https://bugs.kde.org/show_bug.cgi?id=391667
Jan Kundrát changed:
What|Removed |Added
Summary|Security bug|EFAIL: leak of the
||plaintext of encrypted
||emails
--- Comment #7 from Jan Kundrát ---
This appears to have gone public now. Technical details are available in the
paper [1]. Trojita is listed as vulnerable (page 20) for two classes of
exfiltration scenarios:
- I3: "CRL requests to a fixed CA URL are performed for valid/trusted S/MIME
signed emails"
- H3, which is about the DNS prefetch control: http://efail.de";>
The I3 is outside of control of Trojita. We are using the libgpgme library for
all crypto operations, including the CRL handling. We do not issue any
cert/CRL/key/... requests directly. Once gpgme is fixed, Trojita will be fixed,
too.
The H3 has been reported in bug 390452, and that's upstream
https://bugreports.qt.io/browse/QTBUG-67068 . Our code has always included
explicit disabling of the DNS prefetch for QtWebKit; unfortunately, due to a
bug in upstream qtwebkit, this does not take any effect. We *could* try to
mitigate the problem by mangling the HTML code, trying to insert an explicit
element which disables this DNS prefetch. However, these attempts tend
to be error-prone because there are many ways on how to re-enable various
features in HTML renderers.
There are other attacks as well. The user is still presented with a button to
enable remote content when displaying encrypted e-mails. That should probably
be disabled in order to make sure that the plaintext content won't leak by
accident.
[1] https://efail.de/efail-attack-paper.pdf
--
You are receiving this mail because:
You are watching all bug changes.