LWN: Comments on "Serious vulnerabilities with OpenPGP and S/MIME" https://lwn.net/Articles/754370/ This is a special feed containing comments posted to the individual LWN article titled "Serious vulnerabilities with OpenPGP and S/MIME". en-us Sat, 04 Oct 2025 03:48:06 +0000 Sat, 04 Oct 2025 03:48:06 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net HTML mail https://lwn.net/Articles/755387/ https://lwn.net/Articles/755387/ wookey <div class="FormattedComment"> I get a reasonable amount of encrypted mail, yes. Probably almost none of that is multipart-HTML though. That is an unusual combination.<br> </div> Wed, 23 May 2018 14:57:16 +0000 Gpg4win statement https://lwn.net/Articles/754824/ https://lwn.net/Articles/754824/ ber The Gpg4win Team (which I am a part of) has prepared a statement about the research findings and the related media coverage: <a href="https://www.gpg4win.de/statement-efail.html">gpg4win.de/statement-efail.html</a> Fri, 18 May 2018 07:46:55 +0000 good advice https://lwn.net/Articles/754816/ https://lwn.net/Articles/754816/ johnjones <div class="FormattedComment"> "So in summary, mail clients could do this:<br> - If the email is encrypted but unsigned, don't decrypt the email and warn the user<br> - If the email is encrypted and the signature doesn't validate, don't decrypt the email and warn the user<br> - If the address of the signature is different from the From: field in the email header, don't decrypt the email and warn the user<br> - (paranoid level 11) if the address in the From: field is very similar to an address that you have already Trusted on First Use, then don't decrypt the email and warn the user."<br> <p> yes agree completely <br> </div> Fri, 18 May 2018 02:05:34 +0000 HTML mail https://lwn.net/Articles/754465/ https://lwn.net/Articles/754465/ dskoll <div class="FormattedComment"> Yes, I was wondering that myself. The HTML trick should never have worked.<br> </div> Tue, 15 May 2018 12:31:54 +0000 HTML mail https://lwn.net/Articles/754459/ https://lwn.net/Articles/754459/ pabs <div class="FormattedComment"> <font class="QuotedText">&gt; Plain text has none of these problems.</font><br> <p> I wouldn't be so sure about that, it completely depends on what rendering technology is used and if it is being used correctly. ISTR some X.509 vulnerability in a browser because they used Qt rich-text controls instead of plain-text ones.<br> </div> Tue, 15 May 2018 01:14:18 +0000 HTML mail https://lwn.net/Articles/754452/ https://lwn.net/Articles/754452/ k8to <div class="FormattedComment"> We're now at the point where I regularly get mails that are completely broken in their text components. http links with layered encoding errors while malforming the text part of the message.<br> <p> It's really sad how companies whose entire business is based around sending emails can't be bothered to get their emails intact. These days I'm frequently forced to resort to manually parsing bits of html out of the raw bytes of the html part of the email to do my job without exposing myself to risks.<br> <p> I'm doubtful most people would be able to do this even if they understood the risks.<br> </div> Mon, 14 May 2018 22:39:04 +0000 HTML mail https://lwn.net/Articles/754451/ https://lwn.net/Articles/754451/ pboddie <div class="FormattedComment"> Maybe I missed something, but in the "direct exfiltration" attack, the mail client apparently needs to effectively glue the parts together to display them as a single HTML document. Why would any mail client actually do this? Each part is, after all, a separate document. You wouldn't take three image parts and merge them, so what would be different here?<br> </div> Mon, 14 May 2018 22:17:42 +0000 HTML mail https://lwn.net/Articles/754434/ https://lwn.net/Articles/754434/ excors <p>I like the note in <a href="https://arstechnica.com/information-technology/2017/09/in-spectacular-fail-adobe-security-team-posts-private-pgp-key-on-blog/">this article</a> where they sent a PGP-encrypted message to Phil Zimmermann, creator of PGP, who replied: "I cannot decrypt this on my iphone. Please send this to me again, as plaintext."