Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption
- OpenPGP and S/MIME are the two major standards for email end-to-end encryption. We show practical attacks against both encryption schemes in the context of email. First, we present a design flaw in the key update mechanism, allowing a third party to deploy a new key to the communication partners. Second, we show how email clients can be tricked into acting as an oracle for decryption or signing by exploiting their functionality to auto-save drafts. Third, we demonstrate how to exfiltrate the private key, based on proprietary mailto parameters implemented by various email clients. An evaluation shows that 8 out of 20 tested email clients are vulnerable to at least one attack. While our attacks do not target the underlying cryptographic primitives, they raise concerns about the practical security of OpenPGP and S/MIME email applications. Finally, we propose countermeasures and discuss their advantages and disadvantages.
Author: | Jens Müller, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk |
---|---|
DOI: | https://doi.org/10.1109/CNS48642.2020.9162218 |
Parent Title (German): | 2020 IEEE Conference on Communications and Network Security (CNS) |
Document Type: | Conference Proceeding |
Language: | German |
Date of Publication (online): | 2020/08/13 |
Year of first Publication: | 2020 |
Provider of the Publication Server: | FH Münster - University of Applied Sciences |
Release Date: | 2020/08/14 |
Tag: | Cyber Security; PGP; S/MIME |
First Page: | 1 |
Last Page: | 9 |
Faculties: | Elektrotechnik und Informatik (ETI) |
Publication list: | Schinzel, Sebastian |
Licence (German): | Bibliographische Daten |