💬 Discussion | ProtonMail Cryptographic Architecture #670

Closed
opened 2018-12-19 18:18:06 +00:00 by hugoncosta · 27 comments
hugoncosta commented 2018-12-19 18:18:06 +00:00 (Migrated from github.com)

Recently, a paper was published regarding "the first independent analysis of ProtonMail's cryptographic architecture". The author's finding acknowledges certain problems that may break end-to-end encryption.

ProtonMail is an online email service that claims to offer end-to-end encryption such that "even [ProtonMail] cannot read and decrypt [user] emails." The service, based in Switzerland, offers email access via webmail and smartphone applications to over five million users as of November 2018. In this work, we provide the first independent analysis of ProtonMail's cryptographic architecture. We find that for the majority of ProtonMail users, no end-to-end encryption guarantees have ever been provided by the ProtonMail service and that the "Zero-Knowledge Password Proofs" are negated by the service itself. We also find and document weaknesses in ProtonMail's "Encrypt-to-Outside" feature. We justify our findings against well-defined security goals and conclude with recommendations.

Link to the paper

Protonmail's response can also be found here.

Recently, a paper was published regarding "the first independent analysis of ProtonMail's cryptographic architecture". The author's finding acknowledges certain problems that may break end-to-end encryption. > ProtonMail is an online email service that claims to offer end-to-end encryption such that "even [ProtonMail] cannot read and decrypt [user] emails." The service, based in Switzerland, offers email access via webmail and smartphone applications to over five million users as of November 2018. In this work, we provide the first independent analysis of ProtonMail's cryptographic architecture. We find that for the majority of ProtonMail users, no end-to-end encryption guarantees have ever been provided by the ProtonMail service and that the "Zero-Knowledge Password Proofs" are negated by the service itself. We also find and document weaknesses in ProtonMail's "Encrypt-to-Outside" feature. We justify our findings against well-defined security goals and conclude with recommendations. [Link to the paper](https://eprint.iacr.org/2018/1121) Protonmail's response can also be found [here](https://www.reddit.com/r/ProtonMail/comments/9yqxkh/an_analysis_of_the_protonmail_cryptographic/ea3g0hm/).
ghost commented 2018-12-19 18:32:43 +00:00 (Migrated from github.com)

Relevant video:

End-to-End Encryption in the Browser Impossible? - ProtonMail

End-to-End Encryption in the Browser Impossible? - ProtonMail

(YouTube link: https://www.youtube.com/watch?v=DM1tPmxGY7Y)


The issue is that PM's backend can be secure, but they can still steal your private key if they send your browser malicious JS. This is the issue with web apps - they are downloaded from the server. It would be cool if PM had a desktop app without auto updates -- users would use a trusted release. The server wouldn't be able to send you malicious JS that way. Though I wonder, can't you self host the ProtonMail frontend? Because you can do that with Tuta. PM's frontend src: https://github.com/ProtonMail/WebClient

@beardog108 thoughts? I think it depends on the architecture of the frontend. If it fetches any JS from the server, that's a problem. If it doesn't accept any JS from the server, this attack is not possible.

Relevant video: [![End-to-End Encryption in the Browser Impossible? - ProtonMail](https://img.youtube.com/vi/DM1tPmxGY7Y/0.jpg)](https://www.youtube.com/watch?v=DM1tPmxGY7Y) ## End-to-End Encryption in the Browser Impossible? - ProtonMail _(YouTube link: https://www.youtube.com/watch?v=DM1tPmxGY7Y)_ --- The issue is that PM's backend can be secure, but they can still steal your private key if they send your browser malicious JS. This is the issue with web apps - they are downloaded from the server. It would be cool if PM had a desktop app without auto updates -- users would use a trusted release. The server wouldn't be able to send you malicious JS that way. Though I wonder, can't you self host the ProtonMail frontend? Because you can do that with Tuta. PM's frontend src: https://github.com/ProtonMail/WebClient @beardog108 thoughts? I think it depends on the architecture of the frontend. If it fetches any JS from the server, that's a problem. If it doesn't accept any JS from the server, this attack is not possible.
Vincevrp commented 2018-12-19 20:11:26 +00:00 (Migrated from github.com)

It would be cool if PM had a desktop app without auto updates

@Shifterovich, they offer Protonmail Bridge.

