{"id":11400,"date":"2019-05-06T14:16:55","date_gmt":"2019-05-06T12:16:55","guid":{"rendered":"https:\/\/test-blog.mailfence.com\/?p=11400"},"modified":"2024-06-04T15:55:51","modified_gmt":"2024-06-04T13:55:51","slug":"mailfence-usurpation-de-signature-openpgp","status":"publish","type":"post","link":"https:\/\/blog.mailfence.com\/fr\/mailfence-usurpation-de-signature-openpgp\/","title":{"rendered":"Usurpation de signature OpenPGP : Mailfence n&rsquo;est pas vuln\u00e9rable"},"content":{"rendered":"\n<p><br>De nouvelles vuln\u00e9rabilit\u00e9s dans de nombreux clients de messagerie compatibles <a href=\"https:\/\/blog.mailfence.com\/fr\/quest-ce-qu-openpgp-confidentialite-chiffrement\/\">OpenPGP<\/a> et <a href=\"https:\/\/blog.mailfence.com\/fr\/technique-cryptage-de-bout-en-bout\/\">S\/MIME<\/a> ont \u00e9t\u00e9 <a href=\"https:\/\/github.com\/RUB-NDS\/Johnny-You-Are-Fired\/blob\/master\/paper\/johnny-fired.pdf\">annonc\u00e9es le 30-04-2019<\/a>. Ces vuln\u00e9rabilit\u00e9s d&rsquo;usurpation de signature exploitent les faiblesses dans la mani\u00e8re dont les signatures OpenPGP sont v\u00e9rifi\u00e9es par les clients de messagerie et dont le r\u00e9sultat de v\u00e9rification est pr\u00e9sent\u00e9 \u00e0 l&rsquo;utilisateur. <strong>Selon notre analyse, Mailfence n&rsquo;est pas concern\u00e9 par les vuln\u00e9rabilit\u00e9s d&rsquo;usurpation de signature OpenPGP d\u00e9couvertes.<\/strong><\/p>\n\n\n\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-pourquoi-mailfence-n-est-pas-affecte-par-l-usurpation-de-signature-openpgp\">Pourquoi Mailfence n&rsquo;est pas affect\u00e9 par l&rsquo;usurpation de signature OpenPGP<\/h2>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"56\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp1-1024x56.png\" alt=\"usurpation de signature \" class=\"wp-image-11054\" srcset=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp1-1024x56.png 1024w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp1-300x16.png 300w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp1-768x42.png 768w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp1-160x9.png 160w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp1-320x18.png 320w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp1-520x28.png 520w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp1-720x39.png 720w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp1-980x54.png 980w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp1.png 1168w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"239\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp-1024x239.png\" alt=\"usurpation de signature\" class=\"wp-image-11055\" srcset=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp-1024x239.png 1024w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp-300x70.png 300w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp-768x180.png 768w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp-160x37.png 160w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp-320x75.png 320w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp-520x122.png 520w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp-720x168.png 720w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp-980x229.png 980w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/eval-pgp.png 1168w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Le mod\u00e8le de l&rsquo;attaquant mentionn\u00e9 <a href=\"https:\/\/github.com\/RUB-NDS\/Johnny-You-Are-Fired\/blob\/master\/paper\/johnny-fired.pdf\">dans le document technique<\/a> est le suivant :<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>L&rsquo;en-t\u00eate Email &lsquo;From :&rsquo; est usurp\u00e9 par l&rsquo;attaquant \u00e0 l&rsquo;aide de techniques d&rsquo;usurpation d&rsquo;identit\u00e9 connues.<\/li>\n\n\n\n<li> L&rsquo;attaquant a obtenu au moins une signature OpenPGP valide en usurpant une conversation e-mail pr\u00e9c\u00e9dente de l&rsquo;utilisateur. <\/li>\n\n\n\n<li>La victime du c\u00f4t\u00e9 de la r\u00e9ception d\u00e9tient d\u00e9j\u00e0 une cl\u00e9 publique de confiance de l&rsquo;exp\u00e9diteur usurp\u00e9.<\/li>\n<\/ol>\n\n\n\n<p>Voici les types d&rsquo;attaques possibles pr\u00e9sent\u00e9es  par les chercheurs en s\u00e9curit\u00e9 :<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-attaques-sur-la-cms\">Attaques sur la CMS<\/h3>\n\n\n\n<p>Mailfence ne traite pas le format de conteneur utilis\u00e9 par S\/MIME, c&rsquo;est-\u00e0-dire la syntaxe de message cryptographique (CMS) et n&rsquo;est donc pas affect\u00e9 par ce type d&rsquo;attaque.