Translate

domingo, 30 de agosto de 2020

Group Instant Messaging: Why Blaming Developers Is Not Fair But Enhancing The Protocols Would Be Appropriate

After presenting our work at Real World Crypto 2018 [1] and seeing the enormous press coverage, we want to get two things straight: 1. Most described weaknesses are only exploitable by the malicious server or by knowing a large secret number and thereby the protocols are still very secure (what we wrote in the paper but some newspapers did not adopt) and 2. we see ways to enhance the WhatsApp protocol without breaking its features.


We are of course very happy that our research reached so many people and even though IT security and cryptography are often hard to understand for outsiders, Andy Greenberg [2], Patrick Beuth [3] and other journalists [4,5,6,7,8] wrote articles that were understandable on the one hand and very accurate and precise on the other hand. In contrast to this, we also saw some inaccurate articles [9,10] that fanned fear and greatly diverged in their description from what we wrote in our paper. We expected this from the boulevard press in Germany and therefore asked them to stick to the facts when they were contacting us. But none of the worst two articles' [9,10] authors contacted us in advance. Since our aim was never to blame any application or protocol but rather we wanted to encourage the developers to enhance the protocols, it contradicts our aim that WhatsApp and Signal are partially declared attackable by "anyone" "easily" [9,10].

Against this background, we understand Moxie's vexation about certain headlines that were on the Internet in the last days [11]. However, we believe that the ones who understand the weaknesses, comprehend that only the malicious server can detectably make use of them (in WhatsApp) or the secret group ID needs to be obtained from a member (in Signal). As such, we want to make clear that our paper does not primarily focus on the description of weaknesses but presents a new approach for analyzing and evaluating the security of group instant messaging protocols. Further we propose measures to enhance the analyzed protocols. The description of the protocols' weaknesses is only one part of the evaluation of our analysis approach and thereby of the investigation of real world protocols. This is the scientific contribution of our paper. The practical contribution of the analyzed messengers, which is the communication confidentiality for billion users (in most cases), is great and should be noted. Therefore we believe that being Signal, WhatsApp, or Threema by applying encryption to all messages and consequently risking research with negative results is much better than being a messenger that does not encrypt group messages end-to-end at all. We do not want to blame messengers that are far less secure (read Moxie's post [11] if you are interested).

Finally we want note that applying security measures according to the ticket approach (as we call it in the paper [12]) to the invitation links would solve the issues that Facebook's security head mentioned in his reply [13] on our findings. To our knowledge, adding authenticity to group update messages would not affect invitation links: If no invitation link was generated for a group, group members should only accept joining users if they were added by an authentic group update message. As soon as a group invitation link was generated, all joining users would need to be accepted as new group members with the current design. However there are plenty ways how WhatsApp could use invitation links without endowing the server with the power to manage groups without the group admins' permission:
One approach would be generating the invitation links secretly and sharing them without the knowledge of the server. An invitation link could then contain a secret ticket for the group and the ID of the group. As soon as a user, who received the link, wants to join the group, she can request the server with the group ID to obtain all current group members. The secret ticket can now be sent to all existing group members encrypted such that the legitimate join can be verified.

Of course this would require engineering but the capability of WhatsApp, shipping drastic protocol updates, can be assumed since they applied end-to-end encryption in the first place.

[1] https://www.youtube.com/watch?v=i5i38WlHfds
[2] https://www.wired.com/story/whatsapp-security-flaws-encryption-group-chats/
[3] http://www.spiegel.de/netzwelt/apps/whatsapp-gruppenchats-schwachstelle-im-verschluesselungs-protokoll-a-1187338.html
[4] http://www.sueddeutsche.de/digital/it-sicherheit-wie-fremde-sich-in-whatsapp-gruppenchats-einladen-koennen-1.3821656
[5] https://techcrunch.com/2018/01/10/security-researchers-flag-invite-bug-in-whatsapp-group-chats/
[6] http://www.telegraph.co.uk/technology/2018/01/10/whatsapp-bug-raises-questions-group-message-privacy/
[7] http://www.handelsblatt.com/technik/it-internet/verschluesselung-umgangen-forscher-finden-sicherheitsluecke-bei-whatsapp/20836518.html
[8] https://www.heise.de/security/meldung/WhatsApp-und-Signal-Forscher-beschreiben-Schwaechen-verschluesselter-Gruppenchats-3942046.html
[9] https://www.theinquirer.net/inquirer/news/3024215/whatsapp-bug-lets-anyone-easily-infiltrate-private-group-chats
[10] http://www.dailymail.co.uk/sciencetech/article-5257713/WhatsApp-security-flaw-lets-spy-private-chats.html
[11] https://news.ycombinator.com/item?id=16117487
[12] https://eprint.iacr.org/2017/713.pdf
[13] https://twitter.com/alexstamos/status/951169036947107840

Further articles:
- Matthew Green's blog post: https://blog.cryptographyengineering.com/2018/01/10/attack-of-the-week-group-messaging-in-whatsapp-and-signal/
- Schneier on Security: https://www.schneier.com/blog/archives/2018/01/whatsapp_vulner.html
- Bild: http://www.bild.de/digital/smartphone-und-tablet/whatsapp/whatsapp-sicherheitsluecke-in-gruppenchats-54452080.bild.html
- Sun: https://www.thesun.co.uk/tech/5316110/new-whatsapp-bug-how-to-stay-safe/

