The Call of the Open Sidewalk

From a place slightly to the side of the more popular path

User Tools

Site Tools


pgpfan:efail

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
pgpfan:efail [2021/07/01 18:50] – I partially reproduced it, understand fundamental issue more b.walzerpgpfan:efail [2022/05/16 19:46] – No one cares about my opinions of media. b.walzer
Line 5: Line 5:
   * [[https://www.wired.co.uk/article/efail-pgp-vulnerability-outlook-thunderbird-smime|We're calling it: PGP is dead]]   * [[https://www.wired.co.uk/article/efail-pgp-vulnerability-outlook-thunderbird-smime|We're calling it: PGP is dead]]
  
-The word "Hoax" in the title of this article refers to the attempts to make it seem that EFAIL represented some deficiency in PGP. That was simply not true.+To be completely clear... The word "Hoax" in the title of this article refers exclusively to the media attempts to make it seem that EFAIL represented some deficiency in PGP. It also can be considered a satire of needlessly provocative headlines. EFAIL represents real issues. They were just misrepresented.
  
 EFAIL was a list of different ways to cause inherently insecure message content (HTML email) to leak decrypted messages. Such data leakage was a known issue and was under routine exploitation at the time. This fact alone should be enough to convince most people EFAIL had nothing to do with either PGP (or S/MIME). When you have a hole big enough to drive a truck through there is no extra value in discussing the size and shape of the truck. Unfortunately in the case of EFAIL we need to spend time discussing truck dimensions. EFAIL was a list of different ways to cause inherently insecure message content (HTML email) to leak decrypted messages. Such data leakage was a known issue and was under routine exploitation at the time. This fact alone should be enough to convince most people EFAIL had nothing to do with either PGP (or S/MIME). When you have a hole big enough to drive a truck through there is no extra value in discussing the size and shape of the truck. Unfortunately in the case of EFAIL we need to spend time discussing truck dimensions.
Line 23: Line 23:
 A more fundamental problem with all this is that when used for messaging, PGP uses a combined identity/integrity check in the form of a cryptgraphic signature. In PGP messaging both the MDC and hypothetical authenticated encryption are less important compared to the question of allowing the handling of anonymous (invalid or missing signature) messages in a very insecure way. So this ends up being a kind of a straw man. This would of been much better if it was discussed in terms of how PGP actually works and how these vulnerabilities affect the clients in that context. A more fundamental problem with all this is that when used for messaging, PGP uses a combined identity/integrity check in the form of a cryptgraphic signature. In PGP messaging both the MDC and hypothetical authenticated encryption are less important compared to the question of allowing the handling of anonymous (invalid or missing signature) messages in a very insecure way. So this ends up being a kind of a straw man. This would of been much better if it was discussed in terms of how PGP actually works and how these vulnerabilities affect the clients in that context.
  
-The OpenPGP standard and implementations of that standard have suffered from security weaknesses of greater significance than EFAIL with no media coverage at all. That is why the media blowup over EFAIL is so odd. I have a theory... +The OpenPGP standard and implementations of that standard have suffered from security weaknesses of greater significance than EFAIL with no media coverage at all. That is why the media blowup over EFAIL is so odd. I have no idea why this ended up so wrongWhat ever the reasons, this serves as yet another indication of the poor quality of the technical press.
- +
-Encryption "at rest" is pretty much a solved problem for the sorts of things OpenPGP does. That is why the OpenPGP standard is so stable over the yearsAs a result there is not very much academic interest in such problems any more. +
- +
-The excitement these days is mostly centred on the issues of "in flight" encryption. Protecting information on the network while it is being transferred. In flight encryption is anything but a solved problem. If experts were consulted it is very possible that those experts did not care very much about the properties of at rest encryption and would of talked about the much more interesting implications of something like the EFAIL CFB gadget attack for in flight encryption. Those implications would be fairly dire. +
- +
-So this all might just be another example of the problems caused by insufficient research on the part of the technical press...+
  
 [[pgpfan:index|PGP FAN index]] [[pgpfan:index|PGP FAN index]]
  
pgpfan/efail.txt · Last modified: 2022/05/16 21:17 by b.walzer