LBRY Block Explorer

LBRY Claims • efail-breaking-s-mime-and-openpgp-email

8f9af73312a4b91913844edbfe51bb2836381f72

Published By
Created On
2 Sep 2020 11:38:31 UTC
Transaction ID
Cost
Safe for Work
Free
Yes
Efail Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels
Black Hat USA 2018
OpenPGP and S/MIME are the two prime standards for providing end-to-end security for emails. From today's viewpoint this is surprising as both standards rely on outdated cryptographic primitives that were responsible for vulnerabilities in major cryptographic standards. The belief in email security is likely based on the fact that email is non-interactive and thus an attacker cannot directly exploit vulnerability types present in TLS, SSH, or IPsec.

We show that this assumption is wrong. We use a novel attack technique called malleability gadgets to inject malicious plaintext snippets into encrypted emails via malleable encryption. These snippets abuse existing and standard-conforming backchannels, for example, in HTML, CSS, or x509 functionality, to exfiltrate the full plaintext after decryption. The attack is triggered when the victim decrypts a single maliciously crafted email from the attacker.

We devise working malleability gadgets for both OpenPGP and S/MIME encryption, and show that exfiltration channels exist for 25 of the 35 tested S/MIME email clients and 10 of the 28 tested OpenPGP email clients. While it is necessary to change the OpenPGP and S/MIME standards to fix these vulnerabilities, some clients had even more severe implementation flaws allowing straightforward exfiltration of the plaintext.
...
https://www.youtube.com/watch?v=uXfxkpgRz4w
Author
Content Type
Unspecified
video/mp4
Language
Unspecified
Open in LBRY

More from the publisher

Controlling
VIDEO
DEF C
Controlling
VIDEO
BEATI
Controlling
VIDEO
DEF C
Controlling
VIDEO
BLACK
Controlling
VIDEO
32C3
Controlling
VIDEO
DEF C
Controlling
VIDEO
DEF C
Controlling
VIDEO
32C3
Controlling
VIDEO
DEF C