GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Dan Goodin (dangoodin@infosec.exchange)'s status on Thursday, 16-Jan-2025 04:28:47 JST Dan Goodin Dan Goodin

    A fork of the Signal Messenger known as Sessions has omitted several important security properties found in the original source code, making it a less secure alternative, a researcher says. The deficiencies include:

    -- no forward secrecy

    • insufficient Entropy in Ed25519 Keys
    • no in-Band Negotiation for Message Signatures
    • using Public Keys as AES-GCM Keys

    Stay away from this offering unless you really, really, really know what you're doing:

    https://soatok.blog/2025/01/14/dont-use-session-signal-fork/

    In conversation about 6 months ago from infosec.exchange permalink
    • Embed this notice
      scriptjunkie (sj@social.scriptjunkie.us)'s status on Thursday, 16-Jan-2025 04:28:46 JST scriptjunkie scriptjunkie
      in reply to

      @dangoodin That post totally misunderstands signature schemes and how they are used.
      https://social.scriptjunkie.us/@sj/113834017119054709

      In conversation about 6 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: social.scriptjunkie.us
        scriptjunkie (@sj@social.scriptjunkie.us)
        from scriptjunkie
        Attached: 1 image The "Don't Use Session (Signal Fork)" post shows a tragic lack of understanding of basic cryptographic primitives and Session's protocol. The post claims the signature validation code of a message "reduced the utility of Ed25519 to that of a CRC32". But immediately following the quoted blob, you'll see that the message sender public key that validated the message is used to identify the sender. If you try to "forge" a message with your own key, it won't show up as from someone else or in their conversations, it will show up as from you! That's the literal basic use case of a signature. It proves who it came from. While a CRC32 could be calculated for any message, even with a forged sender. This shows the post completely misses the point of asymmetric cryptography signature schemes. The post may be correct with the AES encryption to public keys, however, so I'd still regard both Session and the post with suspicion until a more thorough analysis can be done. https://github.com/session-foundation/session-android/blob/75e2b87278cc378e21b77b27fa1a2aa773d25520/libsession/src/main/java/org/session/libsession/messaging/sending_receiving/MessageDecrypter.kt#L58-L62
    • Embed this notice
      Robert Gützkow (robertguetzkow@infosec.exchange)'s status on Thursday, 16-Jan-2025 11:33:34 JST Robert Gützkow Robert Gützkow
      in reply to
      • scriptjunkie

      @sj @dangoodin the signature should be validated with a key that you know belongs to the legitimate sender. If you just use the public key that is contained within the very same message you are trying to validate then what is stopping an attacker from supplying a key of their choice?

      In conversation about 6 months ago permalink
    • Embed this notice
      scriptjunkie (sj@social.scriptjunkie.us)'s status on Thursday, 16-Jan-2025 11:33:34 JST scriptjunkie scriptjunkie
      in reply to
      • Robert Gützkow

      @robertguetzkow @dangoodin I think you're assuming there's another "from" address in the message or connection context or something. There isn't. The public key *is* the identifier of the sender. There's no separate "from" address. The attacker can't put a different key into a message "from" Alice. It would no longer be a message from Alice. It would (accurately) be a message from the attacker.

      In conversation about 6 months ago permalink
    • Embed this notice
      scriptjunkie (sj@social.scriptjunkie.us)'s status on Thursday, 16-Jan-2025 12:04:26 JST scriptjunkie scriptjunkie
      in reply to

      @dangoodin Oh and if the hop crypto is really broken the worst case thing that happens is that the network could see IPs of who sent and received messages through their nodes if they had entry/exit nodes. Quick! Everybody rush back to Signal... where the network sees the IP of who sent and received all messages and the *phone numbers* of who sent and received messages, which is far more sensitive, personal, and identifying.

      Just once what I would give for people to understand the log/speck principle.

      In conversation about 6 months ago permalink
    • Embed this notice
      scriptjunkie (sj@social.scriptjunkie.us)'s status on Thursday, 16-Jan-2025 22:17:28 JST scriptjunkie scriptjunkie
      in reply to
      • Robert Gützkow

      @robertguetzkow @dangoodin sharing a public key out of band is literally how you start chatting with someone

      In conversation about 6 months ago permalink
    • Embed this notice
      Robert Gützkow (robertguetzkow@infosec.exchange)'s status on Thursday, 16-Jan-2025 22:17:29 JST Robert Gützkow Robert Gützkow
      in reply to
      • scriptjunkie

      @sj @dangoodin how would you know whether or not the public key belongs to Alice? Usually in protocols you would have a handshake at the beginning where you'd verify that the sender can sign a message properly. The public key of the sender would have to be known prior and out of band (think certificates like in TLS). Here they just place the public key in the message and use it for the signature verification. As far as I can see, there is nothing in the snippet ensuring that the public key belongs to the sender we are expecting to communicate with.

      In conversation about 6 months ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.