danger of decrypted files without integrity protection

Steffen Nurpmeso steffen at sdaoden.eu
Thu May 17 20:51:52 CEST 2018


Greg Troxel <gdt at lexort.com> wrote:
 |Bernhard Reiter <bernhard at intevation.de> writes:
 |> Am Donnerstag 17 Mai 2018 15:05:35 schrieb Greg Troxel:
 |>> In your example, you asked a browser to render html, which has different
 |>> norms than rendering incoming (and hence not requested by the user)
 |>> email.  Even a relatively paranoid browser with uMatrix will render
 |>> images from different origins.
 |>
 |> It is a detail to the questions:
 |>  * is decrypting an email manually outside of a mailer safe? 
 |>    -> no - for files that potentially will call home on opening
 |
 |Decrypting is not the problem.  The problem is evaluating the file
 |either with a program that interprets it and does unsafe things, or that
 |is exploitable (e.g. because it is buggy, perhaps because the format is
 |too complicated).  All of these issues are also present with handling
 |files that were not recently decrypted.

Not being able to detect that injections happened because
decrypting silently succeeds because of missing i.-p. is the
problem on the S/MIME side (isn't it).

--steffen
|
|Der Kragenbaer,                The moon bear,
|der holt sich munter           he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)



More information about the Gnupg-devel mailing list