Relax 😎! GPG is not OpenPGP!

Yesterday, vulnerabilities were published gpg.fail but they don't affect #deltachat or other #chatmail clients because

A) We never used #gnupg for anything; we use the modern #rustlang #openpgp implementation @rpgp, security audited multiple times.

B) #openpgp is fine, as modernized in #RFC9580, which already warns against several #gpgfail issues (gpg didn't implement that spec)

Please spread the word that #gpg is not #openpgp ... Thanks! #39c3

This entry was edited (2 weeks ago)
in reply to m_on_stair

@m yes, rpgp folks are checking this in more detail. It's relatively certain, though, that deltachat's intentionally minimal usage of openpgp (and rpgp) is not touching the problematic code paths and issues identified in gpgfail. Give it a bit of time. There was no upfront disclosure of anything to rpgp folks, and it's Sunday in a see of holidays around, and #39c3 is still ongoing.
in reply to Jan

@jan once details are published, and #39c3 is over, well take another look. But note that #deltachat's usage of #openpgp is intentionally minimal. #Gpgfail is a lot about failures of signature verification, and parsing problems in the gpg c-implementation but #deltachat doesn't use these mechanisms or code at all. The @rpgp folks are still studying the details, and there might be issues, so maybe also follow them for more details. Again, this doesn't affect deltachat as things stand.
in reply to Delta Chat

Hi,

For those interested we have a master ticket dev.gnupg.org/T7900 which lists all the claimed bugs. Actually there is only one major bug (T7906 - armor parser) which was fixed early November. T7901 requires a 2nd pre-image attack on SHA1- which does nor yet exist. T7907 (plaintext recovery) is simply untrue; see dev.gnupg.org/T7907#210501

BTW, of course we sign our commits and most of us even use hardware tokens.

- wk@gnupg.org