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-probleme-specifique-a-l-api-gpg\">Probl\u00e8me sp\u00e9cifique \u00e0 l&rsquo;API GPG<\/h3>\n\n\n\n<p>Mailfence n&rsquo;utilise pas le moteur GPG et n&rsquo;est donc pas affect\u00e9 par les probl\u00e8mes sp\u00e9cifiques de l&rsquo;API GnuPG.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-attaques-mime\">Attaques <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Multipurpose_Internet_Mail_Extensions\">MIME<\/a><\/h3>\n\n\n\n<p>La m\u00e9thodologie de v\u00e9rification des signatures de Mailfence ne consid\u00e8re pas comme valides les sous-parties partiellement sign\u00e9es et\/ou int\u00e9gr\u00e9es dans un message en plusieurs parties. Dans la plupart des cas, ces messages seront consid\u00e9r\u00e9s comme non valides. De plus, tout contenu actif est toujours d\u00e9sactiv\u00e9 par d\u00e9faut. Cela signifie que lorsque vous ouvrez un message sign\u00e9, seule la v\u00e9rification de signature valide (correctement reconnue) est effectu\u00e9e.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-attaques-liees-a-l-identification\"> Attaques li\u00e9es \u00e0 l&rsquo;identification<\/h3>\n\n\n\n<p>Mailfence n&rsquo;essaie pas de lier l&rsquo;identit\u00e9 de la signature \u00e0 l&rsquo;adresse de l&rsquo;exp\u00e9diteur et affiche uniquement le r\u00e9sultat de la v\u00e9rification de la signature. En cas de doute, les utilisateurs peuvent toujours v\u00e9rifier l&rsquo;identit\u00e9 du signataire en cliquant sur le message de v\u00e9rification de signature et en le faisant correspondre avec l&rsquo;adresse de l&rsquo;exp\u00e9diteur. En ce qui concerne l&rsquo;affichage du champ FROM (\u00ab\u00a0De\u00a0\u00bb), Mailfence g\u00e8re correctement tous les caract\u00e8res sp\u00e9ciaux qui pourraient essayer de manipuler la pr\u00e9sentation de l&rsquo;interface \u00e0 l&rsquo;utilisateur.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-attaques-liees-a-l-interface-utilisateur\">Attaques li\u00e9es \u00e0 l&rsquo;interface utilisateur<\/h3>\n\n\n\n<p>Comme Mailfence bloque par d\u00e9faut tout le contenu actif, toute tentative d&rsquo;imiter le r\u00e9sultat de la v\u00e9rification de signature \u00e0 l&rsquo;aide, par exemple, de HTML, de CSS ou d&rsquo;images en ligne, est vou\u00e9e \u00e0 l&rsquo;\u00e9chec. Dans de tels cas, seul le message de v\u00e9rification de signature valide (c.-\u00e0-d. correctement reconnu) sera affich\u00e9.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-recommandations-pour-les-utilisateurs-utilisant-des-messageries-affectees-par-l-usurpation-de-signature\">Recommandations pour les utilisateurs utilisant des messageries affect\u00e9es par l&rsquo;usurpation de signature<\/h2>\n\n\n\n<p>Nous vous recommandons de prendre les mesures de pr\u00e9vention suivantes, si vous utilisez votre compte Mailfence avec <a href=\"https:\/\/github.com\/RUB-NDS\/Johnny-You-Are-Fired\/blob\/master\/paper\/johnny-fired.pdf\">l&rsquo;un des clients de messagerie concern\u00e9s<\/a> afin de vous prot\u00e9ger contre tout risque d&rsquo;usurpation de signature.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Mettez \u00e0 jour votre client et\/ou plugin de messagerie compatible OpenPGP<\/strong><br>Les chercheurs ont fait part de leurs r\u00e9sultats et sugg\u00e9r\u00e9 des am\u00e9liorations \u00e0 apporter aux concepteurs des messageries touch\u00e9es dans le cadre d&rsquo;un processus qu&rsquo;ils appellent la divulgation coordonn\u00e9e (<em>&lsquo;coordinated disclosure&rsquo;<\/em>). Cela permet de s&rsquo;assurer que toutes les messageries affect\u00e9es sont corrig\u00e9es avant de divulguer le probl\u00e8me au public.<\/li>\n\n\n\n<li><strong>D\u00e9sactivez l&rsquo;affichage HTML et le chargement de contenu \u00e0 distance<\/strong><br>Emp\u00eachez votre messagerie de restituer l&rsquo;affichage HTML et de charger du contenu actif. Toute tentative d&rsquo;usurpation de messages de v\u00e9rification de signature sera ainsi vou\u00e9e \u00e0 l&rsquo;\u00e9chec. R\u00e9f\u00e9rez-vous \u00e0 la documentation sp\u00e9cifique de votre client de messagerie dans ce domaine, comme celle de Thunderbird par exemple : <\/li>\n<\/ul>\n\n\n\n<p> 1. Dans le coin sup\u00e9rieur droit, cliquez sur le bouton <strong>Menu<\/strong>.<br>2. Cliquez sur <strong>Afficher<\/strong>.<br>3. Sous <strong>Corps du message Comme<\/strong>, s\u00e9lectionnez <strong>Texte brut..<\/strong><br><em>D\u00e9sactivez le contenu externe :&nbsp;<\/em><br>1. Dans le coin sup\u00e9rieur droit, cliquez sur le bouton <strong>Menu<\/strong>.