Thunderbird reading Werner mail structure about How to report issues and suggest changes to the Web Key Directory specification

2021-01-29 Thread Ángel
On 2021-01-29 at 18:41 +0100, Daniele Nicolodi wrote:
> Hello,
> 
> this is only to report that Thunderbird 78.7.0 is unable to make
> sense
> of the MIME structure of Werner's email and it only visualizes the
> mailing list footer as the body of the email.
> 
> I don't know if the issue is with Thunderbird or with Werner's MUA,
> although I suspect the first.
> 
> Cheers,
> Dan

Hello Daniele

It's probably an issue of Thunderbird, or maybe of your MTA. I have no
issue with a different client.

The original structure of Werner mail was:

multipart/signed
  text/plain
  application/pgp-signature


After going through the mailing list, it added the mailing list footer
as another part, so it became

multipart/mixed
  multipart/signed
text/plain
application/pgp-signature
  text/plain


Maybe you can check if you can view an email with this structure in
thunderbird source. If so, it's probably failing the "decryption"
(signature checking, actually), and just returning an empty block
there.

Best regards


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Help with GPGME keylisting not listing signatures

2021-01-29 Thread John Scott via Gnupg-users
On Saturday, January 23, 2021 10:39:30 AM EST Ingo Klöcker wrote:
> Did you have a look at GPGME's tests as working example code? There is a
> test for listing signatures:
> https://dev.gnupg.org/source/gpgme/browse/master/tests/gpg/t-keylist-sig.c
Thanks, I didn't see that. Except for the difference that I read the keys from 
a gpgme_data_t connected to a stream instead of GnuPG's keyring, my code seems 
to match up with the test's way of doing things.

With the debugging information on the invocation of gpg doesn't look abnormal, 
and trying in a fresh chroot gets me the same results, so it seems as though 
getting detailed signature data from a gpgme_data_t may not be possible. My 
example for testing is at https://salsa.debian.org/-/snippets/519

signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: How to report issues and suggest changes to the Web Key Directory specification [was: Re: Please tackle the Right Thing]

2021-01-29 Thread Daniele Nicolodi
Hello,

this is only to report that Thunderbird 78.7.0 is unable to make sense
of the MIME structure of Werner's email and it only visualizes the
mailing list footer as the body of the email.

I don't know if the issue is with Thunderbird or with Werner's MUA,
although I suspect the first.

Cheers,
Dan


On 29/01/2021 16:09, Werner Koch via Gnupg-users wrote:
> 
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
> 


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Protect email experience not Subject:s (hypothesis, draft)

2021-01-29 Thread Bernhard Reiter
Hello,
for many months now, my feeling is growing that

  encrypted subject headers in emails
  shift the security balance in the wrong direction.

So I want to summarize and explore this hypothesis.
Here are some draft thoughts and notes.
Feedback welcome (either to me directly or on the list).

Not sure yet, where to place all this, but in the best tradition
I'll announce my intentions here and will follow up as I learn.

Best Regards,
Bernhard


== Idea of protected headers.
The subject of an email delives contents related to the body of the mail.
To raise the confidentiality (as one aspect of security), 
it is proposed to do end-to-end encryption on the subject Header-Field.

== Hypothesis
The subject Header-Field is also meta data, needed to keep email usable.
Or in other words: to support the availability aspect of security.

Because email is the most popular decentral communication solution [5]
compatibility with existing installations and existing ways of working for 
diverse user groups is more important than in other softwar contexts.

From an implementers point of view, protected headers seem to make
it more complicated and break some ways to implement good access
to emails. 

Examples:
* IMAP servers can search emails by subject. A feature that cannot
  be kept functional with inaccessible contents.
* Fast access to filtering in clients by subject is broken, because
  it would mean indexes and indexes would need to come from a crypto
  secure store, one each per crypto context (private key).
* There are many old or non-header-decrypting clients around, otherwise fine
  and stable.

As observable metadata cannot be avoided totally, maybe the alternative to 
automating the Header-Fields is to help people manage the different levels of
security they need per occasion. 

Thought experiment:

If it is understood that the header section is like notes
on a paper envelope, needed for mail transport and to be able to be seen by 
the transporting agents, this can be used to assess what can be learned
from it. And then common ways of distracting from the contents can be used.
(I write 'common ways', because this is a core of my concept about how to get 
end-to-end encryption - especially email - more usable: People already know
social ways how to deal with different levels of confidentiality. Sofware 
application need not to hide it the aspects too much.)

As a consequence encrypting the subject of an email can be seen as 
contributing only very little to the confidentiality. The whole exchange has 
to done so that it looks unsuspicous anyway.

Potential conclusion:
Encrypted subject headers contribute a little bit to confidentiality,
but they also lower availability for many cases (by the implementation
complications). They should not be send by default.


== Valid use cases?
Where the "Subject:" is a lot more than a writing on the envelope.

 * Example: a roundup-tracker fully run with OpenPGP/MIME mails,
   by default it changes the title of an issue and there can be
   commands to control the issue in the subject. (Also an example
   where backwards compatiblity failed.)

Implementation idea: per recipient (group) settings to explicitely
enable encrypted subjects for those groups and contexts where it is
known to be more useful.


== Material
[1]  https://github.com/autocrypt/memoryhole
  archived in favour of [2]
  lists some alternatives and links elder discussions  

[2] https://github.com/autocrypt/protected-headers
Old source code repo of [3]?

[3] https://datatracker.ietf.org/doc/draft-ietf-lamps-header-protection/
   "Header Protection for S/MIME
   draft-ietf-lamps-header-protection-02 (Last updated  2020-11-02)"
   also aiming at OpenPGP/MIME?

[4] A widely spread version of Thunderbird v78 did not allow
disabling the encryption of subjects.

https://support.mozilla.org/en-US/kb/openpgp-thunderbird-howto-and-faq#w_can-i-disable-the-encryption-of-the-email-subject

[5]  Mahn, Jan, 2021, c't 2021/03 pp50-53
 "Nichts zu ­verbergen?
  Sicher und vertraulich kommunizieren: Ein Grundrecht"
 https://www.heise.de/select/ct/2021/3/2030913061555053970

-- 
www.intevation.de/~bernhard   +49 541 33 508 3-3
Intevation GmbH, Osnabrück, DE; Amtsgericht Osnabrück, HRB 18998
Geschäftsführer Frank Koormann, Bernhard Reiter, Dr. Jan-Oliver Wagner


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

WKD specifiction: Where to channel reports and suggestions?

2021-01-29 Thread Bernhard Reiter
Am Freitag 29 Januar 2021 01:20:55 schrieb Ángel:
> > I've reported concerns about the draft on https://dev.gnupg.org using
> > the "wkd" tag, though that tag is also used for bug reports, feature
> > requests, etc for the wkd implementation in GnuPG itself:
> >
> > https://dev.gnupg.org/project/profile/108/

As long as there is no other tag or subtag, `wkd` seems okay to me.
The wiki or this mailinglist both seem to be okay, too.

> > I don't know whether there is a preferred way to report concerns or
> > suggest problems with the spec.  Perhaps Werner can suggest what he
> > prefers?

> During this thread there were a few points that would be very
> appropriate to have filled somewhere, at the very least so that they
> don't get forgotten.

Starting some fresh posts with summaries
(or summaries on dev.gnupg.org) is helpful to me.
I admit that I've lost the overview in the monster thread.

It is hard to spot the arguments in the noise, this is why
I suggest to split and summarize.

Best Regards,
Bernhard


-- 
www.intevation.de/~bernhard   +49 541 33 508 3-3
Intevation GmbH, Osnabrück, DE; Amtsgericht Osnabrück, HRB 18998
Geschäftsführer Frank Koormann, Bernhard Reiter, Dr. Jan-Oliver Wagner


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: How to report issues and suggest changes to the Web Key Directory specification [was: Re: Please tackle the Right Thing]

2021-01-29 Thread Werner Koch via Gnupg-users
On Thu, 28 Jan 2021 21:35, Daniel Kahn Gillmor said:

> Maybe Werner can clarify what place he'd prefer and we can consolidate
> the issue tracking there.

Please send patches to gnupg-devel or if you need a bug tracker, use
dev.gnupg.org with the wkd tag/project.


Shalom-Salam,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: gpg cards

2021-01-29 Thread Werner Koch via Gnupg-users

> ahead and copied the very same keys from the backup to the second. But
> trying to actually use does not work, I get an error like: 'please
> insert card: […]' So.
>
> What can I do to make gpg use the card as well (if possible) ?

You see the prompt because gpg knows that you aready used the first card
and asks for that card.  The alternative would be to check whether the
currently inserted card can be used, despite that its serial number does
not match.  IIRC, we have implemented this in 2.3 to be released in th
next few weeks.

What you can do with 2.2 is to delet the stub file which stores the
serial number:

  gpg --with-keygrip -K

shows you the keygrip of the respective file.  Now check whether the
file ~/.gnupg/private-keys-v1.d/.key has the string
"shadowed-private-key".  If so, delete this file and run
"gpg --card-status".

Such a file might look like this:

--8<---cut here---start->8---
Token: 276000124010200FFFE372F791 OPENPGP.1
Label: My signing yellow signing yoken
Key: (shadowed-private-key (ecc (curve Ed25519)(flags eddsa)(q
  #40CFBE4795E91CD7A26185F23430A7445712DD93185C3023B4646E963010263697#)
 (shadowed t1-v1 (#D276000124010200FFFE372F791# OPENPGP.1
--8<---cut here---end--->8---

which can be edited, or it might be some binary gibberish.  In any case
you should be able to check for the "shadowed-private-key" string.  Note
that such a file exists for each key.

> Another thing I would really love to know is: Is it possible to use
> the gpg card as smartcard for the system login as well? Right now I am

You can use the poldi PAM module but it is somewhat limited.  For proper
support we would need to modify the screen locker and the display
manager.

> Last but not least I am still on a quest for a setup to use Full Disk
> Encryption and Security Token to actually decrypt the Disk on boot.

I use my card for many years for an encrypted partition.  The tool is
called g13 but it is not very polished and not easy to install.  When
building gnupg add --enable-g13 to configure.  We have an open task to
write a bit of docuemntation: https://dev.gnupg.org/T3423 .  What's also
missing are features to replace or add OpenPGP keys to a partition so
that you can use several cards or an symmetric key for decryption (of
the actual dmcrypt key).


Salam-Shalom,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: How to report issues and suggest changes to the Web Key Directory specification [was: Re: Please tackle the Right Thing]

2021-01-29 Thread Daniel Kahn Gillmor via Gnupg-users
On Fri 2021-01-29 01:20:55 +0100, Ángel wrote:
> Oh, nice. I had only located 
> https://gitlab.com/openpgp-wg/webkey-directory which stops at -08. This
> one has been further updated.

yep, see the thread starting at
https://lists.gnupg.org/pipermail/gnupg-users/2019-October/062844.html
and concluding at
https://lists.gnupg.org/pipermail/gnupg-users/2019-November/063056.html
for background on the two different repos.

> It would be very useful to know where are issues expected to be raised.
> During this thread there were a few points that would be very
> appropriate to have filled somewhere, at the very least so that they
> don't get forgotten.

I agree that having a consistent and dedicated place for issues to be
filed (if they're not addressed immediately) is useful.

   https://gitlab.com/openpgp-wg/webkey-directory/-/issues

was intended to be that place after discussion with Werner, but it
doesn't appear to have seen much use since it was created.

Maybe Werner can clarify what place he'd prefer and we can consolidate
the issue tracking there.

--dkg


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

[Announce] [Security fix] Libgcrypt 1.9.1 relased

2021-01-29 Thread Werner Koch via Gnupg-users
Hello!

We have to announce the availability of Libgcrypt version 1.9.1.
This version fixes a *critical security bug* in the recently released
version 1.9.0.  If you are already using 1.9.0 please update immediately
to 1.9.1.

Libgcrypt is a general purpose library of cryptographic building blocks.
It is originally based on code used by GnuPG.  It does not provide any
implementation of OpenPGP or other protocols.  Thorough understanding of
applied cryptography is required to use Libgcrypt.


Impact and timeline
===

Only one released version is affected:

 - Libgcrypt 1.9.0 (released 2021-01-19)

All other versions are not affected.

On 2021-01-28 Tavis Ormandy contacted us to report a severe bug in 1.9.0
which he found while testing GnuPG:

  There is a heap buffer overflow in libgcrypt due to an incorrect
  assumption in the block buffer management code. Just decrypting some
  data can overflow a heap buffer with attacker controlled data, no
  verification or signature is validated before the vulnerability
  occurs.

The bug was introduced during the the 1.9 development phase about two
years ago with commit e76617cbab018dd8f41fd6b4ec6740b5303f7e13 (Reduce
overhead on generic hash write function).

Exploiting this bug is simple and thus immediate action for 1.9.0 users
is required.  A CVE-id has not yet been assigned.  We track this bug at
https://dev.gnupg.org/T5275.  The 1.9.0 tarballs on our FTP server have
been renamed so that scripts won't be able to get this version anymore.


Solution


If Libgcrypt versions 1.9.0 is in use please update immediately to
version 1.9.1.

If you are using the 1.8 LTS branch you are not affected.  While you are
checking anyway please make sure that you have at least 1.8.5.

If you are using a development version build taken from our Git
repository you need to update as well.  NB: The use of non-released
versions in a production environment is strongly discouraged.

There is yet no released GnuPG version hich requires Libgcrypt 1.9


Noteworthy changes in Libgcrypt 1.9.1
=

 * Bug fixes:

   - *Fix exploitable bug* in hash functions introduced with 1.9.0.
 [#5275]

   - Return an error if a negative MPI is used with sexp scan
 functions.  [#4964]

   - Check for operational FIPS in the random and KDF functions.
 [#5243]

   - Fix compile error on ARMv7 with NEON disabled.  [#5251]

   - Fix self-test in KDF module.  [#5254]

   - Improve assembler checks for better LTO support.  [#5255]

   - Fix assember problem on macOS running on M1.  [#5157]

   - Support older macOS without posix_spawn. [#5159]

   - Fix 32-bit cross build on x86.  [#5257]

   - Fix non-NEON ARM assembly implementation for SHA512.  [#5263]

   - Fix build problems with the cipher_bulk_ops_t typedef.  [#5264]

   - Fix Ed25519 private key handling for preceding ZEROs. [#5267]

   - Fix overflow in modular inverse implementation.  [#5269]

   - Fix register access for AVX/AVX2 implementations of Blake2.
 [#5271].

 * Performance:

   - Add optimized cipher and hash functions for s390x/zSeries.

   - Use hardware bit counting functionx when available.

 * Internal changes:

   - The macOS getentropy syscall is used when available.  [#5268]

   - Update DSA functions to match FIPS 186-3.  [30ed9593f6]

   - New self-tests for CMACs and KDFs.  [385a89e35b,7a0da24925]

   - Add bulk cipher functions for OFB and GCM modes.
 [f12b6788f2,f4e63e92dc]

 For a list of links to commits and bug numbers
 see the release info at https://dev.gnupg.org/T5259


Download


Source code is hosted at the GnuPG FTP server and its mirrors as listed
at https://gnupg.org/download/mirrors.html.  On the primary server
the source tarball and its digital signature are:

 https://gnupg.org/ftp/gcrypt/libgcrypt/libgcrypt-1.9.1.tar.bz2
 https://gnupg.org/ftp/gcrypt/libgcrypt/libgcrypt-1.9.1.tar.bz2.sig

or gzip compressed:

 https://gnupg.org/ftp/gcrypt/libgcrypt/libgcrypt-1.9.1.tar.gz
 https://gnupg.org/ftp/gcrypt/libgcrypt/libgcrypt-1.9.1.tar.gz.sig

In order to check that the version of Libgcrypt you downloaded is an
original and unmodified file please follow the instructions found at
https://gnupg.org/download/integrity_check.html.  In short, you may
use one of the following methods:

 - Check the supplied OpenPGP signature.  For example to check the
   signature of the file libgcrypt-1.9.1.tar.bz2 you would use this
   command:

 gpg --verify libgcrypt-1.9.1.tar.bz2.sig libgcrypt-1.9.1.tar.bz2

   This checks whether the signature file matches the source file.
   You should see a message indicating that the signature is good and
   made by one or more of the release signing keys.  Make sure that
   this is a valid key, either by matching the shown fingerprint
   against a trustworthy list of valid release signing keys or by
   checking that the key has been signed by trustworthy other keys.
   See the end of this mail for information on 

[Announce] [urgent] Stop using Libgcrypt 1.9.0 !

2021-01-29 Thread Werner Koch via Gnupg-users
Hi!

A severe bug was reported yesterday evening against Libgcrypt 1.9.0
which we released last week.  A new version to fix this as weel as a
couple of build problems will be released today.

In the meantime please stop using 1.9.0.

It seems that Fedora 34 and Gentoo are already using 1.9.0 .


Salam-Shalom,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


signature.asc
Description: PGP signature
___
Gnupg-announce mailing list
gnupg-annou...@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-announce___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users