> It would be cool if PM had a desktop app without auto updates @Shifterovich, they offer [Protonmail Bridge](https://protonmail.com/bridge/).
ghost commented 2018-12-19 20:33:48 +00:00 (Migrated from github.com)

I know about that, I meant if their main platform was a desktop application like Outlook.

I know about that, I meant if their main platform was a desktop application like Outlook.
ghost commented 2018-12-20 04:53:35 +00:00 (Migrated from github.com)

tl;dr no such thing as safe end to end website encryption, except in cases of Electron/similar apps, and extensions.

ProtonMail is only safe if used in the downloaded apps. This information has been long known, the paper released by Nadim is just an academic summary and criticizes Proton for making questionable claims regarding safety in their advertising/website.

This is of course not limited to proton, but any website that uses "end to end" encryption.

tl;dr no such thing as safe end to end website encryption, except in cases of Electron/similar apps, and extensions. ProtonMail is only safe if used in the downloaded apps. This information has been long known, the paper released by Nadim is just an academic summary and criticizes Proton for making questionable claims regarding safety in their advertising/website. This is of course not limited to proton, but any website that uses "end to end" encryption.
hasanalizxc commented 2018-12-21 23:27:07 +00:00 (Migrated from github.com)

It would be cool if PM had a desktop app without auto updates

@Shifterovich, they offer Protonmail Bridge.

If you want to security, you need to pay. What happened to Open-Source Love?

> > > > It would be cool if PM had a desktop app without auto updates > > @Shifterovich, they offer [Protonmail Bridge](https://protonmail.com/bridge/). If you want to security, you need to pay. What happened to Open-Source Love?
ghost commented 2018-12-21 23:55:07 +00:00 (Migrated from github.com)

If you want to security, you need to pay. What happened to Open-Source Love?

Turns out running a free email service costs money.

Also, the bridge =/= a desktop email client. It's just a way to receive your emails in, say, Thunderbird.

> If you want to security, you need to pay. What happened to Open-Source Love? Turns out running a free email service costs money. Also, the bridge =/= a desktop email client. It's just a way to receive your emails in, say, Thunderbird.
hasanalizxc commented 2018-12-22 00:15:19 +00:00 (Migrated from github.com)

I got it but i don't think like this: "All Proton products should be free".

For example you can't "Send encrypted messages to external recipients". At least Proton should make this to free users. I don't want to much more things.

I got it but i don't think like this: "All Proton products should be free". For example you can't "Send encrypted messages to external recipients". At least Proton should make this to free users. I don't want to much more things.
ghost commented 2018-12-22 08:11:43 +00:00 (Migrated from github.com)

@hasanalizxc

For example you can't "Send encrypted messages to external recipients".

Sorry, but this is wrong. ProtonMail 3.14 (released in July 2018) added the ability to import GPG keys of external recipients. Even before 3.14, it was possible to send password-protected e-mails that are accessible in the web browser.

Moreover, you can always (recommended for the paranoid) use gpg in your terminal to encrypt your e-mails BEFORE you copy them in your e-mail client. This is also true for decryption and it is supported by any client since they simply take the already encrypted message.

@hasanalizxc >For example you can't "Send encrypted messages to external recipients". Sorry, but this is wrong. ProtonMail 3.14 (released in July 2018) added the ability to import GPG keys of external recipients. Even before 3.14, it was possible to send password-protected e-mails that are accessible in the web browser. Moreover, you can always (recommended for the paranoid) use gpg in your terminal to encrypt your e-mails BEFORE you copy them in your e-mail client. This is also true for decryption and it is supported by any client since they simply take the already encrypted message.
hasanalizxc commented 2018-12-22 12:56:08 +00:00 (Migrated from github.com)
Here it is. http://prntscr.com/lyaedq https://protonmail.com/signup
ghost commented 2018-12-22 18:25:49 +00:00 (Migrated from github.com)

@hasanalizxc

Here it is.

http://prntscr.com/lyaedq
https://protonmail.com/signup

I own a free Protonmail backup account and I'm able to send GPG-encrypted messages to external e-mail addresses. All other points mentioned above by me also apply. You can always encrypt/decrypt as well as sign/verify your e-mail locally.

