-
Notifications
You must be signed in to change notification settings - Fork 399
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OTR Support (Off The Record) #28
Comments
It is somewhat dated; there's an effort ongoing to design a next generation hidden service specification based on newer cryptography. See https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/224-rend-spec-ng.txt and the mailing list discussions on that topic.
There is an element of forward secrecy involved in hidden service circuits. Compromise of the private key does not retroactively compromise communications. For details, see the use of Diffie-Hellman in https://gitweb.torproject.org/torspec.git/blob/HEAD:/rend-spec.txt section 1.8 through 1.10. I don't believe OTR has much to offer here. Encryption, authentication, and forward secrecy are provided by the rendezvous circuit, and if that is broken, there are a variety of issues that another layer of encryption on the raw text of communications won't solve. OTR's other headline benefit is deniability (in that others can forge messages, meaning others can't cryptographically authenticate a transcript after the fact); this is meaningless inside an authenticated connection. It's also not suitable for securing other protocol traffic, or things like file transfers, which make it a very incomplete solution to any problem it does solve. I'd like to hold off on trying to build in cryptography except where there's a valid, suitable design and a clear benefit. If it becomes useful to establish a stronger identity than a hidden service key, or there is a need for cases like group conversations, options will need to be evaluated. |
Outdated links? All I see:
|
Hi,
This is not necessarily true. If Alice and Bob talk with each other, deniability means that Bob can't convince a judge of anything Alice said in that conversation. The way I see it, two things could be made "deniable" in the context of Ricochet:
Now, this might be a separate issue, but I think Ricochet's authentication mechanism could be improved so that both Alice and Bob can later deny having communicated. I'm thinking about a protocol like this:
However, Bob could also have faked the MAC, so Alice can still deny having talked with Bob. And Bob learns that it's Alice only in step 4, so he can deny wanting to talk to Alice as well. This is heavily inspired by the key exchange mechanism described here: https://whispersystems.org/blog/simplifying-otr-deniability/ Compared to Ricochet's current auth mechanism, one full round-trip would be necessary before communication can start. So there would be a small delay. |
I believe the correct issue for this is here : #72 As mentioned there, Axolotl is superior to OtR in basically every way relevant for messaging. In particular, Axolotl provides long-term forward-secrecy, while OtR provides only short-term forward-secrecy, exactly what ricochet gets from using Tor hidden services. And no extra round trips when starting sessions. |
Note: I am not expert on encryption, so my understand could be misguided.
Tor Hidden Services are encrypted end to end it, but I see two problems with this encryption:
Off The Record should provide Perfect Forward Secrecy (https://en.wikipedia.org/wiki/Forward_secrecy#Perfect_Forward_Secrecy) to negate this unlikely but still dangerous possibility.
The text was updated successfully, but these errors were encountered: