Re: [openpgp] Spoofing OpenPGP and S/MIME Signatures in Emails

Marcus Brinkmann <marcus.brinkmann@ruhr-uni-bochum.de> Sat, 04 May 2019 19:49 UTC

Return-Path: <marcus.brinkmann@ruhr-uni-bochum.de>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DAD5120325 for <openpgp@ietfa.amsl.com>; Sat, 4 May 2019 12:49:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.3
X-Spam-Level:
X-Spam-Status: No, score=-4.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ruhr-uni-bochum.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iCTIGHhCU3kX for <openpgp@ietfa.amsl.com>; Sat, 4 May 2019 12:49:01 -0700 (PDT)
Received: from out3.mail.ruhr-uni-bochum.de (out3.mail.ruhr-uni-bochum.de [IPv6:2a05:3e00:8:1001::8693:359b]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B94BE12002F for <openpgp@ietf.org>; Sat, 4 May 2019 12:49:01 -0700 (PDT)
Received: from mx3.mail.ruhr-uni-bochum.de (localhost [127.0.0.1]) by out3.mail.ruhr-uni-bochum.de (Postfix mo-ext) with ESMTP id 44xKLx2FFCz8SF3 for <openpgp@ietf.org>; Sat, 4 May 2019 21:48:57 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ruhr-uni-bochum.de; s=mail-2017; t=1556999337; bh=rBmd/Lajsej0xilCaaMsd4BGcYgkCCZq94R7Id2EBSw=; h=Subject:To:References:From:Date:In-Reply-To:From; b=DPbcCg7iX0HuhU+ldPjdnLEJAbIDwoJrErA1H/0u65InfzyVFD61D1f+fKfLql5M6 p/L28PcOpQoWFx3ut0I1CnBNDD0gTZKeBXvGa+CGcrOzHBXT59v1TVwuwKYzHk6yXJ rdBEF95fNnmJR6WqZjCgr33O5RLn70g1DvlCkUJw=
Received: from out3.mail.ruhr-uni-bochum.de (localhost [127.0.0.1]) by mx3.mail.ruhr-uni-bochum.de (Postfix idis) with ESMTP id 44xKLx0p5Vz8SCK for <openpgp@ietf.org>; Sat, 4 May 2019 21:48:57 +0200 (CEST)
X-Envelope-Sender: <marcus.brinkmann@ruhr-uni-bochum.de>
X-RUB-Notes: Internal origin=IPv6:2a05:3e00:c:1001:5054:ff:fe37:b9e4
Received: from mail1.mail.ruhr-uni-bochum.de (mail1.mail.ruhr-uni-bochum.de [IPv6:2a05:3e00:c:1001:5054:ff:fe37:b9e4]) by out3.mail.ruhr-uni-bochum.de (Postfix mi-int) with ESMTP id 44xKLw5PHkz8SCW for <openpgp@ietf.org>; Sat, 4 May 2019 21:48:56 +0200 (CEST)
X-Virus-Status: Clean
X-Virus-Scanned: clamav-milter 0.100.2 at mx3.mail.ruhr-uni-bochum.de
Received: from [192.168.142.139] (p5B049F18.dip0.t-ipconnect.de [91.4.159.24]) by mail1.mail.ruhr-uni-bochum.de (Postfix) with ESMTPSA id 44xKLw5HWqzyvZ for <openpgp@ietf.org>; Sat, 4 May 2019 21:48:56 +0200 (CEST)
To: openpgp@ietf.org
References: <C2WACNF3.MOCHGZ6J.7IZQNCE5@MLE345G6.3RBRPUGZ.GY2PV6G2>
From: Marcus Brinkmann <marcus.brinkmann@ruhr-uni-bochum.de>
Openpgp: preference=signencrypt
Message-ID: <4824e694-ec28-29fb-75a4-3ad4f8efe2b5@ruhr-uni-bochum.de>
Date: Sat, 04 May 2019 21:48:56 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.5.1
MIME-Version: 1.0
In-Reply-To: <C2WACNF3.MOCHGZ6J.7IZQNCE5@MLE345G6.3RBRPUGZ.GY2PV6G2>
Content-Type: text/plain; charset="windows-1252"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-Virus-Scanned: clamav-milter 0.99.4 at mail1.mail.ruhr-uni-bochum.de
X-Virus-Status: Clean
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/uSSw9jY-wXo_hk9Af-fpro91DVM>
Subject: Re: [openpgp] Spoofing OpenPGP and S/MIME Signatures in Emails
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 May 2019 19:49:04 -0000

Yes, GPGME does not conflate the status and logging output stream, and
thus is not vulnerable to this attack.

On 5/4/19 1:08 PM, Albrecht Dreß wrote:
> Hi,
> 
> thanks a lot for your great work!
> 
> Just an additional question regarding the “GPG Api” attacks – can we
> assume that all applications using gpgme (like Balsa,
> <https://pawsa.fedorapeople.org/balsa/>) to talk to gpg are not
> vulnerable regarding this attack class, as the lib handles cases G1 and
> G2 properly?
> 
> Thanks,
> Albrecht.
> 
> On 30.04.19 14:29, ilf wrote:
>> https://github.com/RUB-NDS/Johnny-You-Are-Fired
>> https://raw.githubusercontent.com/RUB-NDS/Johnny-You-Are-Fired/master/paper/johnny-fired.pdf
> 
> _______________________________________________
> openpgp mailing list
> openpgp@ietf.org
> https://www.ietf.org/mailman/listinfo/openpgp
> 

-- 
Dipl.-Math. Marcus Brinkmann

Lehrstuhl für Netz- und Datensicherheit
Ruhr Universität Bochum
Universitätsstr. 150, Geb. ID 2/461
D-44780 Bochum

Telefon: +49 (0) 234 / 32-25030
http://www.nds.rub.de/chair/people/mbrinkmann