Thursday, August 20, 2020

Group Instant Messaging: Why Blaming Developers Is Not Fair But Enhancing The Protocols Would Be Appropriate

After presenting our work at Real World Crypto 2018 [1] and seeing the enormous press coverage, we want to get two things straight: 1. Most described weaknesses are only exploitable by the malicious server or by knowing a large secret number and thereby the protocols are still very secure (what we wrote in the paper but some newspapers did not adopt) and 2. we see ways to enhance the WhatsApp protocol without breaking its features.


We are of course very happy that our research reached so many people and even though IT security and cryptography are often hard to understand for outsiders, Andy Greenberg [2], Patrick Beuth [3] and other journalists [4,5,6,7,8] wrote articles that were understandable on the one hand and very accurate and precise on the other hand. In contrast to this, we also saw some inaccurate articles [9,10] that fanned fear and greatly diverged in their description from what we wrote in our paper. We expected this from the boulevard press in Germany and therefore asked them to stick to the facts when they were contacting us. But none of the worst two articles' [9,10] authors contacted us in advance. Since our aim was never to blame any application or protocol but rather we wanted to encourage the developers to enhance the protocols, it contradicts our aim that WhatsApp and Signal are partially declared attackable by "anyone" "easily" [9,10].

Against this background, we understand Moxie's vexation about certain headlines that were on the Internet in the last days [11]. However, we believe that the ones who understand the weaknesses, comprehend that only the malicious server can detectably make use of them (in WhatsApp) or the secret group ID needs to be obtained from a member (in Signal). As such, we want to make clear that our paper does not primarily focus on the description of weaknesses but presents a new approach for analyzing and evaluating the security of group instant messaging protocols. Further we propose measures to enhance the analyzed protocols. The description of the protocols' weaknesses is only one part of the evaluation of our analysis approach and thereby of the investigation of real world protocols. This is the scientific contribution of our paper. The practical contribution of the analyzed messengers, which is the communication confidentiality for billion users (in most cases), is great and should be noted. Therefore we believe that being Signal, WhatsApp, or Threema by applying encryption to all messages and consequently risking research with negative results is much better than being a messenger that does not encrypt group messages end-to-end at all. We do not want to blame messengers that are far less secure (read Moxie's post [11] if you are interested).

Finally we want note that applying security measures according to the ticket approach (as we call it in the paper [12]) to the invitation links would solve the issues that Facebook's security head mentioned in his reply [13] on our findings. To our knowledge, adding authenticity to group update messages would not affect invitation links: If no invitation link was generated for a group, group members should only accept joining users if they were added by an authentic group update message. As soon as a group invitation link was generated, all joining users would need to be accepted as new group members with the current design. However there are plenty ways how WhatsApp could use invitation links without endowing the server with the power to manage groups without the group admins' permission:
One approach would be generating the invitation links secretly and sharing them without the knowledge of the server. An invitation link could then contain a secret ticket for the group and the ID of the group. As soon as a user, who received the link, wants to join the group, she can request the server with the group ID to obtain all current group members. The secret ticket can now be sent to all existing group members encrypted such that the legitimate join can be verified.

Of course this would require engineering but the capability of WhatsApp, shipping drastic protocol updates, can be assumed since they applied end-to-end encryption in the first place.

[1] https://www.youtube.com/watch?v=i5i38WlHfds
[2] https://www.wired.com/story/whatsapp-security-flaws-encryption-group-chats/
[3] http://www.spiegel.de/netzwelt/apps/whatsapp-gruppenchats-schwachstelle-im-verschluesselungs-protokoll-a-1187338.html
[4] http://www.sueddeutsche.de/digital/it-sicherheit-wie-fremde-sich-in-whatsapp-gruppenchats-einladen-koennen-1.3821656
[5] https://techcrunch.com/2018/01/10/security-researchers-flag-invite-bug-in-whatsapp-group-chats/
[6] http://www.telegraph.co.uk/technology/2018/01/10/whatsapp-bug-raises-questions-group-message-privacy/
[7] http://www.handelsblatt.com/technik/it-internet/verschluesselung-umgangen-forscher-finden-sicherheitsluecke-bei-whatsapp/20836518.html
[8] https://www.heise.de/security/meldung/WhatsApp-und-Signal-Forscher-beschreiben-Schwaechen-verschluesselter-Gruppenchats-3942046.html
[9] https://www.theinquirer.net/inquirer/news/3024215/whatsapp-bug-lets-anyone-easily-infiltrate-private-group-chats
[10] http://www.dailymail.co.uk/sciencetech/article-5257713/WhatsApp-security-flaw-lets-spy-private-chats.html
[11] https://news.ycombinator.com/item?id=16117487
[12] https://eprint.iacr.org/2017/713.pdf
[13] https://twitter.com/alexstamos/status/951169036947107840

Further articles:
- Matthew Green's blog post: https://blog.cryptographyengineering.com/2018/01/10/attack-of-the-week-group-messaging-in-whatsapp-and-signal/
- Schneier on Security: https://www.schneier.com/blog/archives/2018/01/whatsapp_vulner.html
- Bild: http://www.bild.de/digital/smartphone-und-tablet/whatsapp/whatsapp-sicherheitsluecke-in-gruppenchats-54452080.bild.html
- Sun: https://www.thesun.co.uk/tech/5316110/new-whatsapp-bug-how-to-stay-safe/

Related word


  1. Black Hat Hacker Tools
  2. Hack Tools Pc
  3. Pentest Tools Free
  4. Hackers Toolbox
  5. Nsa Hacker Tools
  6. Hacker Tools
  7. Hak5 Tools
  8. Hack Tools For Pc
  9. Hacking Tools Free Download
  10. Hack Tools Online
  11. World No 1 Hacker Software
  12. Pentest Tools Website Vulnerability
  13. Hacking Tools
  14. Hacker Tools Software
  15. Hacking Tools 2019
  16. Hack Tools Online
  17. Pentest Automation Tools
  18. Hackers Toolbox
  19. Install Pentest Tools Ubuntu
  20. Hacker Tools Github
  21. Hacking Tools Free Download
  22. Hacker Tools For Ios
  23. Bluetooth Hacking Tools Kali
  24. Hacking Tools Name
  25. Hacker Tools Linux
  26. Pentest Tools For Mac
  27. Pentest Tools For Ubuntu
  28. Hacker Tools For Windows
  29. Hacking Tools For Kali Linux
  30. Hacker Tool Kit
  31. Hacking Tools 2020
  32. Pentest Tools Bluekeep
  33. Pentest Tools For Mac
  34. Hack Tools For Ubuntu
  35. Hacker Tools For Pc
  36. Growth Hacker Tools
  37. Hack Tools
  38. Hacking Tools For Mac
  39. Hack App
  40. Hack Tools For Windows
  41. Computer Hacker
  42. Hacker Tools Online
  43. Hacking Tools For Mac
  44. Hack Tools
  45. Hak5 Tools
  46. Pentest Tools For Mac
  47. Termux Hacking Tools 2019
  48. Hack Tools Online
  49. Hacking Tools For Kali Linux
  50. How To Install Pentest Tools In Ubuntu
  51. Pentest Tools Free
  52. Hacker Tools For Pc
  53. Hacker
  54. Underground Hacker Sites
  55. Pentest Tools For Ubuntu
  56. Hacking Tools Github
  57. Physical Pentest Tools
  58. Hacker Tools For Mac
  59. Pentest Tools Website Vulnerability
  60. Hacking Tools Mac
  61. Hacker Tools Online
  62. Hack Tools For Ubuntu
  63. Pentest Tools Url Fuzzer
  64. Hack Tools
  65. Pentest Tools Download
  66. Hackers Toolbox
  67. Hacking Tools For Kali Linux
  68. Pentest Tools Bluekeep
  69. Hack Tools For Ubuntu
  70. Pentest Tools For Android
  71. World No 1 Hacker Software
  72. Top Pentest Tools
  73. Pentest Box Tools Download
  74. Pentest Tools Website Vulnerability
  75. Hacker Tools For Pc
  76. Hacking Tools For Games
  77. World No 1 Hacker Software
  78. How To Make Hacking Tools
  79. Pentest Tools Find Subdomains
  80. Hacker Tools Linux
  81. Hacking Tools Download
  82. Hack And Tools
  83. Growth Hacker Tools
  84. Hacks And Tools
  85. New Hacker Tools
  86. Pentest Tools Online
  87. Pentest Recon Tools
  88. Ethical Hacker Tools
  89. Pentest Reporting Tools
  90. Nsa Hack Tools
  91. Hack Rom Tools
  92. Hacking Tools And Software
  93. Hacker Tools For Mac
  94. Hacking App
  95. Hak5 Tools
  96. Hack Tools For Games
  97. Game Hacking
  98. Hacking Tools Software
  99. Pentest Tools For Mac
  100. Hacking Tools For Mac

No comments:

Post a Comment