<br>2.&nbsp;Cliquez sur&nbsp;<strong>Options.<\/strong><br>2.&nbsp;Sous <strong>Confidentialit\u00e9<\/strong>, s\u00e9lectionnez <strong>Texte brut<\/strong>.<br>3. Dans la section <strong>Contenu de la messagerie<\/strong>, d\u00e9cochez <strong>Autoriser le contenu distant<\/strong> dans les messages.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Il est toujours recommand\u00e9 de suivre <a href=\"https:\/\/blog.mailfence.com\/fr\/sensibilisation-la-securite-et-la-confidentialite-des-emails\/\">les bonnes pratiques<\/a> et de rester prudent. En ce qui concerne les r\u00e9sultats de la v\u00e9rification de la signature, il est toujours judicieux de v\u00e9rifier les d\u00e9tails du message affich\u00e9 (pour rechercher toute anomalie).<\/li>\n<\/ul>\n\n\n\n<p>En notre qualit\u00e9 de solution de messagerie \u00e9lectronique comptant parmi les plus <a href=\"https:\/\/mailfence.com\/fr\/email-securise.jsp\">s\u00e9curis\u00e9es<\/a> et les plus <a href=\"https:\/\/mailfence.com\/fr\/email-prive.jsp\">priv\u00e9es<\/a>, nous prenons tr\u00e8s au s\u00e9rieux la s\u00e9curit\u00e9 et la confidentialit\u00e9 des donn\u00e9es des utilisateurs et nous nous effor\u00e7ons d&rsquo;am\u00e9liorer notre service par tous les moyens possibles. Contactez-nous si vous avez des suggestions ou des questions concernant l&rsquo;usurpation de signature OpenPGP. <\/p>\n\n\n<p>Pour en savoir plus sur Mailfence, consultez notre<a href=\"https:\/\/mailfence.com\/fr\/presse.jsp\"> page de presse.<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>De nouvelles vuln\u00e9rabilit\u00e9s dans de nombreux clients de messagerie compatibles OpenPGP et S\/MIME ont \u00e9t\u00e9 annonc\u00e9es le 30-04-2019. Ces vuln\u00e9rabilit\u00e9s d&rsquo;usurpation de signature exploitent les faiblesses dans la mani\u00e8re dont les signatures OpenPGP sont v\u00e9rifi\u00e9es par les clients de messagerie et dont le r\u00e9sultat de v\u00e9rification est pr\u00e9sent\u00e9 \u00e0 l&rsquo;utilisateur. Selon notre analyse, Mailfence n&rsquo;est [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":85858,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18591,27],"tags":[],"class_list":["post-11400","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mailfence-news","category-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Usurpation de signature OpenPGP : Mailfence n&#039;est pas vuln\u00e9rable<\/title>\n<meta name=\"description\" content=\"Mailfence n&#039;est pas concern\u00e9 par le risque d&#039;usurpation de signatures OpenPGP r\u00e9cemment d\u00e9couvert. Voici quelques recommandations.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Usurpation de signature OpenPGP : Mailfence n&#039;est pas vuln\u00e9rable | Mailfence Blog\" \/>\n<meta property=\"og:description\" content=\"Usurpation de signature OpenPGP : Mailfence n&#039;est pas vuln\u00e9rable | Mailfence Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mailfence.com\/fr\/mailfence-usurpation-de-signature-openpgp\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailfence Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailfence\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-06T12:16:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-04T13:55:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/Email_headers1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"M Salman Nadeem\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@0xSalman\" \/>\n<meta name=\"twitter:site\" content=\"@mailfence\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"M Salman Nadeem\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/mailfence-usurpation-de-signature-openpgp\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/mailfence-usurpation-de-signature-openpgp\\\/\"},\"author\":{\"name\":\"M Salman Nadeem\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#\\\/schema\\\/person\\\/0a1800f7a6842b23ccef1107cec8c962\"},\"headline\":\"Usurpation de signature OpenPGP : Mailfence n&rsquo;est pas vuln\u00e9rable\",\"datePublished\":\"2019-05-06T12:16:55+00:00\",\"dateModified\":\"2024-06-04T13:55:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/mailfence-usurpation-de-signature-openpgp\\\/\"},\"wordCount\":895,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/mailfence-usurpation-de-signature-openpgp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Email_headers1.png\",\"articleSection\":[\"Quoi de neuf