|
|
Message-ID: <CAH8yC8=+OjMZk4ZckBbicLK_q3GHCxRkZXJv_zCqSKa4D0Q-pA@mail.gmail.com>
Date: Sun, 28 Dec 2025 19:23:04 -0500
From: Jeffrey Walton <noloader@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: Many vulnerabilities in GnuPG
On Sun, Dec 28, 2025 at 6:14 PM Sam James <sam@...too.org> wrote:
>
> [...]
> Finally, to end the dump of what I know so far: Werner Koch has
> published a response to the cleartext signature vulnerabilities:
> https://gnupg.org/blog/20251226-cleartext-signatures.html.
Also see dkg's post from 2014 at
<https://dkg.fifthhorseman.net/notes/inline-pgp-harmful/>. From the
article:
People often suggest that inline PGP signatures in e-mail are somehow
more compatible or more acceptable than using PGP/MIME. This is a
mistake. Inline PGP signatures are prone to several failure modes, up
to and including undetectable message tampering.
Jeff
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.