@hasanalizxc >Here it is. > >http://prntscr.com/lyaedq >https://protonmail.com/signup I own a free Protonmail backup account and I'm able to send GPG-encrypted messages to external e-mail addresses. All other points mentioned above by me also apply. You can always encrypt/decrypt as well as sign/verify your e-mail locally.
hasanalizxc commented 2018-12-22 19:20:04 +00:00 (Migrated from github.com)

@hasanalizxc

Here it is.
http://prntscr.com/lyaedq
https://protonmail.com/signup

I own a free Protonmail backup account and I'm able to send GPG-encrypted messages to external e-mail addresses. All other points mentioned above also apply.

That time Proton should change their chart.

You said all other points also apply. Do you have 5GB account? Can you send up to 1000 messages per day? Can you use your own domain? Can you use 5 e-mail aliases?

> > > @hasanalizxc > > > Here it is. > > http://prntscr.com/lyaedq > > https://protonmail.com/signup > > I own a free Protonmail backup account and I'm able to send GPG-encrypted messages to external e-mail addresses. All other points mentioned above also apply. That time Proton should change their chart. You said all other points also apply. Do you have 5GB account? Can you send up to 1000 messages per day? Can you use your own domain? Can you use 5 e-mail aliases?
kewde commented 2018-12-24 18:21:17 +00:00 (Migrated from github.com)

Anything that promises end-to-end encryption in the browser, without the usage of extensions is prone the private key exfiltration AFAIK.

We should recommend on-device email applications, not services.

Anything that promises end-to-end encryption in the browser, _without the usage of extensions_ is prone the private key exfiltration AFAIK. We should recommend on-device email applications, not services.
ghost commented 2018-12-25 08:09:53 +00:00 (Migrated from github.com)

without the usage of extensions

Considering that most web browsers automatically update their installed extensions, we wouldn't recommend using extensions for end-to-end encryption, too. That's basically the same problem as server-provided JavaScript. There is one GPG extension called "Mailvelope" that already demonstrated several security issues.

The easiest but not-so-user-friendly way is to use raw "gpg" in the terminal to encrypt/decrypt and sign/verify e-mails. Moreover, this is more secure since security vulnerabilities in e-mail clients like Thunderbird don't directly affect GPG.

> _without the usage of extensions_ Considering that most web browsers automatically update their installed extensions, we wouldn't recommend using extensions for end-to-end encryption, too. That's basically the same problem as server-provided JavaScript. There is one GPG extension called "Mailvelope" that already demonstrated several security issues. The easiest but not-so-user-friendly way is to use raw "gpg" in the terminal to encrypt/decrypt and sign/verify e-mails. Moreover, this is more secure since security vulnerabilities in e-mail clients like Thunderbird don't directly affect GPG.
ghost commented 2018-12-25 09:36:04 +00:00 (Migrated from github.com)

@infosec-handbook Is the bridge for premium users only?

@infosec-handbook Is the bridge for premium users only?
ghost commented 2018-12-26 07:46:36 +00:00 (Migrated from github.com)

@infosec-handbook Is the bridge for premium users only?

Yes, it is a paid feature.

> @infosec-handbook Is the bridge for premium users only? Yes, it is a paid feature.
ThatLurker commented 2018-12-26 22:16:06 +00:00 (Migrated from github.com)

The easiest but not-so-user-friendly way is to use raw "gpg" in the terminal to encrypt/decrypt and sign/verify e-mails. Moreover, this is more secure since security vulnerabilities in e-mail clients like Thunderbird don't directly affect GPG.

The use of extensions like Mailvelope would make this not that non-user-friendly for the user

> The easiest but not-so-user-friendly way is to use raw "gpg" in the terminal to encrypt/decrypt and sign/verify e-mails. Moreover, this is more secure since security vulnerabilities in e-mail clients like Thunderbird don't directly affect GPG. The use of extensions like [Mailvelope] would make this not that non-user-friendly for the user [Mailvelope]: https://www.mailvelope.com/en
ghost commented 2018-12-26 22:19:14 +00:00 (Migrated from github.com)

Isn't Mailvelope subject to updates as well? I guess locally loaded mailvelope would work.

Isn't Mailvelope subject to updates as well? I guess locally loaded mailvelope would work.
vladimiry commented 2019-01-24 08:11:13 +00:00 (Migrated from github.com)

@kewde

We should recommend on-device email applications, not services.

The original issue has actually been addressed by https://github.com/vladimiry/email-securely-app desktop app which goes with prepackaged/built-in web clients for both ProtonMail / Tutanota email providers. Related issues:

@kewde > We should recommend on-device email applications, not services. The original issue has actually been addressed by https://github.com/vladimiry/email-securely-app desktop app which goes with prepackaged/built-in web clients for both ProtonMail / Tutanota email providers. Related issues: - https://github.com/vladimiry/email-securely-app/issues/80 - https://github.com/vladimiry/email-securely-app/issues/79
ThatLurker commented 2019-01-24 17:20:27 +00:00 (Migrated from github.com)

Protonmail made a blog post about this too https://protonmail.com/blog/cryptographic-architecture-response/

Protonmail made a blog post about this too https://protonmail.com/blog/cryptographic-architecture-response/
ghost commented 2019-03-18 14:30:39 +00:00 (Migrated from github.com)

gratis service is not about the money, it's about privacy

If you want to security, you need to pay. What happened to Open-Source Love?

Turns out running a free email service costs money.

Funding a project by charging fees has a privacy downside: it's hard to pay anonymously. Even with cryptocurrency, it can be sufficiently anonymous given a huge effort but that's not realistic. Most exchangers are privacy abusers and even cryptocurrency ATMs often scan IDs. So it's difficult to pay anonymously.

Targeted advertising is an even bigger privacy abuse than tracing money IMO. But donations and/or untargeted ads are the more privacy-respecting ways to fund a project. Incidentally that kind of funding is also more inclusive (poor people are not excluded).

using an MUA

Also, the bridge =/= a desktop email client. It's just a way to receive your emails in, say, Thunderbird.

It's unclear exactly what your issue is @Shifterovich. The bridge facilitates running an MUA of your choice. Both have limitations as I understand it:

mechanism limitation
protonmail bridge limited to MUAs that run on the same platform (or LAN) as the bridge; MUA need not be PGP-capable
hushmail's standard imap/pop3 svc limited to PGP-capable MUAs; no platform limitation but requires more advanced users

I suspect the Protonmail bridge is also needlessly proprietary and redundant. IIRC there is free software middleware that can do the encryption/decryption outside the MUA. Would be better if PM supported that tool and offered imap, pop3, smtp.

Protonmail needlessly imposes both motivation and expertise on novices

For example you can't "Send encrypted messages to external recipients".

Sorry, but this is wrong. ProtonMail 3.14 (released in July 2018) added the ability to import GPG keys of external recipients.

What @hasanalizxc should have said is that novice users cannot send encrypted messages to external recipients without an unusual degree of motivation. PM added that capability in a manner that requires users to be advanced enough to handle key management. It's a non-starter for a large portion PM's users. Motivation is a big factor. Many novice users could handle the key management if they had a tolerance for learning it. Even when a novice has the benefit of a hand-holding walk-through, they tend to resist.

Hushmail already solved this problem decades past. Hushmail has a public key server whereby expert users can do all the key management so the novice users need not know the details beyond their interest. For me it was critical. It was a great benefit to tell my novice correspondents (e.g. accountants and lawyers) "get a gratis hushmail account and i'll take care of the rest". Then I can use my own MUA and key pair and both obtain the pubkey of the other party and push my key to the server, all with no effort on their part. So only one person needs care about privacy and be motivated, not two. It's possible to use e2e crypto this way with unmotivated novices.

So now HM charges a premium which has driven users to PM. But PM is a non-starter in many delicate situations where one party to the conversation is repulsed by what they perceive as paranoid Cloak-And-Dagger antics. It's already difficult enough to get novice users to open a HM or PM account, now to ask them to follow steps to send me their pubkey and the follow more steps to accept mine is a show-stopper. Because that hurdle is blocking in many situations, I'm forced into the walled-garden of Protonmail in order to correspond in these fragile-motivation cases. It's not a particularly evil walled-garden but being forced to use another dedicated GUI app or web UI for something as regular as email tests my own motivation.

Even before 3.14, it was possible to send password-protected e-mails that are accessible in the web browser.

That introduces a key exchange problem that public key crypto solves. It trades one problem for another.

what PTIO should endorse (ElectronMail)

without the usage of extensions

Considering that most web browsers automatically update their installed extensions, we wouldn't recommend using extensions for end-to-end encryption, too.

That's true, but it doesn't defeat @kewde's ultimate (neglected) conclusion which is still a good point:

We should recommend on-device email applications, not services.

This is aligned with Nadim Kobeissi's stance and it makes perfect sense. Any app where the user is in control of the updates is on the relatively safer side of the mass surveillance likeliness line. They can still be targeted but the PTIO mission is mass surveillance and endorsing javascript that implements crypto is a bad idea.

In principle it would make sense to note something like "e2e crypto reasonably safe with their app". But in this case it's a bit disgusting to see that PMs app is exclusively distributed in the privacy-abusing walled-garden of Google Playstore (the abuses of which are outlined in part 2 of this post). I therefore propose something like:

"e2e crypto reasonably safe with the unofficial ElectronMail app".

Note I've not looked closely at the app but superficially it's likely more secure than the web or playstore app. The fact that it also integrates with tutanota is big convenience gain as well.

PM is non-free s/w masquerading as free software

It seems Protonmail is using a swindle from the DuckDuckGo playbook: they claim to be "transparent" and "open" by releasing something as free software or open source, but the more important code remains closed-source. This marketing fools the majority. Sure, the openpgpjs is useful for auditors to see the web UI may be safe, assuming the open source version is what the user receives every time they visit the site, but the app (which puts the user in control of updates) is apparently unavailable for review. So users must choose between trusting something that is closed and tied to known privacy abuses, or something that can change at any moment without review.

## gratis service is not about the money, it's about privacy >> If you want to security, you need to pay. What happened to Open-Source Love? > Turns out running a free email service costs money. Funding a project by charging fees has a privacy downside: it's hard to pay anonymously. Even with cryptocurrency, it can be sufficiently anonymous given a huge effort but that's not realistic. Most exchangers are privacy abusers and even cryptocurrency ATMs often scan IDs. So it's difficult to pay anonymously. Targeted advertising is an even bigger privacy abuse than tracing money IMO. But donations and/or untargeted ads are the more privacy-respecting ways to fund a project. Incidentally that kind of funding is also more inclusive (poor people are not excluded). ## using an MUA > Also, the bridge =/= a desktop email client. It's just a way to receive your emails in, say, Thunderbird. It's unclear exactly what your issue is @Shifterovich. The bridge facilitates running an MUA of your choice. Both have limitations as I understand it: | mechanism | limitation | |--|--| | protonmail bridge | limited to MUAs that run on the same platform (or LAN) as the bridge; MUA need not be PGP-capable | | hushmail's standard imap/pop3 svc | limited to PGP-capable MUAs; no platform limitation but requires more advanced users | I suspect the Protonmail bridge is also needlessly proprietary and redundant. IIRC there is free software middleware that can do the encryption/decryption outside the MUA. Would be better if PM supported that tool and offered imap, pop3, smtp. ## Protonmail needlessly imposes both motivation and expertise on novices >> For example you can't "Send encrypted messages to external recipients". > Sorry, but this is wrong. ProtonMail 3.14 (released in July 2018) added the ability to import GPG keys of external recipients. What @hasanalizxc should have said is that **novice** users cannot send encrypted messages to external recipients without an unusual degree of motivation. PM added that capability in a manner that requires users to be advanced enough to handle key management. It's a non-starter for a large portion PM's users. Motivation is a big factor. Many novice users could handle the key management if they had a tolerance for learning it. Even when a novice has the benefit of a hand-holding walk-through, they tend to resist. Hushmail already solved this problem decades past. Hushmail has a public key server whereby expert users can do all the key management so the novice users need not know the details beyond their interest. For me it was critical. It was a great benefit to tell my novice correspondents (e.g. accountants and lawyers) "get a gratis hushmail account and i'll take care of the rest". Then I can use my own MUA and key pair and both obtain the pubkey of the other party and push my key to the server, all with no effort on their part. So only one person needs care about privacy and be motivated, not two. It's possible to use e2e crypto this way with unmotivated novices. So now HM charges a premium which has driven users to PM. But PM is a non-starter in many delicate situations where one party to the conversation is repulsed by what they perceive as paranoid Cloak-And-Dagger antics. It's already difficult enough to get novice users to open a HM or PM account, now to ask them to follow steps to send me their pubkey and the follow more steps to accept mine is a show-stopper. Because that hurdle is blocking in many situations, I'm forced into the walled-garden of Protonmail in order to correspond in these fragile-motivation cases. It's not a particularly evil walled-garden but being forced to use another dedicated GUI app or web UI for something as regular as email tests my own motivation. > Even before 3.14, it was possible to send password-protected e-mails that are accessible in the web browser. That introduces a key exchange problem that public key crypto solves. It trades one problem for another. ## what PTIO should endorse (ElectronMail) >> without the usage of extensions > Considering that most web browsers automatically update their installed extensions, we wouldn't recommend using extensions for end-to-end encryption, too. That's true, but it doesn't defeat @kewde's ultimate (neglected) conclusion which is still a good point: > We should recommend on-device email applications, not services. This is aligned with Nadim Kobeissi's stance and it makes perfect sense. Any app where the user is in control of the updates is on the relatively safer side of the mass surveillance likeliness line. They can still be targeted but the PTIO mission is mass surveillance and endorsing javascript that implements crypto is a bad idea. In principle it would make sense to note something like "e2e crypto reasonably safe with their app". But in this case it's a bit disgusting to see that PMs app is *exclusively* distributed in the privacy-abusing walled-garden of Google Playstore (the abuses of which are outlined in part 2 of [this post](https://github.com/privacytoolsIO/privacytools.io/issues/779)). I therefore propose something like: "e2e crypto reasonably safe with the unofficial ElectronMail app". Note I've not looked closely at the app but superficially it's likely more secure than the web or playstore app. The fact that it also integrates with tutanota is big convenience gain as well. ## PM is non-free s/w masquerading as free software It seems Protonmail is using a swindle from the DuckDuckGo playbook: they claim to be "transparent" and "open" by releasing [something](https://protonmail.com/blog/openpgpjs-3-release/) as free software or open source, but the more important code remains closed-source. This marketing fools the majority. Sure, the openpgpjs is useful for auditors to see the web UI *may* be safe, assuming the open source version is what the user receives every time they visit the site, but the app (which puts the user in control of updates) is apparently unavailable for review. So users must choose between trusting something that is closed and tied to known privacy abuses, or something that can change at any moment without review.
ghost commented 2019-03-19 15:35:36 +00:00 (Migrated from github.com)

