Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption

  • OpenPGP and S/MIME are the two major standards for email end-to-end encryption. We show practical attacks against both encryption schemes in the context of email. First, we present a design flaw in the key update mechanism, allowing a third party to deploy a new key to the communication partners. Second, we show how email clients can be tricked into acting as an oracle for decryption or signing by exploiting their functionality to auto-save drafts. Third, we demonstrate how to exfiltrate the private key, based on proprietary mailto parameters implemented by various email clients. An evaluation shows that 8 out of 20 tested email clients are vulnerable to at least one attack. While our attacks do not target the underlying cryptographic primitives, they raise concerns about the practical security of OpenPGP and S/MIME email applications. Finally, we propose countermeasures and discuss their advantages and disadvantages.

Export metadata

Additional Services

Share in Twitter
Metadaten
Author:Jens Müller, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk
DOI:https://doi.org/10.1109/CNS48642.2020.9162218
Parent Title (German):2020 IEEE Conference on Communications and Network Security (CNS)
Document Type:Article in Conference Proceedings
Language:German
Date of Publication (online):2020/08/13
Year of first Publication:2020
Publishing Institution:FH Münster - University of Applied Sciences
Release Date:2020/08/14
Tag:Cyber Security; PGP; S/MIME
First Page:1
Last Page:9
Institutes:Elektrotechnik und Informatik (ETI)
Publication list:Schinzel, Sebastian
Licence (German):License Logo Bibliographische Daten