• XSS.stack #1 – первый литературный журнал от юзеров форума

Безопасный мессенджер для работы (Session, Briar, Berty, CWTCH, Quiet, SimpleX)

Что лучше?

SimpleX Chat прошёл аудит на днях:



Кто не хочет открывать сайт:

SimpleX cryptographic design review by Trail of Bits​


It's been almost two years since Trail of Bits did the first security assessment of SimpleX Chat.


Since then SimpleX Chat grew a lot, both in the number of users and in its functionality. We added XFTP — a protocol for sending files, — and XRCP — the protocol for using a mobile app profile from a desktop app. Messaging protocols also evolved a lot, adding private message routing and quantum resistant encryption.


Trail of Bits reviewed the design of protocols used in SimpleX network and applications in July 2024. Even though there are no critical issues, we made some security improvements based on this report.


Trail of Bits is a US based security and technology consultancy whose clients include big tech companies, governmental agencies and major blockchain projects. Its engineers reviewed the cryptographic design of the protocols used in SimpleX network and applications over a week:


  • SimpleX Messaging Protocol (SMP), including a formal verification of currently used message queue negotiation protocol,
  • the SMP agent protocol,
  • the push notification system,
  • the file transfer protocol (XFTP),
  • the remote control protocol (XRCP),
  • and the chat protocol.

There are 3 medium and 1 low severity findings, all of which require a high difficulty attack to exploit — the attacker would need to have a privileged access to the system, may need to know complex technical details, or must discover other weaknesses to exploit them. Additionally, there are 3 informational findings.


3 of these issues are improved in v6.1, and the remaining issues are accepted. Below we are commenting on these findings in detail, and also on the released improvements.


The full cryptographic design review is available here.


We are very thankful to Trail of Bits and their engineers for their work identifying these issues and helping us make SimpleX Chat more secure.


Review findings, our comments and improvements​


Protocols specifications (informational)​


The review finding #1 is that the protocols specification is informal. We addressed reported inconsistencies, and we accept that we need to improve specification beyond verbose descriptions and ABNF syntax specification, and add algebraic notations and sequence diagrams. Having said that, the current specification correctly describes the implemented protocol, without any contradictions.


User-correlating attacks via introduced latency or via GET command of messaging protocol (medium and low severity)​


These two findings #7 and #2 of the report relate to the attacks confirming that two known users communicate via observing their internet traffic.


The first attack is possible for a party that can introduce the latency in the network traffic. This attacker has to control some network node that passes the traffic of the sender — for example, it could be the sender's ISP, VPN provider, Tor entry node operator, the operator of the forwarding SMP server or a server hosting provider, etc. Such attacker can correlate delays in sender's traffic and the suspected recipient's traffic to confirm that they communicate.


The second attack relates to GET command used by iOS clients receiving notifications — depending on whether the server has the message, there will be a different number of packets sent, allowing the observer to determine if there was the message. While this comment is correct, in practice iOS clients only send GET commands when they receive notification, which also happens only when there is a message on the server, so in absolute majority of cases the number of packets will be the same.


These are not new findings — this type of attacks is covered in threat model: a passive adversary able to monitor a set of senders and recipients can perform traffic correlation attacks against senders and recipients and correlate senders and recipients within the monitored set, frustrated by the number of users on the servers.


As threat model states, this attack is more likely to be successful with the less busy servers, and also for the users with few connections.


The recommendation of the review is to add optional randomized latency to message delivery that would reduce the opportunities for traffic correlation attacks — we consider adding it in the future.


A compromised transport protocol allows more efficient correlation attacks (medium severity)​


The finding #3 is about the incorrect statement in threat model for SMP and XFTP protocols: a passive adversary, able to monitor a set of senders and recipients, cannot, even in case of a compromised transport protocol perform traffic correlation attacks with any increase in efficiency over a non-compromised transport protocol.


For protocols prior to v6.1 it is only partially correct, as responses to the commands that create a messaging queue or a file chunk include the identifiers both for senders and for the recipients, so if any observers were to compromise transport protocol (TLS) and record these identifiers, then they were able to correlate message senders with the recipients (and file recipients with the file senders).


The solution to make this correlation impossible even in case of compromised TLS is to encrypt these identifiers, as proposed in the review, or, better, encrypt the whole transmission inside TLS.


However unlikely is TLS being compromised, we added additional transport encryption layer in SMP protocol, where it can be more important, and we are going to add the same layer of encryption in XFTP protocol later, where we amended the threat model.


XRCP protocol recommendations (informational)​


XRCP protocol is used for connecting desktop and mobile. There are two findings in the review:


  • SHA256 was used as a KDF in XRCP (#4).
  • there was no forward secrecy or break-in recovery between sessions (#5).

SHA256 is now replaced with SHA3-256, as was recommended by the internet draft about hybrid key agreement that XRCP uses.


Even though XRCP sessions are short lived, and usually the connection happens over local network, we added forward secrecy to XRCP sessions here and here — each request from desktop app to mobile app is now encrypted with a new key derived from chain ratchets. This improves security of this connection.


We believe that it is unnecessary to have in-session break-in recovery in XRCP protocol, as there is break-in recovery between the sessions.


Device compromise can be hidden in some scenarios (medium)​


The finding #6 in the report is about an attacker who was not only able to break into the device and get a copy of the database, which would be mitigated by break-in recovery in double ratchet protocol, but also was able to modify the state of the app database and to substitute the addresses and cryptographic keys of the messaging queues used with some contact with other message queues that the attacker controls.


Even though this is a very hard attack, if successful, it would allow the attacker intercepting all messages with this contact.


Effectively, it is a man-in-the-middle attack, where an intermediary is inserted via the app database modification. Such attack can be mitigated by periodic verification of security codes. Although, the attacker who was able to modify the state of the device, could have also modified the app itself, making it show the same security code as the compromised contact has, thus avoiding detection.


We accept that such an attack is possible, and we don't believe there is any viable defense against the attacker who can modify the device state. We may consider adding the measures to validate the database integrity, but they may be ineffective in case the app and/or operating system are compromised.


Next: security audit in 2025​


We are planning the implementation security assessment with Trail of Bits in the beginning of 2025. It will be a twice bigger assessment than we did in 2022 — it will cover both the core of the app and the handling of cryptographic secrets in the mobile applications.
 
Фавориты: Briar и SimpleX.
В шапке у Briar я бы отметил как минус отсутствие яблочной версии, хотя это может быть и не так важно для некоторых пользователей.

На соседнем форуме я видел слова, которые не могу точно передать, но постараюсь передать их смысл: мы используем шифрованные мессенджеры не только для себя, но и для общения с коллегами и партнёрами. Многие из них, особенно взрослые, даже используют WhatsApp. Насколько я понимаю, у некоторых до сих пор есть аська.


пока рабочее все еще жаба токс и может быть матрикс но за симплекс я бы тоже топил
 
Последнее редактирование:
В шапке у Briar я бы отметил как минус отсутствие яблочной версии, хотя это может быть и не так важно для некоторых пользователей.

На соседнем форуме я видел слова, которые не могу точно передать, но постараюсь передать их смысл: мы используем шифрованные мессенджеры не только для себя, но и для общения с коллегами и партнёрами. Многие из них, особенно взрослые, даже используют WhatsApp. Насколько я понимаю, у некоторых до сих пор есть аська.


пока рабочее все еще жаба токс и может быть матрикс но за симплекс я бы тоже топил
За все за что топят странные типы на ютьюбе, топить не стоит, из всего списка как я когда то и говорил, внушает доверие только briar
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх