quinta-feira, 27 de agosto de 2020

Group Instant Messaging: Why Blaming Developers Is Not Fair But Enhancing The Protocols Would Be Appropriate

After presenting our work at Real World Crypto 2018 [1] and seeing the enormous press coverage, we want to get two things straight: 1. Most described weaknesses are only exploitable by the malicious server or by knowing a large secret number and thereby the protocols are still very secure (what we wrote in the paper but some newspapers did not adopt) and 2. we see ways to enhance the WhatsApp protocol without breaking its features.


We are of course very happy that our research reached so many people and even though IT security and cryptography are often hard to understand for outsiders, Andy Greenberg [2], Patrick Beuth [3] and other journalists [4,5,6,7,8] wrote articles that were understandable on the one hand and very accurate and precise on the other hand. In contrast to this, we also saw some inaccurate articles [9,10] that fanned fear and greatly diverged in their description from what we wrote in our paper. We expected this from the boulevard press in Germany and therefore asked them to stick to the facts when they were contacting us. But none of the worst two articles' [9,10] authors contacted us in advance. Since our aim was never to blame any application or protocol but rather we wanted to encourage the developers to enhance the protocols, it contradicts our aim that WhatsApp and Signal are partially declared attackable by "anyone" "easily" [9,10].

Against this background, we understand Moxie's vexation about certain headlines that were on the Internet in the last days [11]. However, we believe that the ones who understand the weaknesses, comprehend that only the malicious server can detectably make use of them (in WhatsApp) or the secret group ID needs to be obtained from a member (in Signal). As such, we want to make clear that our paper does not primarily focus on the description of weaknesses but presents a new approach for analyzing and evaluating the security of group instant messaging protocols. Further we propose measures to enhance the analyzed protocols. The description of the protocols' weaknesses is only one part of the evaluation of our analysis approach and thereby of the investigation of real world protocols. This is the scientific contribution of our paper. The practical contribution of the analyzed messengers, which is the communication confidentiality for billion users (in most cases), is great and should be noted. Therefore we believe that being Signal, WhatsApp, or Threema by applying encryption to all messages and consequently risking research with negative results is much better than being a messenger that does not encrypt group messages end-to-end at all. We do not want to blame messengers that are far less secure (read Moxie's post [11] if you are interested).

Finally we want note that applying security measures according to the ticket approach (as we call it in the paper [12]) to the invitation links would solve the issues that Facebook's security head mentioned in his reply [13] on our findings. To our knowledge, adding authenticity to group update messages would not affect invitation links: If no invitation link was generated for a group, group members should only accept joining users if they were added by an authentic group update message. As soon as a group invitation link was generated, all joining users would need to be accepted as new group members with the current design. However there are plenty ways how WhatsApp could use invitation links without endowing the server with the power to manage groups without the group admins' permission:
One approach would be generating the invitation links secretly and sharing them without the knowledge of the server. An invitation link could then contain a secret ticket for the group and the ID of the group. As soon as a user, who received the link, wants to join the group, she can request the server with the group ID to obtain all current group members. The secret ticket can now be sent to all existing group members encrypted such that the legitimate join can be verified.

Of course this would require engineering but the capability of WhatsApp, shipping drastic protocol updates, can be assumed since they applied end-to-end encryption in the first place.

[1] https://www.youtube.com/watch?v=i5i38WlHfds
[2] https://www.wired.com/story/whatsapp-security-flaws-encryption-group-chats/
[3] http://www.spiegel.de/netzwelt/apps/whatsapp-gruppenchats-schwachstelle-im-verschluesselungs-protokoll-a-1187338.html
[4] http://www.sueddeutsche.de/digital/it-sicherheit-wie-fremde-sich-in-whatsapp-gruppenchats-einladen-koennen-1.3821656
[5] https://techcrunch.com/2018/01/10/security-researchers-flag-invite-bug-in-whatsapp-group-chats/
[6] http://www.telegraph.co.uk/technology/2018/01/10/whatsapp-bug-raises-questions-group-message-privacy/
[7] http://www.handelsblatt.com/technik/it-internet/verschluesselung-umgangen-forscher-finden-sicherheitsluecke-bei-whatsapp/20836518.html
[8] https://www.heise.de/security/meldung/WhatsApp-und-Signal-Forscher-beschreiben-Schwaechen-verschluesselter-Gruppenchats-3942046.html
[9] https://www.theinquirer.net/inquirer/news/3024215/whatsapp-bug-lets-anyone-easily-infiltrate-private-group-chats
[10] http://www.dailymail.co.uk/sciencetech/article-5257713/WhatsApp-security-flaw-lets-spy-private-chats.html
[11] https://news.ycombinator.com/item?id=16117487
[12] https://eprint.iacr.org/2017/713.pdf
[13] https://twitter.com/alexstamos/status/951169036947107840

Further articles:
- Matthew Green's blog post: https://blog.cryptographyengineering.com/2018/01/10/attack-of-the-week-group-messaging-in-whatsapp-and-signal/
- Schneier on Security: https://www.schneier.com/blog/archives/2018/01/whatsapp_vulner.html
- Bild: http://www.bild.de/digital/smartphone-und-tablet/whatsapp/whatsapp-sicherheitsluecke-in-gruppenchats-54452080.bild.html
- Sun: https://www.thesun.co.uk/tech/5316110/new-whatsapp-bug-how-to-stay-safe/
More information

  1. Pentest Reporting Tools
  2. Hack Tools Mac
  3. Hack Tools For Games
  4. Pentest Tools Website
  5. Hacking Tools Github
  6. Pentest Tools List
  7. Hack Tools For Windows
  8. Hack Tools For Windows
  9. Hacking Tools Online
  10. Hack Tools Github
  11. Hacker Tools Github
  12. Hacking Tools
  13. New Hacker Tools
  14. Hacking Tools 2019
  15. Pentest Tools Windows
  16. Hacking Tools Mac
  17. Pentest Tools For Android
  18. Growth Hacker Tools
  19. Pentest Tools Github
  20. Pentest Tools Bluekeep
  21. Best Hacking Tools 2020
  22. Hacking Tools For Windows
  23. Termux Hacking Tools 2019
  24. Hacker Hardware Tools
  25. Hacking Tools And Software
  26. Hack Rom Tools
  27. Pentest Tools Free
  28. Bluetooth Hacking Tools Kali
  29. Hackers Toolbox
  30. Beginner Hacker Tools
  31. Pentest Tools Kali Linux
  32. Tools Used For Hacking
  33. Blackhat Hacker Tools
  34. Beginner Hacker Tools
  35. Best Hacking Tools 2020
  36. Hacker Tools Free Download
  37. Pentest Recon Tools
  38. Hacker Tools Mac
  39. Pentest Tools For Ubuntu
  40. Usb Pentest Tools
  41. Hack Tools 2019
  42. Hacking Tools Windows
  43. Hacking Tools Online
  44. Hacker Tools For Pc
  45. Hacker Tools
  46. Hacking Tools Windows
  47. Pentest Automation Tools
  48. Pentest Tools Android
  49. Hacker Tools Windows
  50. Pentest Tools Linux
  51. Pentest Tools Apk
  52. Hacker Tools For Mac
  53. Hacking Tools For Beginners
  54. How To Make Hacking Tools
  55. Pentest Tools
  56. Hacker Tools Linux
  57. Hacking Tools For Pc
  58. Hacker Tools Free
  59. Hacking Tools For Kali Linux
  60. Hacking Tools
  61. Hacking Tools For Kali Linux
  62. Hacker Tools Online
  63. How To Install Pentest Tools In Ubuntu
  64. Hacker Tools For Mac
  65. Hacker Tools Apk Download
  66. Hack Tools
  67. Hacker Tools List
  68. Nsa Hack Tools Download
  69. Hacking App
  70. Hacking App
  71. Black Hat Hacker Tools
  72. Pentest Tools Linux
  73. Hacker Tools Linux
  74. Android Hack Tools Github
  75. Kik Hack Tools
  76. Hack App
  77. Hacking Apps
  78. Pentest Tools For Android
  79. What Is Hacking Tools
  80. How To Make Hacking Tools
  81. Pentest Tools Subdomain
  82. Pentest Box Tools Download
  83. Pentest Tools Android
  84. Pentest Tools For Android
  85. Github Hacking Tools
  86. Pentest Tools Find Subdomains
  87. Hacking Tools For Games
  88. Hack Tools
  89. Pentest Tools Review
  90. Pentest Tools Alternative
  91. Hack Tools For Mac
  92. Android Hack Tools Github
  93. Hacker Tools 2019
  94. What Are Hacking Tools
  95. Underground Hacker Sites
  96. Pentest Tools Find Subdomains
  97. Pentest Tools
  98. Hacker Tool Kit
  99. Pentest Tools Framework
  100. Hacking Tools For Windows Free Download
  101. What Is Hacking Tools
  102. Tools 4 Hack
  103. Pentest Tools Github
  104. Hacker Tools For Pc
  105. Hacking Tools Free Download
  106. Android Hack Tools Github
  107. Pentest Tools For Android
  108. Pentest Tools Nmap
  109. Pentest Tools Find Subdomains
  110. Pentest Tools Url Fuzzer
  111. Pentest Tools List
  112. Hack Tools Online
  113. Pentest Tools
  114. Easy Hack Tools
  115. Pentest Tools Windows
  116. Hacking Tools 2020
  117. Pentest Tools Open Source
  118. Hacker Tools For Mac
  119. World No 1 Hacker Software
  120. Nsa Hacker Tools
  121. Blackhat Hacker Tools
  122. Hacker Tools Free Download
  123. Hack Tools Download
  124. Hacker Tools Hardware
  125. Hacker Tool Kit
  126. Pentest Tools For Windows

Nenhum comentário: