One central problem of email e2ee is that neither MIME structure nor header fields are protected from modification. Attackers can send modified ciphertexts, can send ciphertexts with crafted MIME structures or can add or remove headers such as FROM, RCPT TO or SUBJECT at will.
This allows attacks such as those described in efail.de or in arxiv.org/abs/1904.07550. So far, the mail clients mostly implemented ad hoc countermeasures that don't address the root causes the attacks.
We present a generic countermeasure that checks the "decryption context“ including SMTP headers and the MIME structure. The decryption context is encoded as a string and used as Associated Data in the AEAD encryption scheme.
The decryption context changes when attacks alters the email source code in a critical way. This leads to an invalid AEAD auth tag after decryption, which reliably detects the modification. The dc policy even allows the sender to define allowed modifications to the original email
Our proposed solution does not cause any interoperability problems and legacy emails can still be decrypted. We implemented and tested the decryption contexts in Thunderbird/Enigmail and measured the email transport over all major email providers.
New Paper: “Practical Decryption exFiltration: Breaking PDF Encryption“ describing new attacks that uncover the plaintext of encrypted PDFs. To be presented at @acm_ccs and joint work with @jensvoid@Murgi@v_mladenov@CheariX@JoergSchwenk. #PDFex 1/n
@acm_ccs@jensvoid@Murgi@v_mladenov@CheariX@JoergSchwenk The attacker modifies an encrypted PDF and sends it to the receiver. The receiver opens and decrypts the modified PDF and the viewer immediately sends the plaintext of the PDF to the attacker. #PDFex 3/n
We'll publish critical vulnerabilities in PGP/GPG and S/MIME email encryption on 2018-05-15 07:00 UTC. They might reveal the plaintext of encrypted emails, including encrypted emails sent in the past. #efail 1/4
There are currently no reliable fixes for the vulnerability. If you use PGP/GPG or S/MIME for very sensitive communication, you should disable it in your email client for now. Also read @EFF’s blog post on this issue: eff.org/deeplinks/2018…#efail 2/4