</p> <p>Still, I guess there are bound to be some people willing to jump through the necessary hoops to use PGP for email properly, and perhaps some of them do so because they actually need the security rather than just because they enjoy being awkward, and this vulnerability would matter to them.</p> Mon, 14 May 2018 18:17:11 +0000 HTML mail https://lwn.net/Articles/754431/ https://lwn.net/Articles/754431/ pbonzini <div class="FormattedComment"> I have received vulnerability disclosures via PGP encrypted email every now and then.<br> </div> Mon, 14 May 2018 17:35:15 +0000 HTML mail https://lwn.net/Articles/754401/ https://lwn.net/Articles/754401/ hkario <div class="FormattedComment"> one of the reasons why I like kmail so much, not only I can configure it to show text mode messages by default, even if I click it to show me the HTML version, it will not load remote resources by default<br> <p> (it may be the configuration I'm running, but just having that option is really nice)<br> </div> Mon, 14 May 2018 15:00:03 +0000 HTML mail https://lwn.net/Articles/754399/ https://lwn.net/Articles/754399/ flussence <div class="FormattedComment"> Does anyone use encrypted email regularly enough for this to be a threat? I'd have thought the amount of cleartext metadata being sprayed everywhere would render it a pointless endeavour nowadays.<br> </div> Mon, 14 May 2018 14:40:32 +0000 Serious vulnerabilities with OpenPGP and S/MIME https://lwn.net/Articles/754388/ https://lwn.net/Articles/754388/ mricon <div class="FormattedComment"> EFF is recommending that people stop using PGP and switch to Signal, completely ignoring the fact that:<br> <p> 1. The problem is in email tooling, not PGP or GnuPG's implementation.<br> 2. Signal had a Remote Code Execution bug in its desktop client literally just last week (CVE-2018-1000136), so it's not like it's magically immune from tooling problems.<br> <p> I'm not here to dump on Signal -- I use it daily, and it's well-done client with acceptable usability-vs-security trade-offs. However, PGP and Signal do not share the exact same niche -- PGP is fully decentralized and doesn't require any available networking nodes (i.e. you can exchange PGP-encrypted messages via homing pigeons), whereas Signal (the messenger client, not the protocol) must be able to contact its network of relays for any two parties to communicate. <br> <p> Anyway, I would say PGP is mostly used for code signing, not for encrypted communication -- simply because key management is one of those Hard Problems and doing it in a way that is both secure AND usable is proving to be near-impossible to get right.<br> <p> <p> </div> Mon, 14 May 2018 14:26:55 +0000 Serious vulnerabilities with OpenPGP and S/MIME https://lwn.net/Articles/754391/ https://lwn.net/Articles/754391/ karkhaz <div class="FormattedComment"> My initial thought on how to mitigate this entire class of attacks in the future was: if the email is encrypted but unsigned, or if the signature doesn't check out, then don't decrypt or display the email and warn the user. But the vulnerability FAQ states:<br> <p> "Will signatures prevent these attacks?<br> <p> No. PGP and S/MIME emails are displayed in the email program independently of whether or not they are signed or whether an existing signature is valid or not. Even if signatures did matter: an attacker can copy the altered ciphertext into a separate email and create a valid signature under his own name."<br> <p> Therefore in addition, we need mail clients to warn the user if the email is signed by somebody other than the person in the sender field. Even then, the user might not notice if they were expecting email from larry@gmail.com and received email whose From: and signature are both from larry@gmail.corn, since they look fairly similar.<br> <p> So in summary, mail clients could do this:<br> <p> - If the email is encrypted but unsigned, don't decrypt the email and warn the user<br> <p> - If the email is encrypted and the signature doesn't validate, don't decrypt the email and warn the user<br> <p> - If the address of the signature is different from the From: field in the email header, don't decrypt the email and warn the user<br> <p> - (paranoid level 11) if the address in the From: field is very similar to an address that you have already Trusted on First Use, then don't decrypt the email and warn the user.