[liberationtech] Mailvelope: OpenPGP Encryption for Webmail

Petter Ericson pettter at acc.umu.se
Tue Dec 11 06:31:23 PST 2012


I would claim that the expected behaviour would be to use any available
keystore by default, or alternatively (if none is found) to install its
own in a "default" location. On *nix, this is usually ~/.gnupg, and if 
GPG4Win is "widely" used on windows, I would expect one such keystore to
be implemented.

However, I am unsure how much of this can be done from browser plugins.

Still, with the caveats mentioned further down the thread, I have to
say this is a great thing, at first glance. More (and better) encryption
tools make more (and better) encryption!

Cheers

/P

On 11 December, 2012 - Robbie MacKay wrote:

> "1. Mailvelope appears to use its own keystore (at least on Windows), and
> not the
>    GPG keystore.  Specifically, it doesn't use the GPG4Win keystore, which
> is
>    the one I'd expect it to use."
> 
> In some ways this is great: it means novice users don't have to worry about
> getting GPG4Win or any other keystore installed first. Simplifying
> encryption for end users is definitely better, though I can't speak to the
> quality of their implementation. For those of us who already have a GPG
> keystore set up (and existing keys) I'd definitely rather it used those.
> 
> On Tue, Dec 11, 2012 at 9:16 AM, Nick Daly <nick.m.daly at gmail.com> wrote:
> 
> > On Mon, Dec 10, 2012 at 1:42 PM, Fabio Pietrosanti (naif)
> > <lists at infosecurity.ch> wrote:
> > > Hi all,
> > >
> > > for whose who has still not see that project, i wanted to send a notice
> > > about MailVelope, OpenPGP encryption for webmail:
> > http://www.mailvelope.com
> > >
> > > It's a client-side, plug-in based (similar to CryptoCat), OpenPGP email
> > > encryption plugin available for Chrome and Firefox.
> > >
> > > Source code is available under AGPL on
> > > https://github.com/toberndo/mailvelope .
> > >
> > > Does anyone ever security reviewed it?
> > > --
> > > Unsubscribe, change to digest, or change password at:
> > https://mailman.stanford.edu/mailman/listinfo/liberationtech
> >
> > This (could finally be) email encryption done right: encryption is
> > performed on the user's browser, so that the server storing the
> > communication never sees the contents of the message.
> >
> > However, after installing it on Chrome, I have a few concerns:
> >
> > 1. Mailvelope appears to use its own keystore (at least on Windows), and
> > not the
> >    GPG keystore.  Specifically, it doesn't use the GPG4Win keystore, which
> > is
> >    the one I'd expect it to use.
> >
> > 2. When creating a new PGP key in Mailvelope, it has some pretty poor
> > defaults.
> >
> >    A. Keys are set to 1024 bits, instead of 2048 (or 4096).  Anything
> >       under 2048 is probably insufficient.
> >
> >    B. Keys are set to never expire, and that can't be configured.
> >       Different keys should be used for different purposes and should
> >       expire differently.  It's not a bad idea to cause email-signing
> >       keys to expire after 3 - 5 years.
> >
> > Both 2.A and 2.B can be fixed through GPA or another frontend, but
> > that's still bad key-creation practice.
> >
> > However, it *does* show the long-form key ID (the last 8 bytes of the
> > fingerprint), which is probably the minimum necessary to avoid most
> > collision attacks.
> >
> > Nick
> > --
> > Unsubscribe, change to digest, or change password at:
> > https://mailman.stanford.edu/mailman/listinfo/liberationtech
> >
> 
> 
> 
> -- 
> Robbie Mackay
> 
> Software Developer, External Projects
> Ushahidi Inc
> m: +64 27 576 2243
> e: robbie at ushahidi.com
> skype: robbie.mackay

> --
> Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech

-- 
Petter Ericson (pettter at acc.umu.se)

Telecomix Sleeper Jellyfish



More information about the liberationtech mailing list