Forward Email (email provider)

Yes, we use MongoDB for users/domains configuration and to store a salt of the password.
Here is how we validate the password against the salt https://github.com/forwardemail/forwardemail.net/blob/e37e31d1cd9ca188b15f26b59a073de3469be1ea/helpers/is-valid-password.js#L41-L59

The reason why we stressed open-source backends so much is that when someone emails you @proton.me, @tuta.com, or @mailbox.org that it is going to first go through their MX servers. This means it could be being stored by them (or in a log). Additionally, even if you email someone from your account on Proton or <other service>, the moment that other person replies, it’s going to hit the MX server again (most likely unencrypted) and can be stored by them. Without seeing any code, and without an audit, the only thing you can rely on is marketing material and what is advertised.

This statement cannot be confirmed without an audit or backend code being shared.

There have been zero publicly shared audits of any currently listed PG email service provider’s backend infrastructures nor open source code snippets shared of how they process inbound email. Nor have they shared anything on their backend infrastructure in public. It is possible that any email service provider could be storing a copy of your messages without your knowledge, and there’s no way to verify they aren’t, or even assume they aren’t, because nobody has seen the code, nor an audit. Not all senders implement PGP/WKD either, e.g. someone that emails you from a Gmail to Proton isn’t going to have the content encrypted on the Gmail side – so once it hits the MX server all of your original outbound messages could be seen.

It is all done in-memory. An attacker would have to gain server access, modify code, and avoid being detected. We also have taken steps to completely disable swap, transparent huge pages, USB devices, and other memory-related security concerns.

3 Likes

The blogs written by Forwardemail has lots of misinformation and bias. Why aren’t we talking about this?

For example, this comparison below.

It states that both Protonmail and Tuta are closed source.

Because their backend is indeed closed source.

4 Likes

“For example” so what are the other examples? Please be more specific.

We are very clear with our comparison and provided links as well.

There is also a disclaimer here, so if you see inaccurate data, you are welcome to submit a pull request. We’ve previously updated other comparisons for inaccuracies (e.g. https://discuss.privacyguides.net/t/forward-email-email-provider/13370/163).

2 Likes

Originally they had stated that mailbox.org doesn’t have WKD but they later updated it after it was pointed out by me few days ago.

I’m not comfortable recommending a product that says that the competition, (Proton, Tuta) is not end-to-end encrypted. And then links to the privacy guides, websites for the definition of end-to-end encryption. They are so implying that privacy guides agrees that the later aren’t E2E.

3 Likes

This is very true. It’s also true for you. There is no guarantee your hosted platform runs the same backend code as the one that’s being published. I feel like I’ve said this before. But open source backend is an ideology advantage, not a security/privacy advantage for a hosted platform. I like what you’re doing, but you really shouldn’t be spouting bad things about the competition that equally apply to you.

1 Like

This is incorrect as we state the standard for E2EE is to use OpenPGP and WKD, and in the popups for OpenPGP and WKD we link to the Wikipedia pages as well.

Regarding Proton Mail E2EE, we link to an article, which subsequently links to several open GitHub issues filed on the Proton Mail repository.

Additionally, we also link to Tutanota similarly here with another link to a Reddit discussion, and subsequent links which show that they do not support OpenPGP. Tutanota does not support WKD either because of this.

By our definition, these providers do not use E2EE with OpenPGP/WKD (or have a broken implementation, e.g. due to Proton rewriting messages/signatures).

2 Likes

This is exactly why we said “any email service provider”. We’re very passionate about open-source and building trust too. We are following closely Mullvad’s efforts with System Transparency.

See these links for insight:

Hopefully we can achieve something similar to this in the next few years – and we’ll have the user base to support those costs by then) :pray:

3 Likes

Your claims here seem slightly bad faith to me. So, I have decided to waste some of my time refuting them. What follows is an analysis of your comparison page (Link), feel free to refute any and all parts you feel are unfair. I will focus on Proton, as I am most familiar with their infrastructure. Hopefully, Tuta is also similar.

Lets Start

Analysis of their table headers

20 facts in comparison

Only 15 are actually listed. The 5 additional metrics in the header of the table (Hardenize, observatory, etc.) are measures of their website, not their service.

External Image

This is a test of their website (not service) security. It uses a very dated idea of HTTP security. Proton fails this due to no CSP policy (Link), which can lead to cross site scripting (XSS) attacks (Link). But, this does not matter on their website since:

  1. Their website actually does not handle any credentials at all. All actual credentials and mails are handled by their webapp or their native clients. Their webapp was found to be vulnerable to XSS attacks in 2022, and was immediately patched. (Link)
  2. Their website passes all other security tests, and uses HSTS and other measures for web security.

