-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use Google Safe Browsing API for recipient domains check #5357
Comments
There were 1 email addresses found in the above comment. Please:
|
There were 1 email addresses found in the above comment. Please:
|
Hello, Thanks for reporting this to us. I've visited https://fivestarpropertymgmt.com and this alone is sufficient to trigger Google's deceptive site warning. Clicking 'Details' button and proceeding to visit https://fivestarpropertymgmt.com shows just the following site: In the case where it is triggered when the FlowCrypt browser extension is installed and composing a regular email going to for example Example: (clicking run will show the Google warning replicating the scenario shown in the video above) https://jsfiddle.net/w650egqt/ Let's hear some feedback from our team members. @tomholub @sosnovsky An AJAX request at |
Hi @frerghost, thanks for letting us know about such issue! It happens because FlowCrypt browser extension checks if recipients of your message have encryption enabled. And as domain of your recipient is marked as unsafe by Chrome, it shows full-page warning like when you open this website. To fix this issue we'll need to add check for safety of recipient domains and try to fetch public keys only from safe domains. |
Seems like we can use Google Safe Browsing Lookup API - https://developers.google.com/safe-browsing/v4/lookup-api |
Appreciate it and have a great day! Love the product and soooo appreciative of your work! |
Hey, @sosnovsky, which API key should we use? What's your take on this?
|
Google allows to restrict API key usage to specific websites, maybe it's possible to create key which will be limited to usage only in FlowCrypt extension? Then we can include it in extension code |
Didn't know it. That sounds good though! |
@sosnovsky Finished checking and it seems possible to only restrict to specific browser extension. |
I think we have configured FlowCrypt project at Google Developer console, and API key should be generated there, but unfortunately I don't have access it. Can you please generate some temporary API key for development for now? And before merging we'll replace it with the correct FlowCrypt API key. @tomholub what will be the better way for generating FlowCrypt API key from Google Developer console to use with Google Safe Browsing API? You can do it or maybe you can give me access to FlowCrypt project there, I'll generate a key and share it with Ioan? |
Sounds good |
Thank you folks for working so hard and keeping encryption safe! |
Roma, Could you please share some reference that shows it's okay to keep the api key exposed in the client? Also cc @martgil |
I tested limiting API key only to specific extension, but looks like it's not possible - we can only limit it to some URL (https://mail.google.com in our case). So someone can copy API key and use it in another extension on I'll try to find some other way for detecting dangerous websites before performing |
Google Workspace (went through troubleshooting to determine it was FlowCrypt extension), Chrome is up to date:
Version 115.0.5790.171 (Official Build) (64-bit),
When I send an email to a specific address: xcxxxxxx EMAIL ADDRESS NOT ALLOWED TO PUT HERE THAT CAUSES THE PROBLEM it removes me from Chrome and slams me into a Dangerous Notice page. Specifically, I can do NOTHING once I click anything like Subject Line, Body, etc. without being removed from Google Workspace Gmail and sent to the below screen. No similar issue with Gmail, Outlook, Proton etc. Happens on Windows or Ubuntu.
Love the product, but this is an issue. As background, the person has no website, never has, and his email is ported through paid Yahoo Turbify.
Never seen this action happen in the 12+ years I have used Google. The scary thing here is that it allows the hijacking of Google Workspace to send to that page and that is something to look at! That is a level of command and control that needs to be addressed and new permission notices issued.
Thank you!
Updates to some portions that were "emotional" language. ;) I also advised the party to contact their IT folks as well as removed the above video as it has email info in it. Thanks again for all your hard work!
The text was updated successfully, but these errors were encountered: