Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

post-compromise security #16

Open
mallory opened this issue Jul 11, 2022 · 4 comments
Open

post-compromise security #16

mallory opened this issue Jul 11, 2022 · 4 comments

Comments

@mallory
Copy link
Owner

mallory commented Jul 11, 2022

From Paul (14 June 2022) "I think the "Post-compromise security" is confusing. I think it should
more clearly say the compromise was found and countered.
I am also confused how adding new ephemeral keys would help if the
user's long term identity private key was compromised. And further,
how does the remote particiant know there might be compromised messages
in transit? I think I agree with the description of the term, but the
sentence that starts with "It is usually" is not enough of a description
of a "fix" for compromised situations."

@mallory
Copy link
Owner Author

mallory commented Jul 11, 2022

@claucece ideas here?

@mallory
Copy link
Owner Author

mallory commented Aug 23, 2022

You got into the core of the debate here ;) The idea on post-compromise systems is indeed that new randomness (ephemeral) material is added every 'x' ammount of time. But, if the long-term identity keys are compromised, it is true that post-compromise is broken with an active attacker. Contrary to TLS though (where PCS is not achieved), the threat model of messaging systems for post-compromise security is different: it defines that if there is compromise of a message key and the long-term secret identities, then a passive attacker (or semi-active) will not be able to read future messages because new randomness is added. If this is active attacker, then yes, post-compromise is broken if identity keys are compromised and the attaker actively compromises one end-point. I can add this as a note that to the definition of PCS.

It is worth listing still, but perhaps with a note stating that true PCS adds significant complexity to the E2EE protocol used.

Do we need to tell implementers that in a definitional document?

@claucece
Copy link
Contributor

I'm not sure I agree with the significant complexity part, it is usually just adding more randomness at some points. Perhaps just add that 'addition of randomness is needed to achieve it'.

claucece added a commit to claucece/e2ee that referenced this issue Feb 6, 2023
@claucece claucece mentioned this issue Feb 6, 2023
Merged
@claucece
Copy link
Contributor

claucece commented Feb 6, 2023

This should be resolved now ;)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants