Hacker Newsnew | past | comments | ask | show | jobs | submit | kaiengert's commentslogin

Please see this helpful clarification post: https://blog.mozilla.org/en/products/firefox/update-on-terms...


If anything, it just confirms Mozilla is selling data.



I’ve read this response before, and I don’t think it’s great: it makes claims about time-testedness and simplicity that on first glance apply to PGP, but in reality are either outright wrong (the results against MDC instead of true AEAD are in, and it’s a fail) or misleading in their conclusions (a “simple” packet structure that encourages EXPTIME parsing is not actually simple).

The assumption underlying much of the post is that PGP is only used in offline, stateless applications. This would make the arguments stronger, except that it isn’t true[1].

[1]: https://delta.chat/en/


>...the results against MDC instead of true AEAD are in, and it’s a fail...

It's really OCFB-MDC. It's only a authenticated mode when the two things are used together (like GCM). It doesn't provide protection of associated data (the AD part of AEAD) but that isn't something that seems to be potentially useful for the stuff that the OpenPGP standard is used for. I don't know what "true AEAD" means in this context. As a user I only care that the OCFB-MDC mode is actually secure. I am not interested in any philosophical aspects.

The stuff about offline stateless applications only adds to the argument. A version of OCFB-MDC could be used, for say, TLS and would be expected to be secure.


> It doesn't provide protection of associated data (the AD part of AEAD) but that isn't something that seems to be potentially useful for the stuff that the OpenPGP standard is used for.

It isn't sensible to assert this, because people use OpenPGP in all kinds of crazy ways. One of the recurring headaches in applied cryptographic engineering is discovering that people do, in fact, attempt to use PGP for instant messaging (per above), as a TLS certificate delivery mechanism, etc. These are contexts where the use of an AEAD is frequently appropriate.

> As a user I only care that the OCFB-MDC mode is actually secure.

In practice, it has not been[1]. PGP's decision to use MDC instead of a real MAC is a classic example of home-rolled primitives being conceptually algebraically sound but broken in user settings. The solution here is simple: OpenPGP is not special, and should use a MAC or AEAD mode like everyone else does. It also shouldn't release the plaintext until the authentication tag is actually validated, which was another profound historic breakage with MDC.

[1]: https://mailarchive.ietf.org/arch/msg/openpgp/w4i30aLplh91iw...


You posted a link to the email where Trevor Perrin acknowledged that the corrected specification was secure.

>PGP's decision to use MDC instead of a real MAC...

The MDC can be interpreted as a MAC. The hash is first seeded with a MAC key (the "random block"). So a boring old hash MAC. SHA-1 is vulnerable to length extension attacks but that is not an issue here as the attacker never gets access to the state of the hash (everything is encrypted). I guess this could be considered an advantage of MAC then encrypt. The only property the hash requires is that the MAC key will be propagated to the check value in such a way that it is indistinguishable from random. So SHA-1 is wild overkill here.


Thunderbird supports OpenPGP and S/MIME for email encryption.

For how to set it up, see here: https://support.mozilla.org/en-US/kb/thunderbird-help-setup-...


Your statement needs some clarification.

Yes, Thunderbird supports OpenPGP, with a fully integrated solution.

However, Thunderbird doesn't use gpg by default, because of license incompatibility Thunderbird cannot bundle GnuPG software.

That's why Thunderbird uses the RNP library as its default OpenPGP backend.

You may optionally configure externally installed GnuPG for secret key operations, as described at https://wiki.mozilla.org/Thunderbird:OpenPGP:Smartcards


Yes, you can use smartcards with S/MIME.

You, you can use smartcards with OpenPGP, if you configure Thunderbird for optional GnuPG support. This way Thunderbird can use your secret key that is managed by GnuPG, for secret key operations, including keys on smartcards.

How to do that is documented here: https://wiki.mozilla.org/Thunderbird:OpenPGP:Smartcards


No, Thunderbird 78 doesn't use OpenPGP.js - it uses RNP and Botan for OpenPGP.


Thanks for the correction! Did this change in the development of TB78 or do I seriously misremember reading about it in the initial announcements?


Maybe it was mentioned as one of the technologies we consider, because it took us a while to make the final decision.


Note that NSS contains a classic certificate verification engine, which was originally written in C.

The above statement refers to an external contribution that was added to NSS. It added a second validation engine to NSS, libpkix.

It's true that the libpkix portion is very complicated code, but the above statement doesn't apply to NSS in general.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: