https://bugs.kde.org/show_bug.cgi?id=391667
Jan Kundrát <j...@kde.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Summary|Security bug |EFAIL: leak of the | |plaintext of encrypted | |emails --- Comment #7 from Jan Kundrát <j...@kde.org> --- This appears to have gone public now. Technical details are available in the paper [1]. Trojita is listed as vulnerable (page 20) for two classes of exfiltration scenarios: - I3: "CRL requests to a fixed CA URL are performed for valid/trusted S/MIME signed emails" - H3, which is about the DNS prefetch control: <meta http-equiv="x-dns-prefetch-control" content="on"><a href="http://efail.de"></a> The I3 is outside of control of Trojita. We are using the libgpgme library for all crypto operations, including the CRL handling. We do not issue any cert/CRL/key/... requests directly. Once gpgme is fixed, Trojita will be fixed, too. The H3 has been reported in bug 390452, and that's upstream https://bugreports.qt.io/browse/QTBUG-67068 . Our code has always included explicit disabling of the DNS prefetch for QtWebKit; unfortunately, due to a bug in upstream qtwebkit, this does not take any effect. We *could* try to mitigate the problem by mangling the HTML code, trying to insert an explicit <meta> element which disables this DNS prefetch. However, these attempts tend to be error-prone because there are many ways on how to re-enable various features in HTML renderers. There are other attacks as well. The user is still presented with a button to enable remote content when displaying encrypted e-mails. That should probably be disabled in order to make sure that the plaintext content won't leak by accident. [1] https://efail.de/efail-attack-paper.pdf -- You are receiving this mail because: You are watching all bug changes.