Mailfence\",\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/mailfence-usurpation-de-signature-openpgp\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/mailfence-usurpation-de-signature-openpgp\\\/\",\"name\":\"Usurpation de signature OpenPGP : Mailfence n'est pas vuln\u00e9rable\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/mailfence-usurpation-de-signature-openpgp\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/mailfence-usurpation-de-signature-openpgp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Email_headers1.png\",\"datePublished\":\"2019-05-06T12:16:55+00:00\",\"dateModified\":\"2024-06-04T13:55:51+00:00\",\"description\":\"Mailfence n'est pas concern\u00e9 par le risque d'usurpation de signatures OpenPGP r\u00e9cemment d\u00e9couvert. Voici quelques recommandations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/mailfence-usurpation-de-signature-openpgp\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/mailfence-usurpation-de-signature-openpgp\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/mailfence-usurpation-de-signature-openpgp\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Email_headers1.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Email_headers1.png\",\"width\":600,\"height\":600,\"caption\":\"illustration about signature spoofing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/mailfence-usurpation-de-signature-openpgp\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/category\\\/securite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Usurpation de signature OpenPGP : Mailfence n&#8217;est pas vuln\u00e9rable\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/\",\"name\":\"Mailfence Blog\",\"description\":\"Mailfence Blog. Get the latest news about secure email and Internet privacy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#organization\",\"name\":\"Mailfence\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"width\":1812,\"height\":358,\"caption\":\"Mailfence\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mailfence\\\/\",\"https:\\\/\\\/x.com\\\/mailfence\",\"https:\\\/\\\/www.reddit.com\\\/r\\\/Mailfence\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mailfence\",\"https:\\\/\\\/www.instagram.com\\\/mailfence_\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@mailfence\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Mailfence\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#\\\/schema\\\/person\\\/0a1800f7a6842b23ccef1107cec8c962\",\"name\":\"M Salman Nadeem\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"caption\":\"M Salman Nadeem\"},\"description\":\"Salman works as an Information Security Analyst for Mailfence. His areas of interest include cryptography, security architecture and design, access control, and operations security. You can follow him on LinkedIn @mohammadsalmannadeem.\",\"sameAs\":[\"www.linkedin.com\\\/in\\\/mohammadsalmannadeem\",\"https:\\\/\\\/x.com\\\/0xSalman\"],\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/author\\\/msalman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Usurpation de signature OpenPGP : Mailfence n'est pas vuln\u00e9rable","description":"Mailfence n'est pas concern\u00e9 par le risque d'usurpation de signatures OpenPGP r\u00e9cemment d\u00e9couvert. Voici quelques recommandations.","robots":{"index":"noindex","follow":"follow"},"og_locale":"fr_FR","og_type":"article","og_title":"Usurpation de signature OpenPGP : Mailfence n'est pas vuln\u00e9rable | Mailfence Blog","og_description":"Usurpation de signature OpenPGP : Mailfence n'est pas vuln\u00e9rable | Mailfence Blog","og_url":"https:\/\/blog.mailfence.com\/fr\/mailfence-usurpation-de-signature-openpgp\/","og_site_name":"Mailfence Blog","article_publisher":"https:\/\/www.facebook.com\/mailfence\/","article_published_time":"2019-05-06T12:16:55+00:00","article_modified_time":"2024-06-04T13:55:51+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/Email_headers1.png","type":"image\/png"}],"author":"M Salman Nadeem","twitter_card":"summary_large_image","twitter_creator":"@0xSalman","twitter_site":"@mailfence","twitter_misc":{"\u00c9crit par":"M Salman Nadeem","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/blog.mailfence.com\/fr\/mailfence-usurpation-de-signature-openpgp\/#article","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/fr\/mailfence-usurpation-de-signature-openpgp\/"},"author":{"name":"M Salman Nadeem","@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962"},"headline":"Usurpation de signature OpenPGP : Mailfence n&rsquo;est pas