Last week Protonmail released a post in which it used virus marketing based on a fake document to attract users from Russia. Now I have no doubts that they are cooperating with the authorities of this country.

It would be best to avoid conspiracy theories while discussing here.

> Last week Protonmail released a [post](https://protonmail.com/blog/russia-block/) in which it used virus marketing based on a fake document to attract users from Russia. Now I have no doubts that they are cooperating with the authorities of this country. It would be best to avoid conspiracy theories while discussing here.
ghost commented 2019-03-19 17:39:07 +00:00 (Migrated from github.com)

If it is easy to verify the 'fact' that PM is cooperating with the authorities of a country (assuming you meant in a way that undermines security or privacy), then you should be easily able to provide evidence.

If it is easy to verify the 'fact' that PM is cooperating with the authorities of a country (assuming you meant in a way that undermines security or privacy), then you should be easily able to provide evidence.
t1011 commented 2019-03-19 18:05:21 +00:00 (Migrated from github.com)

If it is easy to verify the 'fact' that PM is cooperating with the authorities of a country (assuming you meant in a way that undermines security or privacy), then you should be easily able to provide evidence.

I deleted my messages so you wouldn't be upset. After all, I don't care if people don't want to get to the bottom of the problem and want to explain all the conspiracy theories.

> > > If it is easy to verify the 'fact' that PM is cooperating with the authorities of a country (assuming you meant in a way that undermines security or privacy), then you should be easily able to provide evidence. I deleted my messages so you wouldn't be upset. After all, I don't care if people don't want to get to the bottom of the problem and want to explain all the conspiracy theories.
ghost commented 2019-03-19 21:32:59 +00:00 (Migrated from github.com)

Key expiration mistreated by Protonmail

I should mention that there is a key expiration policy at Protonmail that is detrimental to security. It's not a major problem but I'll mention it here for the record. When a key expires Protonmail outright blocks users from using it without question or override. This policy demonstrates that the designers of Protonmail do not thoroughly grasp the purpose of key expiry.

