Friday, August 21, 2020

Group Instant Messaging: Why Blaming Developers Is Not Fair But Enhancing The Protocols Would Be Appropriate

After presenting our work at Real World Crypto 2018 [1] and seeing the enormous press coverage, we want to get two things straight: 1. Most described weaknesses are only exploitable by the malicious server or by knowing a large secret number and thereby the protocols are still very secure (what we wrote in the paper but some newspapers did not adopt) and 2. we see ways to enhance the WhatsApp protocol without breaking its features.


We are of course very happy that our research reached so many people and even though IT security and cryptography are often hard to understand for outsiders, Andy Greenberg [2], Patrick Beuth [3] and other journalists [4,5,6,7,8] wrote articles that were understandable on the one hand and very accurate and precise on the other hand. In contrast to this, we also saw some inaccurate articles [9,10] that fanned fear and greatly diverged in their description from what we wrote in our paper. We expected this from the boulevard press in Germany and therefore asked them to stick to the facts when they were contacting us. But none of the worst two articles' [9,10] authors contacted us in advance. Since our aim was never to blame any application or protocol but rather we wanted to encourage the developers to enhance the protocols, it contradicts our aim that WhatsApp and Signal are partially declared attackable by "anyone" "easily" [9,10].

Against this background, we understand Moxie's vexation about certain headlines that were on the Internet in the last days [11]. However, we believe that the ones who understand the weaknesses, comprehend that only the malicious server can detectably make use of them (in WhatsApp) or the secret group ID needs to be obtained from a member (in Signal). As such, we want to make clear that our paper does not primarily focus on the description of weaknesses but presents a new approach for analyzing and evaluating the security of group instant messaging protocols. Further we propose measures to enhance the analyzed protocols. The description of the protocols' weaknesses is only one part of the evaluation of our analysis approach and thereby of the investigation of real world protocols. This is the scientific contribution of our paper. The practical contribution of the analyzed messengers, which is the communication confidentiality for billion users (in most cases), is great and should be noted. Therefore we believe that being Signal, WhatsApp, or Threema by applying encryption to all messages and consequently risking research with negative results is much better than being a messenger that does not encrypt group messages end-to-end at all. We do not want to blame messengers that are far less secure (read Moxie's post [11] if you are interested).

Finally we want note that applying security measures according to the ticket approach (as we call it in the paper [12]) to the invitation links would solve the issues that Facebook's security head mentioned in his reply [13] on our findings. To our knowledge, adding authenticity to group update messages would not affect invitation links: If no invitation link was generated for a group, group members should only accept joining users if they were added by an authentic group update message. As soon as a group invitation link was generated, all joining users would need to be accepted as new group members with the current design. However there are plenty ways how WhatsApp could use invitation links without endowing the server with the power to manage groups without the group admins' permission:
One approach would be generating the invitation links secretly and sharing them without the knowledge of the server. An invitation link could then contain a secret ticket for the group and the ID of the group. As soon as a user, who received the link, wants to join the group, she can request the server with the group ID to obtain all current group members. The secret ticket can now be sent to all existing group members encrypted such that the legitimate join can be verified.

Of course this would require engineering but the capability of WhatsApp, shipping drastic protocol updates, can be assumed since they applied end-to-end encryption in the first place.

[1] https://www.youtube.com/watch?v=i5i38WlHfds
[2] https://www.wired.com/story/whatsapp-security-flaws-encryption-group-chats/
[3] http://www.spiegel.de/netzwelt/apps/whatsapp-gruppenchats-schwachstelle-im-verschluesselungs-protokoll-a-1187338.html
[4] http://www.sueddeutsche.de/digital/it-sicherheit-wie-fremde-sich-in-whatsapp-gruppenchats-einladen-koennen-1.3821656
[5] https://techcrunch.com/2018/01/10/security-researchers-flag-invite-bug-in-whatsapp-group-chats/
[6] http://www.telegraph.co.uk/technology/2018/01/10/whatsapp-bug-raises-questions-group-message-privacy/
[7] http://www.handelsblatt.com/technik/it-internet/verschluesselung-umgangen-forscher-finden-sicherheitsluecke-bei-whatsapp/20836518.html
[8] https://www.heise.de/security/meldung/WhatsApp-und-Signal-Forscher-beschreiben-Schwaechen-verschluesselter-Gruppenchats-3942046.html
[9] https://www.theinquirer.net/inquirer/news/3024215/whatsapp-bug-lets-anyone-easily-infiltrate-private-group-chats
[10] http://www.dailymail.co.uk/sciencetech/article-5257713/WhatsApp-security-flaw-lets-spy-private-chats.html
[11] https://news.ycombinator.com/item?id=16117487
[12] https://eprint.iacr.org/2017/713.pdf
[13] https://twitter.com/alexstamos/status/951169036947107840