What about forwardemail? Well, since they use CSP, they must be invulnerable right?
No. Any and every site is ultimately vulnerable to XSS, due to how web works. Using CSP means they can disable inline JS attacks, but still need to load the JS from their CDN. Who is their CDN? Do they host their entire web infrstructure? Are they invulnerable to transport layer leaks? Are their web implementations bullet-proof? We will never know, since they have no audits of their service, and their website isn’t actually tested regularly by security experts (unlike proton, which actually is tested on the daily by actual malicious actors and experts.)

External Image

Proton fails due to IPv6 being denied. Also due to the same CSP issue above. See below more more details.

External Image

Proton fails here as they do not resolve IPv6. This is not a bug, its a feature. IPv6 is very new and immature in security, and legacy IPv6 is a privacy risk. Interestingly, forwardemail also failed this test until recently (around 2023). (Link)

External Image

The Mozilla observatory is deprecated now. And anyways, it’s just a repetition of the first test. No actual new difference.

External Image

I agree with this :smile:

Analysis of their table of comparison

  1. Pricing, storage, attachment are all accurate for proton. (as they should be lol, public info)
  2. Open source: Correct claim that Proton backend is not open source. Appreciate forwardemail doing it all open-source, but again, no actual audit of the source. FLOSS is not security.
  3. Sandboxed Encryption: No source for their claim of Proton using what they say proton uses, and no source/audit of what they say they use. Additionally, if e2ee is implemented well, rogue employees or anyone else cannot access that data anyway. Finally a personal opinion: Having individual SQLite mailboxes might add another attack vector where now each mailbox can be easily separated from the larger database by a rouge employee, who can then handover specific data to malicious actor rather than the entire database. No clue if this is true, but that is what I think.
  4. Features: Don’t see the point in debating unlimited domains, aliases, etc. since that is part of pricing models used, and will differ from company to company. Kudos to forwardemail if they provide all this in free plan.
  5. SMTP, IMAP, POP3: Intentional implementation from Proton (Link). Kudos to forwardemail if they support all 3. Interesting thing to note is that both Proton and forwardemail provide SMTP and other protocols only in the paid plan. (Link). I also don’t see any source for their claim of vendor lock-in, since the Proton bridge is open source.
  6. API: Nice feature forwardemail has, but apparantly proton does not. Would be great to see audited reports of API security and its implementation.
  7. E2EE: Insane quote of protonmail “rewriting your email”. Is data corruption and misidentification of protocol used so malicious as to be deemed “rewriting”? The issue is simply Proton intentionally not implementing a feature of being able to use PGP keys not yet registered as a contact on mail service itself. It is a very opinionated choice, and one that people can dispute. But it is NOT, in any sense of the word, rewriting. I would recommend everyone actually read the linked Github issues (Link 1, Link 2). E2EE not being implemented would destroy Proton’s reputation and is a serious allegation. And anyways, we should move away from individually signing PGP keys and focus on automated implementations like Proton does.
  8. OpenPGP and WKD: No issues.

Analysis of their footer
They ask you to review them on Trustpilot. Let’s explore that. (Link)

They have 55 reviews on Trustpilot. Oldest review is from 16th Jan 2023, while the service has been active from 2017 apparently. Most of the 5 star reviews are from people with only 1 review and sound similar in structure. Most of the 1 stars have a comment underneath disputing them and calling the people who reviewed them liars. Seems very interesting.

They seem to have same problems as Proton Mail does on Trustpilot: Reviews by people who were banned. But the difference in proportion of reviews is simply due to the fact that protonmail has a free tier with their own address, while forwardemail does not.

Disclaimer: Trustpilot is known for fake reviews, deleting reviews, and blackmailing companies if they don’t pay them

For note, what Tuta does is how you do a comparison in good faith while still showing how your product is better (Link). I do not like how Protonmail does this comparison either, but they at least don’t have intentional misreads of competition’s features. (Link)

5 Likes

Regarding Hardenize/CSP, we have a clear disclaimer that states that all boxes must be green in order to be considered passing (as you mentioned).

We recently obtained access to the Hardenize/Redsift API so that we can programmatically automate these badges/updates. We’re waiting on answers to a few questions before we can automate the badges/results (and could even accurately share then in an automated way which tests are red/green/greyed out, e.g. CSP) so as to better reflect the comparisons.

If there is better verbiage for the E2EE comparisons, or anything else, we are more than glad to accept a pull request. Please submit your pull requests by going to config/alternatives.js in our GitHub repo. For example, here is a link to where we list Proton Mail data/text https://github.com/forwardemail/forwardemail.net/blob/0e8939c5590fd3b9c87d9d54ba854fb47631ce1b/config/alternatives.js#L1582. We are more than happy to make edits.