vuln\u00e9rable","datePublished":"2019-05-06T12:16:55+00:00","dateModified":"2024-06-04T13:55:51+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mailfence.com\/fr\/mailfence-usurpation-de-signature-openpgp\/"},"wordCount":895,"publisher":{"@id":"https:\/\/blog.mailfence.com\/fr\/#organization"},"image":{"@id":"https:\/\/blog.mailfence.com\/fr\/mailfence-usurpation-de-signature-openpgp\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/Email_headers1.png","articleSection":["Quoi de neuf Mailfence","S\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/blog.mailfence.com\/fr\/mailfence-usurpation-de-signature-openpgp\/","url":"https:\/\/blog.mailfence.com\/fr\/mailfence-usurpation-de-signature-openpgp\/","name":"Usurpation de signature OpenPGP : Mailfence n'est pas vuln\u00e9rable","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mailfence.com\/fr\/mailfence-usurpation-de-signature-openpgp\/#primaryimage"},"image":{"@id":"https:\/\/blog.mailfence.com\/fr\/mailfence-usurpation-de-signature-openpgp\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/Email_headers1.png","datePublished":"2019-05-06T12:16:55+00:00","dateModified":"2024-06-04T13:55:51+00:00","description":"Mailfence n'est pas concern\u00e9 par le risque d'usurpation de signatures OpenPGP r\u00e9cemment d\u00e9couvert. Voici quelques recommandations.","breadcrumb":{"@id":"https:\/\/blog.mailfence.com\/fr\/mailfence-usurpation-de-signature-openpgp\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mailfence.com\/fr\/mailfence-usurpation-de-signature-openpgp\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/blog.mailfence.com\/fr\/mailfence-usurpation-de-signature-openpgp\/#primaryimage","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/Email_headers1.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2019\/05\/Email_headers1.png","width":600,"height":600,"caption":"illustration about signature spoofing"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mailfence.com\/fr\/mailfence-usurpation-de-signature-openpgp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/blog.mailfence.com\/fr\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"https:\/\/blog.mailfence.com\/fr\/category\/securite\/"},{"@type":"ListItem","position":3,"name":"Usurpation de signature OpenPGP : Mailfence n&#8217;est pas vuln\u00e9rable"}]},{"@type":"WebSite","@id":"https:\/\/blog.mailfence.com\/fr\/#website","url":"https:\/\/blog.mailfence.com\/fr\/","name":"Mailfence Blog","description":"Mailfence Blog. Get the latest news about secure email and Internet privacy.","publisher":{"@id":"https:\/\/blog.mailfence.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mailfence.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/blog.mailfence.com\/fr\/#organization","name":"Mailfence","url":"https:\/\/blog.mailfence.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","width":1812,"height":358,"caption":"Mailfence"},"image":{"@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailfence\/","https:\/\/x.com\/mailfence","https:\/\/www.reddit.com\/r\/Mailfence\/","https:\/\/www.linkedin.com\/company\/mailfence","https:\/\/www.instagram.com\/mailfence_\/","https:\/\/www.youtube.com\/@mailfence","https:\/\/en.wikipedia.org\/wiki\/Mailfence"]},{"@type":"Person","@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962","name":"M Salman Nadeem","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","caption":"M Salman Nadeem"},"description":"Salman works as an Information Security Analyst for Mailfence. His areas of interest include cryptography, security architecture and design, access control, and operations security. You can follow him on LinkedIn @mohammadsalmannadeem.","sameAs":["www.linkedin.com\/in\/mohammadsalmannadeem","https:\/\/x.com\/0xSalman"],"url":"https:\/\/blog.mailfence.com\/fr\/author\/msalman\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts\/11400","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/comments?post=11400"}],"version-history":[{"count":14,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts\/11400\/revisions"}],"predecessor-version":[{"id":83780,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts\/11400\/revisions\/83780"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/media\/85858"}],"wp:attachment":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/media?parent=11400"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/categories?post=11400"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/tags?post=11400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}