Category Archives: Information

General news/information to the CAcert community or about security in general

Efail: How you can still trust in GPG/PGP encryption

Use a safe e-mail client

The EFAIL attacks exploit vulnerabilities in the OpenPGP and S/MIME standards to reveal the plaintext of encrypted emails. In a nutshell, EFAIL abuses active content of HTML emails, for example externally loaded images or styles, to exfiltrate plaintext through requested URLs.

However, according to the German Federal Office for Information Security, the e-mail encryption standards mentioned can be used securely if they are correctly implemented and configured.

There should be no problem, if you and your e-Mail partner use one of the green marked e-mail clients. Even if your client has a red flag, it can be sure; you may do some further research (f.eg. Mailpile). But, do you know the software, others are using? The incident once again demonstrates the importance of trust in communication. Further reading about CAcert’s Web of Trust.

The published vulnerabilities show in particular that, in addition to careful handling of the private key to be kept secret, the security of the e-mail programs used and their configuration can also be decisive.

  • Basically, do not display or generate e-mails in HTML format.
  • In particular, the execution of active content, i.e. display of e-mails in HTML format and reloading of external content, should be switched off.
  • If an e-mail provider offers the possibility to do this via the settings of its webmail application, appropriate measures should also be implemented here.
  • Some vendors will publish patches that either fix the EFAIL vulnerabilities or make them much harder to exploit. So, update your e-mail client and the encryption extension.

For sensitive information that must be sent by e-mail, the following procedure can be used: Decrypt S/MIME or PGP emails in a separate application outside of your email client. Decrypt incoming encrypted emails by copy&pasting the ciphertext into a separate application that does the decryption for you. That way, the email clients cannot open exfiltration channels. This is currently the safest option with the downside that the process gets more involved.

Webmail seams not to be under attack, neither Mailvelope or PEP. All of them are not affected. So, the conclusion should not be to uninstall encryption, but to review your e-mail client, update it and adjust the properties.

CAcert.org is a community-driven Certificate Authority that issues certificates to the public at large for free. These certificates can be used to digitally sign and encrypt email, authenticate and authorize users connecting to websites and secure data transmission over the internet. CAcert has more than 358 000 users, is operated by volunteers and financed by donations.

Further reading:
OpenPGP is safer than S/MIME (by GnuPG)

Please, help us to pay our expenses

CAcert offers free certificates. Nevertheless, the CA does not function completely without money. For example, the electricity bills of the data centre in the Netherlands must be paid. The annual expenses of CAcert are about 3000 dollars/Euro. In view of the more than 300,000 users, that’s not much. How does CAcert pay these bills?

First of all, the membership fees of the members of CAcert Inc. (association) cover about 1/6 of the expenses. The remaining 2,500 require donations. In the first quarter of 2018, 11 people from 6 countries from Australia through Tatarstan to the United Kingdom made a donation.The chart on the left shows the distribution of donors by country (USA, UK, France, Germany, Australia, Tatarstan). To the right of the amount donated: one quarter each comes from the USA and Australia. We thank all donors very much for their generosity. In order to pay all bills by the end of the year, twice as many people would have to donate an amount.

Possibilities
Bank transfer in Euro:
secure-u e.V. / Bank: Hamburger Volksbank e.G. / IBAN: DE50 2019 0003 0008 5478 07 /           BIC: GENODEF1HH2 (“for CAcert”) (secure-u-association is our local partner in Germany)
Bank Transfer in Australia:
Westpac Bank for AU$: Account Name: CAcert Inc / SWIFT: WPACAU2S / Account No.: 180264
Paypal:
https://www.paypal.com/   (currently not working due to Paypal Issue)
Paypal donation via secure-u e.V.

French translation   |   German Translation

Faites comme d’autres francophones: soutenez CAcert avec un don

CAcert offre des certificats gratuits. Néanmoins, l’AC ne fonctionne pas complètement sans argent. Par exemple, les factures d’électricité du centre de données aux Pays-Bas doivent être payées. Les dépenses annuelles de CAcert s’élèvent à environ 3000 dollars/Euro. Compte tenu des plus de 300 000 utilisateurs, ce n’est pas grand-chose. Comment CAcert paie-t-il ces factures ?

Tout d’abord, les frais d’adhésion des membres de l’association CAcert Inc. couvrent environ 1/6 des dépenses. Les 2 500 autres nécessitent des dons. Au cours du premier trimestre 2018, 11 personnes de 6 pays, de l’Australie au Royaume-Uni en passant par le Tatarstan, ont fait un don.

Le graphique de gauche montre la répartition des donateurs par pays (États Unis, Royaume Unis, France, Allemagne, Australie, Tatarstan). A droite du montant du don: un quart provient des États-Unis et un quart de l’Australie. Nous remercions tous les donateurs pour leur don. Pour payer toutes les factures d’ici la fin de l’année, deux fois plus de personnes devraient faire un don.

Possibilités
Virement bancaire en Euro:
secure-u e.V. Banque: Hamburger Volksbank e.G. / IBAN: DE50 2019 0003 0008 5478 07 BIC: GENODEF1HH2 (“pour CAcert”) (l’association secure-u est notre partenaire local en Union Européenne)
Virement bancaire en Australie en AU$:
Compte bancaire Westpac pour AU$: Nom du compte : CAcert Inc. / SWIFT : WPACAU2S /      N° de compte : 180264
Paypal:
https://www.paypal.com/   ( currently not working due to Paypal Issue)
Paypal donation via secure-u e.V.

Gemeinschaft trägt CAcert – auch finanziell

CAcert bietet freie Zertifikate an. Trotzdem funktioniert die CA nicht ganz ohne Geld. So müssen etwa die Stromrechnungen des Rechenzentrums in den Niederlanden beglichen werden. Die jährlichen Ausgaben von CAcert belaufen sich auf rund 3000 Dollar/Euro. Im Anbetracht der über 300 000 Benutzer ist das nicht viel. Wie bezahlt CAcert diese Rechnungen?

Zuerst einmal aus den Mitgliederbeiträgen der Mitglieder von CAcert Inc. (Verein). Die decken etwa 1/6 der Ausgaben. Für die übrigen 2500 sind Spenden nötig. Im ersten Vierteljahr von 2018 haben 11 Leute aus 6 Ländern von Australien über Tatarstan bis zum Vereingten Königreich eine Spende getätigt.Die linke Grafik zeigt die Verteilung der Spender nach Ländern (USA, UK, Frankreich, Deutschland, Australien, Tatarstan). Rechts nach der gespendeten Summe: je ein Viertel stammen aus den USA und aus Australien. Wir danken allen Spendern ganz herzlich für ihre Gabe. Um bis Ende Jahr alle Rechnungen bezahlen zu können, müssten jedoch doppelt so viele Leute einen Betrag spenden.

Möglichkeiten
Banküberweisung in Euro:
secure-u e.V. Bank: Hamburger Volksbank e.G. / IBAN: DE50 2019 0003 0008 5478 07            BIC: GENODEF1HH2 (“für CAcert”) (secure-u ist unser lokaler Partner in Deutschland)
Banküberweisung in Australien:
Westpac Bank for AU$: Account Name: CAcert Inc / SWIFT: WPACAU2S / Account No.: 180264
Paypal:
https://www.paypal.com/   (aktuell durch Paypal-Probleme nicht möglich)
Paypal-Spende via secure-u e.V.

New committee constituted

CAcert Inc.’s Annual General Meeting was held shortly before Christmas. Most of the members of the committee have made themselves available for another year. Two members, who also perform other tasks within the CAcert-community, will focus on this in the future.

On January 12th (January 13th, local time in New South Wales) the committee was constituted. However, he has already started work before. As mentioned at the Annual General Meeting, two points are at the top of the pendency list this year: Balanced finances and progress in moving to Europe.

Neuer Vorstand konstituiert

Kurz vor Weihnachten hat die Generalversammlung von CAcert Inc. stattgefunden. Die meisten Mitglieder des Vorstandes haben sich für ein weiteres Jahr zur Verfügung gestellt. Zwei Mitglieder, die auch noch andere Aufgaben innerhalb der CAcert-Gemeinschaft wahrnehmen, konzentrieren sich in Zukunft auf diese.

Am 12. Januar 2018 (13. Januar Ortszeit in Neusüdwales) hat sich der Vorstand konstituiert. Die Arbeit hat er jedoch bereits vorher aufgenommen. Wie bereits an der Generalversammlung gesagt, stehen dieses Jahr zwei Punkte ganz oben auf der Pendenzenliste: Ausgeglichene Finanzen und Fortschritte im Umzug nach Europa.

Nouvelle composition du comité

L’assemblée générale annuelle de CAcert Inc. a eu lieu peu avant Noël. La plupart des membres du comité se sont rendus disponibles pour une nouvelle année. Deux membres, qui s’acquittent également d’autres tâches au sein de la communauté CAcert, se concentreront sur ces questions à l’avenir.

Le 12 janvier 2018 (le 13 janvier, heure locale en Nouvelle-Galles du Sud), le comité a été constitué. Cependant, il a déjà commencé à travailler auparavant. Comme cela a déjà été mentionné lors de l’assemblée générale, deux points sont en tête de liste cette année: Des finances équilibrées et des progrès dans la migration vers l’Europe.

CAcert Inc. has a new Public Officer

Hand over in front of the government house in Sydney, New South Wales.

Since 2011, Kevin Dawson held as public officer liaison to the New South Wales government offices. At his own request he would like to step a little shorter. The committee of CAcert Inc. regrets this decision and thanks Kevin for his tireless efforts in the background and wishes him all the best for the future.

These days, the office was handed over to Alexander Samad, who has been a member of the committee since March 2017. Alexander fulfills all legal obligations for this office.

Deutsch: CAcert Inc. hat neuen Public Officer

Rund sechs Jahre war Kevin Dawson als Public Officer der Verbindungsmann von CAcert Inc. zu den Neusüdwalisischen Regierungsstellen. Auf seinen eigenen Wunsch möcht er nun etwas kürzer treten. Der Vorstand von CAcert Inc. bedauert den Entscheid und dankt Kevin für seinen unermüdlichen Einsatz im Hintergrund und wünscht ihm für die weitere Zukunft alles Gute.

Dieser Tage erfolgte die Amtsübergabe an Alexander Samad, der seit dem 31. März 2017 dem Vorstand angehört. Alexander erfüllt alle gesetzlich vorgeschriebenen Pflichten für dieses Amt.

Français: Un nouveau Officer Public pour CAcert Inc.

Depuis 2011, Kevin Dawson était l’officier public pour la liaison avec les organismes gouvernementaux de la Nouvelle-Galles du Sud. À sa propre demande, il avait maintenant pris sa retraite. Le comité de CAcert Inc. regrette cela et aimerait remercier Kevin pour ses efforts inlassables en arrière-plan et lui souhaite le meilleur pour l’avenir.

Cette journée a été la remise officielle à Alexandre Samad, qui appartient au comité depuis le mars 2017. Alexandre répond à toutes les exigences légales pour ce poste.

CAcert and secure-u at FrOScon 2017

FrOSCon open its doors on August, 19th + 20st, and of course, CAcert is present!

On the annual FrOSCon event CAcert is present, willing to assure members and to have nice talks to the public. We are very pleased to take part in an event targeted on free software and open source. FrOSCon takes place at Hochschule Bonn-Rhein-Sieg in Sankt Augustin, near Cologne (Köln). We’re happy to welcome you there and enjoy nice talks about securing yourself on the Internet.

If you want to be part of the events-team at FrOSCon feel free to add yourself to our wiki page at https://wiki.cacert.org/Events/FrOSCon2017.

Next to CAcert there will by stand by secure-u, who support CAcert-Teams since years.

Updates for blog and bugs

We just updated some of our servers to the latest updates:

https://blog.cacert.org/ to the latest WordPress-release.

https://bugs.cacert.org/ to the latest mantis-release.

Furthermore the client certificate login on https://bugs.cacert.org was activated by today for Class-3 certificates. To login you have to enter your username or email-adress of your mantis-account.

Trying to login to https://bugs.cacert.org/ using an unknown email-adress will NOT create a new account: You have to create an account first using the email-adress, which is listed in your client certificate. If you already have an account at https://bugs.cacert.org/ you may change the email-adress of your account to the first email-adress in your client-certificate.

If the certificate-authentication fails (no matter, if you use no client certificate, an expired one or a certificate, which does not match your email-adress) you can use the normal “classic” username/password-credentials to login.

If you try to use a Class-1-client certificate, you currently will may probably receive an error-message like “ERR_BAD_SSL_CLIENT_AUTH_CERT”. In this case please login without a client certificate or create a Class-3-certificate.

In case you face any issues don’t hesitate to contact us for help.

Kind regards,

dirk astrath (CAcert blog admin/CAcert software assessor)

Certificate Login for CAcert wiki

Within the last days I ran some tests using the certificate login for https://wiki.cacert.org/.

This evening I activated this function on our wiki server.

Trying to login to https://wiki.cacert.org/ using an unknown email-adress will NOT create a new account: You have to create an account first using the email-adress, which is listed in your client certificate.

If the certificate-authentication fails (no matter, if you use no client certifcate, an expired one or a certificate, which does not match your email-adress) you can use the normal “classic” username/password-credentials to login.

While installing the client certificate login for CAcert wiki I updated the root-certificate there to the resigned one.

Kind regards,

Dirk Astrath (CAcert wiki admin)

Bugs updated

Within the last days we ran some tests and updated the CAcert Bugtracker https://bugs.caccert.org/ .

It’s now running with the latest version of Mantis, which now has a responsive design. You may now read, add and comment bugreports even from your Smartphone or Tablet.

Two additional changes were done while updating to Mantis 2.4.0:

(1) The certficate chain of https://bugs.cacert.org was updated to the resigned roots.

(2) You may now login using your Mantis username or your email-adress.

This change is needed for the next update, which will be activated in some days:

You may then login to Mantis using a valid CAcert certificate. We’ll give you an update as soon as the tests are finished and the plugin is activated.

Kind regards,

Dirk Astrath (CAcert Software Assessor)