topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Thursday March 28, 2024, 7:15 am
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Author Topic: eff says immediately disable or uninstall tools that auto decrypt PGP email  (Read 5797 times)

mouser

  • First Author
  • Administrator
  • Joined in 2005
  • *****
  • Posts: 40,896
    • View Profile
    • Mouser's Software Zone on DonationCoder.com
    • Read more about this member.
    • Donate to Member
Security warning: eff.org says that you need to immediately disable and/or uninstall tools that automatically decrypt PGP-encrypted email.

This looks pretty serious.  Although they are not saying what the flaw is yet, the key seems to be if you have a mail program that AUTOMATICALLY decrypts pgp encrypted emails, somehow that can be hijacked.

A group of European security researchers have released a warning about a set of vulnerabilities affecting users of PGP and S/MIME. EFF has been in communication with the research team, and can confirm that these vulnerabilities pose an immediate risk to those using these tools for email communication, including the potential exposure of the contents of past messages.

The full details will be published in a paper on Tuesday at 07:00 AM UTC (3:00 AM Eastern, midnight Pacific). In order to reduce the short-term risk, we and the researchers have agreed to warn the wider PGP user community in advance of its full publication.

Our advice, which mirrors that of the researchers, is to immediately disable and/or uninstall tools that automatically decrypt PGP-encrypted email. Until the flaws described in the paper are more widely understood and fixed, users should arrange for the use of alternative end-to-end secure channels, such as Signal, and temporarily stop sending and especially reading PGP-encrypted email.



from https://arstechnica....mails-uninstall-now/

Jibz

  • Developer
  • Joined in 2005
  • ***
  • Posts: 1,187
    • View Profile
    • Donate to Member
Information is now available at https://efail.de/

From a cursory glance, it seems the problem is in how some programs (email clients) handle image links embedded in html messages.

Basically, an attacker who has gotten hold of a message encrypted for you can send you an email with that encrypted message as part of a link to an image, and the email client will decrypt the encrypted part and then attempt to retrieve the image, effectively sending the plaintext to the attacker as part of the url.

mouser

  • First Author
  • Administrator
  • Joined in 2005
  • *****
  • Posts: 40,896
    • View Profile
    • Mouser's Software Zone on DonationCoder.com
    • Read more about this member.
    • Donate to Member
That's pretty clever.. But it seems to be not so big a risk to most people.
So first step, an attacker needs to get hold of an email encrypted TO you, that they want to be able to read.  Without that there is no harm they can do.

Shades

  • Member
  • Joined in 2006
  • **
  • Posts: 2,922
    • View Profile
    • Donate to Member
A simple workaround for those that need this functionality in their mail client: disable the (automatic) opening of mail messages with HTML content.

For those able to read the source of mail messages: copy-paste the content of the encrypted message to another piece of software that is not your mail client, but which is (rudimentary) able to process the encrypted content anyway.

Automatic opening/viewing of mail messages should be prohibited in practically every imaginable use case scenario anyway. Efail is just the latest example of this.