pgpfan:ledowngrade
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| pgpfan:ledowngrade [2025/10/31 19:37] – [The CCA2 Insecurity Claim] Better. b.walzer | pgpfan:ledowngrade [2025/12/10 16:27] (current) – [Stacked Vulnerabilities] Bad wording, spelling b.walzer | ||
|---|---|---|---|
| Line 71: | Line 71: | ||
| As has been pointed out(([[https:// | As has been pointed out(([[https:// | ||
| - | The vulnerabilties | + | The vulnerabilities |
| That is literally what is happening here. The attack from the paper requires that the user or the user's client receive a message, decrypt it and then send it back to the attacker. For this case there is no point in worrying about the second vulnerability before resolving the first. Once you have resolved the first then the second goes away. All that cool stuff about using an decryption function as a encryption function never has a chance to be meaningful. So it seems that there is no attack here against the LibrePGP OCB mode that could ever be considered significant in some way. | That is literally what is happening here. The attack from the paper requires that the user or the user's client receive a message, decrypt it and then send it back to the attacker. For this case there is no point in worrying about the second vulnerability before resolving the first. Once you have resolved the first then the second goes away. All that cool stuff about using an decryption function as a encryption function never has a chance to be meaningful. So it seems that there is no attack here against the LibrePGP OCB mode that could ever be considered significant in some way. | ||
| Line 81: | Line 81: | ||
| > However, note that conducting this attack against LibrePGP-based email encryption is not realistic, since an email client that is vulnerable against our attacks would also expose the vulnerability of SEIPD packets being downgradeable to SED Packets, which was exploited in the Efail attack (([[https:// | > However, note that conducting this attack against LibrePGP-based email encryption is not realistic, since an email client that is vulnerable against our attacks would also expose the vulnerability of SEIPD packets being downgradeable to SED Packets, which was exploited in the Efail attack (([[https:// | ||
| - | This states that a " | + | This states that a " |
| This in turn triggered the second peeve. The paper' | This in turn triggered the second peeve. The paper' | ||
| Line 92: | Line 92: | ||
| - unauthenticated, | - unauthenticated, | ||
| - | At this point in time, use of the SEIPD mode is fairly ubiquitous. So seeing the SED mode is a bit odd in any case. The SEIPD mode was specifically created to provide an integrity check for unauthenticated (unsigned, anonymous) messages. So it is very suspicious to see a unauthenticated SED mode encrypted message. Rather than any unwarranted concern about messages modified from SEIPD to SED, a client should instead deal with the unauthenticated SED encrypted messages critical to this attack simply on the basis of suspicion. Any unauthenticated but encrypted email messages should be noted as suspicious. The forwarding of such messages should be done with the greatest care or even prevented entirely. The opening of any attachments from such messages should be discouraged or prevented. The suspicious message should not be passed along to a complex decoder such as a generic HTML interpreter. | + | At this point in time, use of the SEIPD mode is fairly ubiquitous. So seeing the SED mode is a bit odd in any case. The SEIPD mode was specifically created to provide an integrity check for unauthenticated (unsigned, anonymous) messages. So it is very suspicious to see a unauthenticated SED mode encrypted message. Rather than any unwarranted concern about messages modified from SEIPD to SED, a client should instead deal with the unauthenticated SED encrypted messages critical to this attack simply on the basis of suspicion. Any unauthenticated but encrypted email messages should be noted as suspicious. |
| + | |||
| + | The forwarding of suspicious | ||
| ... Or less complicated, | ... Or less complicated, | ||
| Line 107: | Line 109: | ||
| =====An Unwarranted Claim Against SEIPD (OCFB-MDC)===== | =====An Unwarranted Claim Against SEIPD (OCFB-MDC)===== | ||
| + | |||
| + | //Much of the following section is no longer relevant as the paper has been updated to address the issue identified here.// | ||
| In Reference A (Insecurity of OpenPGP SEIPD packets under adaptively chosen ciphertext attacks) the paper states: | In Reference A (Insecurity of OpenPGP SEIPD packets under adaptively chosen ciphertext attacks) the paper states: | ||
| Line 122: | Line 126: | ||
| '' | '' | ||
| - | I don't get any great amount of credit for spotting this. That is because I know that this exact same misunderstanding has happened before. When the security of the SEIPD encryption mode was being evaluated it turned out that the specification omitted the MAC key. So there was more discussion about the attack engendered by this omission than there might have been otherwise(([[https:// | + | I don't get any great amount of credit for spotting this. That is because I know that this exact same misunderstanding has happened before. When the security of the SEIPD encryption mode was being evaluated it turned out that the specification omitted the MAC key. So there was more discussion about the attack engendered by this omission than there might have been otherwise(([[https:// |
| A definite statement is required here: this paper does not show that the SEIPD encryption mode does not achieve CCA2 security((I was able to inform one of the authors about the error via an email exchange.)). | A definite statement is required here: this paper does not show that the SEIPD encryption mode does not achieve CCA2 security((I was able to inform one of the authors about the error via an email exchange.)). | ||
pgpfan/ledowngrade.1761939438.txt.gz · Last modified: by b.walzer