More information


  1. Blackhat Hacker Tools
  2. Pentest Tools Free
  3. Hacking Tools Github
  4. Hacking Tools Windows
  5. Underground Hacker Sites
  6. How To Make Hacking Tools
  7. Hack Tools For Pc
  8. Pentest Recon Tools
  9. Hack Website Online Tool
  10. Hack Tool Apk No Root
  11. Hacker Tools Free Download
  12. Pentest Tools Find Subdomains
  13. Nsa Hack Tools
  14. Easy Hack Tools
  15. Hacking Tools Software
  16. Hacker Techniques Tools And Incident Handling
  17. Hacker Tools Mac
  18. Install Pentest Tools Ubuntu
  19. Pentest Tools Kali Linux
  20. Nsa Hack Tools Download
  21. Hacking Tools Hardware
  22. Pentest Tools Linux
  23. Hacking Tools Kit
  24. Hack Rom Tools
  25. Pentest Tools Apk
  26. Hack Tools For Games
  27. Hacking Tools Mac
  28. Hacking Tools Usb
  29. Best Hacking Tools 2019
  30. Hack Website Online Tool
  31. Nsa Hack Tools
  32. Pentest Tools Kali Linux
  33. Pentest Tools For Ubuntu
  34. Beginner Hacker Tools
  35. Hacking Tools Pc
  36. Hacking Tools Free Download
  37. Pentest Tools For Android
  38. Easy Hack Tools
  39. Hack Apps
  40. Hacker Tools Online
  41. Pentest Tools For Windows
  42. Nsa Hacker Tools
  43. Hacking Tools For Windows
  44. Usb Pentest Tools
  45. Pentest Tools Free
  46. Hacking Tools For Kali Linux
  47. Github Hacking Tools
  48. Hack Tools
  49. Hack Tool Apk
  50. Hack Tools 2019
  51. Hacking Tools Mac
  52. Bluetooth Hacking Tools Kali
  53. Hacking Tools For Beginners
  54. Pentest Tools For Android
  55. Tools Used For Hacking
  56. Best Hacking Tools 2019
  57. Pentest Tools List
  58. Pentest Tools Bluekeep
  59. Hacker Tools Online
  60. Tools Used For Hacking
  61. Hacker Tools Mac
  62. Pentest Box Tools Download
  63. Hacks And Tools
  64. Hack Rom Tools
  65. Tools For Hacker
  66. Computer Hacker
  67. How To Hack
  68. Hacking Tools Hardware
  69. Hacker Tools 2020
  70. Pentest Tools Review
  71. Hacker Tools Apk
  72. Hacker Tool Kit
  73. Pentest Tools List
  74. Hacker Search Tools
  75. Pentest Tools Nmap
  76. Hacker Tools Windows
  77. Hacking Tools For Windows
  78. New Hacker Tools
  79. Hacker Tools For Mac
  80. Hack Tools Github
  81. Pentest Tools For Mac
  82. Pentest Tools Bluekeep
  83. Hacking Apps
  84. Hacking Tools Hardware
  85. World No 1 Hacker Software
  86. Hacking Tools 2020
  87. Hack Tools
  88. Pentest Tools Online
  89. Hacker Tools Windows
  90. Hacker Tools List
  91. Hacking Tools Download
  92. Hacker Tool Kit
  93. Hack Tools
  94. Hack Rom Tools
  95. Hack Tools
  96. Hack Tools
  97. Pentest Tools Download
  98. How To Install Pentest Tools In Ubuntu
  99. Hacking Tools Software
  100. Hacker Tools For Ios
  101. Tools For Hacker
  102. Growth Hacker Tools
  103. Hacking Tools For Windows 7
  104. Hacker Tools 2020
  105. Best Pentesting Tools 2018
  106. Pentest Tools Linux
  107. Hacking Tools
  108. Hacks And Tools
  109. Hacking Apps
  110. Hacker Tools Apk Download
  111. Pentest Tools For Windows
  112. Pentest Tools Linux
  113. Hacker Tools Windows
  114. Growth Hacker Tools
  115. Computer Hacker
  116. Growth Hacker Tools
  117. Tools For Hacker
  118. Hacking Tools For Kali Linux
  119. Hacking App
  120. Hacker Tools For Ios
  121. Hacking Tools Hardware
  122. Hack Tools For Windows
  123. Nsa Hack Tools Download
  124. Hacking Tools For Kali Linux
  125. Tools 4 Hack
  126. Hack Tool Apk No Root
  127. Hacking Tools Windows
  128. Pentest Tools Find Subdomains
  129. Hacking Tools Online
  130. Hacking Tools Pc
  131. Computer Hacker
  132. How To Install Pentest Tools In Ubuntu
  133. Hacker Tool Kit
  134. Underground Hacker Sites
  135. Hack Apps
  136. What Are Hacking Tools
  137. Hack Tools Mac
  138. Hacker Tools Windows
  139. Pentest Tools Framework
  140. Hacking Tools Pc
  141. Hacking Tools Pc
  142. Tools 4 Hack
  143. Hacker
  144. New Hack Tools
  145. Github Hacking Tools
  146. Nsa Hacker Tools
  147. Hack Tools Download
  148. Pentest Tools
  149. Pentest Tools Bluekeep
  150. Hacking Tools
  151. How To Make Hacking Tools
  152. Hack Tool Apk
  153. Hacking Tools Hardware
  154. Hacking Tools For Windows 7
  155. Hacks And Tools
  156. Pentest Tools Github
  157. Hacking Tools Mac
  158. Hacker Tools For Ios
  159. Hack Tools 2019
  160. Hacker Tools Linux

Arquivo do blog