When a key is compromised or lost, key holders are responsible for updating their key immediately and revoking the original key (when possible), regardless of expiry. At that point the expiration serves to limit the duration of the compromise, as some correspondents will continue to use the bad key because they won't know until expiry to get a replacement key. In the absence of a lost or compromised key (i.e. the key is usable), keys often expire without the key holder noticing. These keys are still perfectly valid and fit for purpose to the extent that the key size and algorithm are still suitable for the payload. Senders have a duty to verify whether there is a better replacement key available. But when the answer is /no/, then the key they hold is still the best and most recent key. Protonmail's policy is to block the use of the best key available in that circumstance, which needlessly compels Protonmail users to send messages in the clear. It's brain dead policy.

What PM should be doing

When a user attempts to use an expired key, PM should intervene with warning dialog instructing users to verify whether a replacement key is available. If yes, PM should import the key. If no, PM should use the expired key for that message and every msg thereafter until the key isn't expired.

# Key expiration mistreated by Protonmail I should mention that there is a key expiration policy at Protonmail that is detrimental to security. It's not a major problem but I'll mention it here for the record. When a key expires Protonmail outright blocks users from using it without question or override. This policy demonstrates that the designers of Protonmail do not thoroughly grasp the purpose of key expiry. When a key is compromised or lost, key holders are responsible for updating their key immediately and revoking the original key (when possible), regardless of expiry. At that point the expiration serves to limit the duration of the compromise, as some correspondents will continue to use the bad key because they won't know until expiry to get a replacement key. In the absence of a lost or compromised key (i.e. the key is usable), keys often expire without the key holder noticing. These keys are still perfectly valid and fit for purpose to the extent that the key size and algorithm are still suitable for the payload. Senders have a duty to verify whether there is a better replacement key available. But when the answer is /no/, then the key they hold is still the best and most recent key. Protonmail's policy is to block the use of the best key available in that circumstance, which needlessly compels Protonmail users to send messages in the clear. It's brain dead policy. # What PM should be doing When a user attempts to use an expired key, PM should intervene with warning dialog instructing users to verify whether a replacement key is available. If yes, PM should import the key. If no, PM should use the expired key for that message and every msg thereafter until the key isn't expired.
blacklight447 commented 2019-08-28 17:45:58 +00:00 (Migrated from github.com)

If you ask me, what proton mail does is still end to end encryption.
Sure they can backdoor it by editing the java script, but this could be made very hard if a user visits using tor browser, as they can no longer do the targeted attack. end to end encryption with a bigger attack surface is still end to end encryption. therefor i will be closing this issue, if anyone disagrees, they can comment to re open the issue,

If you ask me, what proton mail does is still end to end encryption. Sure they can backdoor it by editing the java script, but this could be made very hard if a user visits using tor browser, as they can no longer do the targeted attack. end to end encryption with a bigger attack surface is still end to end encryption. therefor i will be closing this issue, if anyone disagrees, they can comment to re open the issue,
ghost commented 2019-08-28 18:52:59 +00:00 (Migrated from github.com)

If you ask me, what proton mail does is still end to end encryption.
Sure they can backdoor it by editing the java script, but this could be made very hard if a user visits using tor browser, as they can no longer do the targeted attack. end to end encryption with a bigger attack surface is still end to end encryption. therefor i will be closing this issue, if anyone disagrees, they can comment to re open the issue,

Using Tor doesn't really help with this, they can still see that its you/your account logged in.

> If you ask me, what proton mail does is still end to end encryption. > Sure they can backdoor it by editing the java script, but this could be made very hard if a user visits using tor browser, as they can no longer do the targeted attack. end to end encryption with a bigger attack surface is still end to end encryption. therefor i will be closing this issue, if anyone disagrees, they can comment to re open the issue, Using Tor doesn't really help with this, they can still see that its you/your account logged in.
blacklight447 commented 2019-08-28 19:00:53 +00:00 (Migrated from github.com)

Even then, as stated above e2ee with larger attack surface is still e2ee.

Even then, as stated above e2ee with larger attack surface is still e2ee.
This repo is archived. You cannot comment on issues.
No Milestone
No Assignees
1 Participants
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: privacyguides/privacytools.io#670
No description provided.