Yes we’ve had quite a few users post false content on Trust Pilot. For example, there’s one user that claims we don’t list an email address or any way to reach us for help on our site… when in fact there’s clearly links to Help section, FAQ, and our email address (as well as GPG key for our email). Trust Pilot refused to take this down, even though we showed them screenshots. So it’s a constant battle there, but we do our best.

Can we verify at any given time that your server is running your open source code? Or is it just marketing material?

2 Likes

Other providers support end to end encryption though open source and audited client apps. With the encryption taking place within these apps. Not on the server.

What you seem to be referring to is how they handle unencrypted mail. But the same applies to you. With no way of verifying what code is actually running on your servers how can someone know that you can’t read their email either?

Please read the thread above, this has been answered in https://discuss.privacyguides.net/t/forward-email-email-provider/13370/201, https://discuss.privacyguides.net/t/forward-email-email-provider/13370/167, and https://forwardemail.net/en/blog/docs/best-security-audit-companies. We plan to allow the third party auditor to have access to our infrastructure, to verify our claims, and to publicly acknowledge this in a published writeup/report.

2 Likes

:tada: We’re rolling out a new feature today which makes it easy to provision existing aliases on macOS/iOS/Android – a new button “Get QR Code” which is similar to the “Generate Password” modal (as previously shown above), but allows you to get the QR code on the fly for provisioning your Apple or Android device.

Screenshots:

1 Like

This doesn’t add to the discussion, but I’m eager to start using Forwardemail once your team rolls out crypto payments, I truly love the transparency and straightforwardness you’ve displayed here, it’s incredibly rare for email providers to be this open :heart:

3 Likes

:tada: You can now send mass email newsletters/announcements with Forward Email :rocket:

tldr; You can now send marketing email through our SMTP servers – which means you can send mass announcements and newsletters to a list of your opt-in contacts/subscribers. We previously only supported sending transactional emails.

What does this mean?

We’re now an open-source alternative to MailChimp, Brevo, and Klaviyo (albeit we require you to use something like ListMonk right now – see below) – but we also support IMAP, POP3, SMTP, CalDAV, API, webhooks, and much more – so we’re also an alternative to Gmail/Proton Mail/Sendgrid too!

Our vision is to be the all-in-one, enterprise-grade, open-source + privacy-focused email & security infrastructure platform — and always in alignment with our principles.

How do I send marketing email?

Just ensure you have proper opt-in and opt-out behavior – and include a List-Unsubscribe header as per our updated Terms disclaimer.

We highly recommend to use the open-source newsletter manager ListMonk https://listmonk.app/ (GitHub: https://github.com/knadh/listmonk) until we release our own newsletter/campaign manager system.

We’re submitting a new pull request to ListMonk hopefully later today (follow this issue for updates) to add us as a built-in provider – but it already supports a custom SMTP server configuration (e.g. you could just use smtp.forwardemail.net and one of your alias’ generated passwords or a domain-wide catch-all password – see the screenshot below).

Screenshot:

You can also programmatically use our API to send a marketing email, just ensure that you have set a List-Unsubscribe and List-ID header in the headers object – and properly setup a bounce webhook endpoint on your server to maintain your list (see below).

Do you support bounce webhooks?

Yes, we now allow you to specify a “Bounce Webhook” in My Account → Domains → Settings for any of your domains. This should be a valid http:// or https:// URL.

Screenshot:

To verify the webhook is from us, you can test that POST requests are submitted from one of our IP addresses and/or use SHA256 hash comparison with the payload body and our standard X-Webhook-Signature header (e.g. see this StackOverflow post) in combination with your domain’s webhook key.

Our SMTP servers will automatically submit a POST request to the webhook endpoint you specify with detailed information on the bounce (e.g. so you can perform an opt-out, etc).

If you want to learn more about bounce webhooks, see what the JSON payload looks like that gets POST’ed to your endpoint, and what kind of bounce information is available – then head over to our new FAQ section: Do you support bounce webhooks?


Commit: https://github.com/forwardemail/forwardemail.net/commit/c7101a33cc54513d2036e0c5a69f9557fb929157

2 Likes

Maybe not totally related to the topic, but is there a plan to implement family plans and higher storage capacities? 10 GB is very low.

Also for your comparison chart, please remove Skiff. For M365, yes they don‘t have unlimited domain support but their limit is 5000 per tenant. That might qualify as unlimited in theory :slight_smile: For aliases they have 400 aliases. High number but not unlimited. At least it is much better than many others. Microsoft doesn‘t support PGP/MIME but they support SMIME and PGP/Inline. As for API they support it.

Additional storage can be purchased as advertised on our website (+$3/mo per additional 10 GB storage).

We’re not going to do this because of SEO. Instead we added a disclaimer on it already that it’s shutdown.

If you have changes/edits for M365, please submit a pull request on GitHub as noted above in the config/alternatives.js file. Thanks!