Further articles:
- Matthew Green's blog post: https://blog.cryptographyengineering.com/2018/01/10/attack-of-the-week-group-messaging-in-whatsapp-and-signal/
- Schneier on Security: https://www.schneier.com/blog/archives/2018/01/whatsapp_vulner.html
- Bild: http://www.bild.de/digital/smartphone-und-tablet/whatsapp/whatsapp-sicherheitsluecke-in-gruppenchats-54452080.bild.html
- Sun: https://www.thesun.co.uk/tech/5316110/new-whatsapp-bug-how-to-stay-safe/
Related posts
  1. Hacking Tools Hardware
  2. Pentest Tools Url Fuzzer
  3. Hacker Tools For Mac
  4. Hacker
  5. Pentest Tools
  6. Hacker Tools
  7. Hackrf Tools
  8. Beginner Hacker Tools
  9. Hacker Tools For Pc
  10. Hack Tools Pc
  11. Hacker Tools List
  12. Best Hacking Tools 2019
  13. Best Pentesting Tools 2018
  14. Pentest Tools Free
  15. Hack Tool Apk
  16. Hackrf Tools
  17. Hacks And Tools
  18. Hacking Tools Name
  19. Tools 4 Hack
  20. Hacking Tools For Beginners
  21. Ethical Hacker Tools
  22. Github Hacking Tools
  23. Hack Tools Download
  24. Pentest Tools Free
  25. Hacking Tools For Windows
  26. Hacker Tools Hardware
  27. Hacking Tools Download
  28. Hacker Tools List
  29. Hacker Search Tools
  30. Hacking Tools Software
  31. Hacker
  32. Hacking Tools 2019
  33. Hack Tools Pc
  34. Hacker Tools Free Download
  35. Hacking Tools 2020
  36. Hack Tools For Mac
  37. Hack Tools
  38. Hack Tools For Ubuntu
  39. Hacker Tools For Pc
  40. Hacker Tools Free Download
  41. Best Hacking Tools 2019
  42. Hack Tools For Windows
  43. Hacker Tools For Windows
  44. Hacker Tools Software
  45. Hacker Tools 2020
  46. Hack Tool Apk
  47. Hacking Tools Download
  48. Pentest Tools Free
  49. Pentest Tools List
  50. Hacking Tools Pc
  51. Growth Hacker Tools
  52. Pentest Tools For Mac
  53. Hacking Tools Usb
  54. Nsa Hack Tools
  55. Pentest Tools Android
  56. Hack Tools
  57. Hacking Tools Online
  58. Pentest Tools Framework
  59. Pentest Tools Free
  60. Pentest Tools
  61. Best Hacking Tools 2019
  62. Hacking Tools Online
  63. Hacking Tools Software
  64. Tools For Hacker
  65. Hacker Tools Apk
  66. Hacker Tool Kit
  67. Hacking Tools For Windows 7
  68. Termux Hacking Tools 2019
  69. Hacking Tools Download
  70. Usb Pentest Tools
  71. Hack Website Online Tool
  72. Pentest Tools Framework
  73. Hacking Tools Kit
  74. Pentest Tools Subdomain
  75. Hack Rom Tools
  76. Hacking Tools Windows 10
  77. Install Pentest Tools Ubuntu
  78. Hacker Tools Software
  79. Hack Tools Pc
  80. Pentest Tools Url Fuzzer
  81. Pentest Tools List
  82. Pentest Tools Website Vulnerability
  83. Pentest Tools Nmap
  84. Hacker Tools List
  85. Pentest Tools Apk
  86. New Hack Tools
  87. Ethical Hacker Tools
  88. How To Hack
  89. Hacking Tools Windows 10
  90. Game Hacking
  91. What Is Hacking Tools
  92. Hacker Tools List
  93. Hacker Tools For Mac
  94. Hacker Tools 2020
  95. Hacking Tools For Mac
  96. Pentest Tools Nmap
  97. Hack Tools For Games
  98. Best Hacking Tools 2020
  99. Hacking Tools Usb
  100. Hacker Tools Apk
  101. Kik Hack Tools
  102. Hacking Tools 2020
  103. Hacking Tools Name
  104. Hacker Tools Github
  105. Hack App
  106. Hack App
  107. Pentest Tools Open Source
  108. Nsa Hack Tools
  109. Pentest Tools Nmap
  110. Hacker Tools 2020
  111. Hacking Tools Free Download
  112. Hack App
  113. Pentest Tools For Android
  114. Best Hacking Tools 2020
  115. Blackhat Hacker Tools
  116. Pentest Tools Url Fuzzer
  117. Hacking Tools Windows
  118. Pentest Tools Nmap
  119. Pentest Tools Framework
  120. Nsa Hack Tools
  121. Hacker Tools For Ios
  122. Hacker Tools Github

No comments: