GPG Suite 2018.2
Security Update
This releases addresses EFAIL, an exploit of a weakness in the OpenPGP standard and the handling of mixed content – encrypted content and plain content in the same message – in macOS Mail, GPGMail, as well as other OpenPGP plugins, which could help an attacker in posession of a target's encrypted messages to extract their content once decrypted. (https://efail.de)
This releases addresses EFAIL, an exploit of a weakness in the OpenPGP standard and the handling of mixed content – encrypted content and plain content in the same message – in macOS Mail, GPGMail, as well as other OpenPGP plugins, which could help an attacker in posession of a target's encrypted messages to extract their content once decrypted. (https://efail.de)
EFAIL mitigations in GPGMail (10.13 only at the moment)
- Remote content is no longer loaded within encrpyted messages
- If a message contains more than one encrypted part only the first part is decrypted
- In case of mixed content – plain content and encrypted content – the plain content is isolated
- Additional mitigations for S/MIME since unfortunately Apple has yet to completely fix EFAIL
Native GPG Suite update notifications
- The GPG Suite updater uses native macOS notifications now to alert the user of updates
- That means you will no longer be interruped in the middle of your work (or talk - sorry Edward Snowden at 34C3)
Revamped key signing dialog
- The GPG Keychain dialog to sign a key has been vastly improved
- It is now easier to sign your friends keys after you have verified them (thanks DKG for the input)
GPGMail 3.0b6 (10.13 only)
Improvements
- EFAIL mitigations for GPGMail [#981]
- Better support for iPGMail messages [#964]
- Signatures created by subkeys now show the subkey fingerprint in the signature details
- The signature details window was completely revamped [#619]
Fixes
- Crash that might occur when a message looked like a MS Exchange modified PGP/MIME message as well as a Pseudo-PGP/MIME message at the same time [#978]
- Attachments containing a detached signature are no longer erroneously recognized as encrypted attachment [#958]
- Attachments in the .doc format could in some rare cases not be displayed [#974]
- PGP Data within a S/MIME signed message was not decrypted properly [#973]
- GPGMail health indicator design (in Preferences) adjusted to match macOS High Sierra's appearance [#968]
- Improved handling of MDC errors [#980]
GPGMail 2.7.2 (10.12 only)
Improvements
- Signatures created by subkeys now show the subkey fingerprint in the signature detail
- The signature details window was completely revamped [#619]
Fixes
- Improved handling of MDC errors [#980]
GPGMail 2.6.5 (10.9 - 10.11)
Improvements
- Signatures created by subkeys now show the subkey fingerprint in the signature details
- The signature details window was completely revamped [#619]
Fixes
- Improved handling of MDC errors [#980]
GPG Keychain 1.4.3
Improvements
- Revamped the key signing dialog [#282]
- Default key server is now sks key server pool when no defaul key server is set [#445]
- Warning message about password length improved [#438, #436]
- Added tooltip for the key's "Disable" option [#443]
Fixes
- Option to include secret key during key export was not always shown [#439]
GPG Suite Preferences 2.1.2
Improvements
- Email is pre-filled in "Send Report" when user entered an email in the Crash Reporting option [#99]
- When no key server is set, sks key server pool is used as default [#101]
GPGServices 1.11.3
Fixes
- GPGServices again works as expected with Microsoft Office 2016 and TorBrowser [#235]
MacGPG 2.2.7
Improvements
- Updated to GnuPG 2.2.7 [#713]
- Enables the internal CCID driver for smart card access [#707]
- Adds support for key servers protected by HTTP basic auth [#712]
Libmacgpg 0.8.4
Improvements
- Use the hkps sks key server pool by default if no key server is set [#159]
Fixes
- Aborts decryption and doesn't return decrypted data if MDC is missing or corrupted (mitigation against efail)
- Do not allow unencrypted plaintext in an encrypted message to prevent encryption spoof [#162]
- Do not throw an error when encrypting symmetrically and there's no pubring [#160]
- LDAP server search now shows name and email and not only key id [#158]