| ▲ | tptacek 16 hours ago | |
In the course of this attack, just in terms of what happens in the mechanics of the actual protocol, irrespective of the scenario in which these capabilities are abused, the attacker: (1) Rewrites the ciphertext of a PGP message (2) Introducing an entire new PGP packet (3) That flips GPG into DEFLATE compression handling (4) And then reroutes the handling of the subsequent real message (5) Into something parsed as a plaintext comment This happens without a security message, but rather just (apparently) a zlib error. In the scenario presented at CCC, they used the keyserver example to demonstrate plaintext exfiltration. I kind of don't care. It's what's happening under the hood that's batshit; the "difference of opinion" is that the GnuPG maintainers (and, I guess, you) think this is an acceptable end state for an encryption tool. | ||