) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1i28C0-0006zu-BO for 35617@debbugs.gnu.org; Mon, 26 Aug 2019 02:09:28 -0400 Received: from cm-84.212.202.86.getinternet.no ([84.212.202.86] helo=marnie) by quimby.gnus.org with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1i28Bw-00049z-BK; Mon, 26 Aug 2019 08:09:26 +0200 From: Lars Ingebrigtsen To: Daniel Kahn Gillmor Subject: Re: bug#35617: mml secure mode should copy headers to inside the cryptographic payload References: <878svi2638.fsf@fifthhorseman.net> Date: Mon, 26 Aug 2019 08:09:23 +0200 In-Reply-To: <878svi2638.fsf@fifthhorseman.net> (Daniel Kahn Gillmor's message of "Tue, 07 May 2019 01:20:43 -0400") Message-ID: <87h8645ugc.fsf@gnus.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.0.50 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Spam-Report: Spam detection software, running on the system "quimby.gnus.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see @@CONTACT_ADDRESS@@ for details. Content preview: Daniel Kahn Gillmor writes: > It would be great if those preparations were to copy all the headers > from *outside* of the cryptographic protections (the "cryptographic > envelope") to the top-level part *inside* the cryptograph [...] Content analysis details: (-2.9 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: 35617 Cc: 35617@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) Daniel Kahn Gillmor writes: > It would be great if those preparations were to copy all the headers > from *outside* of the cryptographic protections (the "cryptographic > envelope") to the top-level part *inside* the cryptographic envelope, so > that they're covered by the cryptographic protections. You mean repeat all the headers in the body of the message? Is there an RFC for stashing headers in the body of messages and using those instead of the real headers when reading? Because if not, this just sounds like it's going to be pretty confusing. -- (domestic pets only, the antidote for overdose, milk.) bloggy blog: http://lars.ingebrigtsen.no From debbugs-submit-bounces@debbugs.gnu.org Mon Aug 26 02:09:34 2019 Received: (at control) by debbugs.gnu.org; 26 Aug 2019 06:09:34 +0000 Received: from localhost ([127.0.0.1]:45442 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1i28C6-00070N-8w for submit@debbugs.gnu.org; Mon, 26 Aug 2019 02:09:34 -0400 Received: from quimby.gnus.org ([80.91.231.51]:48328) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1i28C5-00070E-Ck for control@debbugs.gnu.org; Mon, 26 Aug 2019 02:09:33 -0400 Received: from cm-84.212.202.86.getinternet.no ([84.212.202.86] helo=marnie) by quimby.gnus.org with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1i28C2-0004A6-Nd for control@debbugs.gnu.org; Mon, 26 Aug 2019 08:09:32 +0200 Date: Mon, 26 Aug 2019 08:09:30 +0200 Message-Id: <87ftlo5ug5.fsf@gnus.org> To: control@debbugs.gnu.org From: Lars Ingebrigtsen Subject: control message for bug #35617 X-Spam-Report: Spam detection software, running on the system "quimby.gnus.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see @@CONTACT_ADDRESS@@ for details. Content preview: tags 35617 + moreinfo quit Content analysis details: (-2.9 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: control X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) tags 35617 + moreinfo quit From debbugs-submit-bounces@debbugs.gnu.org Sun Sep 29 10:12:54 2019 Received: (at 35617) by debbugs.gnu.org; 29 Sep 2019 14:12:54 +0000 Received: from localhost ([127.0.0.1]:55345 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1iEZwT-0004Ef-Vo for submit@debbugs.gnu.org; Sun, 29 Sep 2019 10:12:54 -0400 Received: from quimby.gnus.org ([80.91.231.51]:55586) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1iEZwQ-0004ER-5C for 35617@debbugs.gnu.org; Sun, 29 Sep 2019 10:12:50 -0400 Received: from cm-84.212.202.86.getinternet.no ([84.212.202.86] helo=marnie) by quimby.gnus.org with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1iEZwL-0001g5-Ap; Sun, 29 Sep 2019 16:12:49 +0200 From: Lars Ingebrigtsen To: Daniel Kahn Gillmor Subject: Re: bug#35617: mml secure mode should copy headers to inside the cryptographic payload References: <878svi2638.fsf@fifthhorseman.net> <87h8645ugc.fsf@gnus.org> Date: Sun, 29 Sep 2019 16:12:45 +0200 In-Reply-To: <87h8645ugc.fsf@gnus.org> (Lars Ingebrigtsen's message of "Mon, 26 Aug 2019 08:09:23 +0200") Message-ID: <875zlbjin6.fsf@gnus.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.0.50 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Spam-Report: Spam detection software, running on the system "quimby.gnus.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see @@CONTACT_ADDRESS@@ for details. Content preview: Lars Ingebrigtsen writes: > Daniel Kahn Gillmor writes: > >> It would be great if those preparations were to copy all the headers >> from *outside* of the cryptographic protections (the "cryptographic > [...] Content analysis details: (-2.9 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: 35617 Cc: 35617@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) Lars Ingebrigtsen writes: > Daniel Kahn Gillmor writes: > >> It would be great if those preparations were to copy all the headers >> from *outside* of the cryptographic protections (the "cryptographic >> envelope") to the top-level part *inside* the cryptographic envelope, so >> that they're covered by the cryptographic protections. > > You mean repeat all the headers in the body of the message? > > Is there an RFC for stashing headers in the body of messages and using > those instead of the real headers when reading? Because if not, this > just sounds like it's going to be pretty confusing. More information was requested, but no response was given within a month, so I'm closing this bug report. If there is such an RFC, please reopen this bug report. -- (domestic pets only, the antidote for overdose, milk.) bloggy blog: http://lars.ingebrigtsen.no From debbugs-submit-bounces@debbugs.gnu.org Sun Sep 29 10:12:58 2019 Received: (at control) by debbugs.gnu.org; 29 Sep 2019 14:12:58 +0000 Received: from localhost ([127.0.0.1]:55348 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1iEZwY-0004Ex-8S for submit@debbugs.gnu.org; Sun, 29 Sep 2019 10:12:58 -0400 Received: from quimby.gnus.org ([80.91.231.51]:55600) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1iEZwW-0004Eq-RI for control@debbugs.gnu.org; Sun, 29 Sep 2019 10:12:57 -0400 Received: from cm-84.212.202.86.getinternet.no ([84.212.202.86] helo=marnie) by quimby.gnus.org with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1iEZwU-0001gE-8p for control@debbugs.gnu.org; Sun, 29 Sep 2019 16:12:56 +0200 Date: Sun, 29 Sep 2019 16:12:54 +0200 Message-Id: <874l0vjimx.fsf@gnus.org> To: control@debbugs.gnu.org From: Lars Ingebrigtsen Subject: control message for bug #35617 X-Spam-Report: Spam detection software, running on the system "quimby.gnus.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see @@CONTACT_ADDRESS@@ for details. Content preview: close 35617 quit Content analysis details: (-2.9 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: control X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) close 35617 quit From unknown Mon Jun 16 23:42:40 2025 Received: (at fakecontrol) by fakecontrolmessage; To: internal_control@debbugs.gnu.org From: Debbugs Internal Request Subject: Internal Control Message-Id: bug archived. Date: Mon, 28 Oct 2019 11:24:06 +0000 User-Agent: Fakemail v42.6.9 # This is a fake control message. # # The action: # bug archived. thanks # This fakemail brought to you by your local debbugs # administrator