<br> </div> Mon, 14 May 2018 14:23:26 +0000 Serious vulnerabilities with OpenPGP and S/MIME https://lwn.net/Articles/754392/ https://lwn.net/Articles/754392/ cortana <p>https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060315.html <blockquote><p> [...] OpenPGP [...] started to use authenticated encryption (AE) since 2000 or 2001. Our AE is called MDC (Modification detection code) and was back then introduced for a very similar attack. Unfortunately some OpenPGP implementations were late to introduce MDC and thus GPG could not fail hard on receiving a mail without an MDC. However, an error is returned during decrypting and no MDC is used: </blockquote> Mon, 14 May 2018 14:14:48 +0000 Serious vulnerabilities with OpenPGP and S/MIME https://lwn.net/Articles/754393/ https://lwn.net/Articles/754393/ unixbhaskar <div class="FormattedComment"> This seems to be a mandatory stuff and I do " Some of us GPG-encrypt our backups". GPG/PGP become such an important cog in the wheel that our work most of the time depend on it. <br> </div> Mon, 14 May 2018 14:13:38 +0000 Serious vulnerabilities with OpenPGP and S/MIME https://lwn.net/Articles/754389/ https://lwn.net/Articles/754389/ Sesse <div class="FormattedComment"> It's a bit sad that OpenPGP still doesn't use authenticated encryption.<br> <p> Also: Please, when fixing this in the spec, it would also be nice to have a multicore-capable mode! Some of us GPG-encrypt our backups. :-)<br> </div> Mon, 14 May 2018 14:06:24 +0000 HTML mail https://lwn.net/Articles/754381/ https://lwn.net/Articles/754381/ smurf <div class="FormattedComment"> Exactly. Instead of de-installing auto-decrypt tools, simply turn off the HTML viewer and the auto-decrypt feature. Then, on any email you get, either view-as-HTML or decrypt, but *never* do both.<br> <p> Problem solved, at least until the underlying issues get fixed. It's not exactly rocket science to partition MIME parts so that the sort of boundary violation described here cannot happen in the first place.<br> </div> Mon, 14 May 2018 14:04:13 +0000 HTML mail https://lwn.net/Articles/754380/ https://lwn.net/Articles/754380/ epa <div class="FormattedComment"> Does anyone who takes security seriously bother with HTML mail to start with? Plain text has none of these problems.<br> </div> Mon, 14 May 2018 13:52:58 +0000 Serious vulnerabilities with OpenPGP and S/MIME https://lwn.net/Articles/754378/ https://lwn.net/Articles/754378/ andreicek <div class="FormattedComment"> Thanks for the clarification!<br> </div> Mon, 14 May 2018 13:27:31 +0000 Serious vulnerabilities with OpenPGP and S/MIME https://lwn.net/Articles/754376/ https://lwn.net/Articles/754376/ jonathon <div class="FormattedComment"> From the page:<br> <p> <font class="QuotedText">&gt; disable and/or uninstall tools that automatically decrypt PGP-encrypted email</font><br> <p> Disabling tools that "automatically decrypt" is not the same as "uninstalling email-encryption tools entirely".<br> <p> According to <a href="https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060315.html">https://lists.gnupg.org/pipermail/gnupg-users/2018-May/06...</a>, the vulnerability primarily involves HTML email automatically loading remote content.<br> </div> Mon, 14 May 2018 13:25:05 +0000 Serious vulnerabilities with OpenPGP and S/MIME https://lwn.net/Articles/754373/ https://lwn.net/Articles/754373/ andreicek <div class="FormattedComment"> For anyone reading it's enough to disable automatic decryption for now AFIK.<br> </div> Mon, 14 May 2018 13:12:04 +0000 Serious vulnerabilities with OpenPGP and S/MIME https://lwn.net/Articles/754371/ https://lwn.net/Articles/754371/ corsac <div class="FormattedComment"> Hi Jonathan,<br> <p> please *dont* realy the EFF recommandation, which doesn't make any sense. In the attack scenario published by the paper, the attacker already has access to the encrypted mails (either by way of MITM or because it has server access) and modifies the mails to force the client to disclose the plaintext to an attacker-controled server.<br> <p> If you follow the EFF recommandation and disable encryption, then the attacker has directly access to the plaintext and doesn't even need any attack.<br> <p> So please, can you drop that line from the article? It doesn't make any sense.<br> </div> Mon, 14 May 2018 13:10:00 +0000