[trojita] [Bug 391667] EFAIL: leak of the plaintext of encrypted emails

2024-09-23 Thread Christoph Cullmann
https://bugs.kde.org/show_bug.cgi?id=391667

Christoph Cullmann  changed:

   What|Removed |Added

 Status|CONFIRMED   |RESOLVED
 Resolution|--- |UNMAINTAINED

--- Comment #8 from Christoph Cullmann  ---
Trojitá is no longer maintained, please switch to a maintained alternative like
https://apps.kde.org/kmail2/

Sorry for the inconveniences.

-- 
You are receiving this mail because:
You are watching all bug changes.

[trojita] [Bug 391667] EFAIL: leak of the plaintext of encrypted emails

2018-05-15 Thread Jan Kundrát
https://bugs.kde.org/show_bug.cgi?id=391667

Jan Kundrát  changed:

   What|Removed |Added

Summary|Security bug|EFAIL: leak of the
   ||plaintext of encrypted
   ||emails

--- Comment #7 from Jan Kundrát  ---
This appears to have gone public now. Technical details are available in the
paper [1]. Trojita is listed as vulnerable (page 20) for two classes of
exfiltration scenarios:

- I3: "CRL requests to a fixed CA URL are performed for valid/trusted S/MIME
signed emails"

- H3, which is about the DNS prefetch control: http://efail.de";>

The I3 is outside of control of Trojita. We are using the libgpgme library for
all crypto operations, including the CRL handling. We do not issue any
cert/CRL/key/... requests directly. Once gpgme is fixed, Trojita will be fixed,
too.

The H3 has been reported in bug 390452, and that's upstream
https://bugreports.qt.io/browse/QTBUG-67068 . Our code has always included
explicit disabling of the DNS prefetch for QtWebKit; unfortunately, due to a
bug in upstream qtwebkit, this does not take any effect. We *could* try to
mitigate the problem by mangling the HTML code, trying to insert an explicit
 element which disables this DNS prefetch. However, these attempts tend
to be error-prone because there are many ways on how to re-enable various
features in HTML renderers.

There are other attacks as well. The user is still presented with a button to
enable remote content when displaying encrypted e-mails. That should probably
be disabled in order to make sure that the plaintext content won't leak by
accident.

[1] https://efail.de/efail-attack-paper.pdf

-- 
You are receiving this mail because:
You are watching all bug changes.