EFAIL mitigations

danielw

Daniel Waller (he/him)

Posted on May 15, 2018

EFAIL mitigations

As you might have heard there is a flaw in many popular email clients that allows an attacker to decrypt PGP or S/MIME encrypted email content.

Here's the website with all of the info about the attacks: EFAIL

Let's collect mitigation techniques especially for the clients affected by the direct exfiltration attack (Apple Mail, iOS Mail, and Mozilla Thunderbird)


Some immediate mitigations I've read about so far:

  • Turn off OpenPGP and S/MIME encryption in your mail client and use an external tool (eg. Keybase) for encryption/decryption by copy-pasting content.
  • Disable HTML support. Only show plaintext
  • (For Thunderbird) Leave OpenPGP encryption enabled but turn off automatic decryption/verification of messages in Enigmail settings

A screenshot of thunderbird with the 'Enigmail' dropdown menu open and the selection on the menu item 'Automatically Decrypt/Verify Messages'

  • (For Thunderbird) Disallow remote content in messages.

A screenshot of thunderbirds preferences with the 'Privacy' tab selected and the mouse cursor hovering over the checkbox 'Allow remote content in messages'

Note

The last 2 just protect you from stumbling into the attack. You can still be exploited if you accept remote content for that particular mail and/or if you manually decrypt the message.

đź’– đź’Ş đź™… đźš©
danielw
Daniel Waller (he/him)

Posted on May 15, 2018

Join Our Newsletter. No Spam, Only the good stuff.

Sign up to receive the latest update from our blog.

Related