-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
update verified key #46
Comments
my 2 cents: I am not fully sure that step 7 allows to learn new verified keys. The message only conveys the last key observed by Alice, which does not need to be the real one. I would say that this should trigger a message to verify the key with the person for whom the inconsistency was detected (as when using ClaimChains). |
@r10s I think we have conflicting interests here:
In general we try hard to prevent unreadable mail. But in a verified channel or group i would say we give higher priority to the confidentiality. We also should follow the principle of least astonishment. For me that implies not reusing the verified gossip key for the verified contact. It might lead to unreadable mail. But that's also what would happen in the absence of the verified group. An old verified contact breaking and healing itself (because of a verified group) while another one stays broken seems pretty surprising to me. Do users have a way to get out of the broken verified contact scenario? If I loose my key and cannot read your mails anymore... can i send you an unverified message that says so and you can reply to it and it won't be encryped / will use my new key? I personally think verifications should be bound to the context. I have a verified key for you as a verified contact and i might have a different key for you in a verified group. But I understand that that is messy / difficult to implement. |
@azul Yes, this is the normal Autocrypt way - if Alice loses her key and cannot read Bobs mail, Alice can send Bob a mail telling him that she cannot read. This mail from Alice to Bob will contain Alice's new key and then the Autocrypt connection is healed. However, this won't heal the verified connection - the only way to heal it at the moment is a new out-of-band verification - which is unsatisfactory as Alice and Bob might live in different parts of the world and have never met in the past. If Alice and Bob cannot meet in person, however, maybe a Claire can heal if she has verified connection to both, Alice and Bob. This was the initial questions - Bob might get Alice's verified key though the verified connection to Claire. |
@r10s I wonder if one could 'close' a verified connection or 'unlock' a verified contact. |
On Sat, May 12, 2018 at 06:51 -0700, Björn Petersen wrote:
> Do users have a way to get out of the broken verified contact scenario? If I loose my key and cannot read your mails anymore... can i send you an unverified message that says so and you can reply to it and it won't be encryped / will use my new key?
@azul Yes, this is the normal Autocrypt way - if Alice loses her key and cannot read Bobs mail, Alice can send Bob a mail telling him that she cannot read. This mail from Alice to Bob will contain Alice's new key and then the Autocrypt connection is healed.
However, this won't heal the verified connection - the _only_ way to heal it at the moment is a new out-of-band verification - which is unsatisfactory as Alice and Bob might live in different parts of the world and have never met in the past.
sidenote: we might describe ways how to do delta verification remotely.
take a screenshot and send it via unverified signal: this would be
an out-of-band channel relative to the e-mail provider controlled machines.
the problem is how to track these "notions" ...
this is not stuff for countermitm at this point.
… If Alice and Bob cannot meet in person, however, maybe a Claire can heal if she has verified connection to both, Alice and Bob. This was the initial questions - Bob might get Alice's verified key though the verified connection to Claire.
But maybe this would be too astonished to users, i do not know (yet :)
--
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
#46 (comment)
|
Okay... I still think this is a very difficult question. First of all... what would the workflow be? Right now i imagine:
However the information might actually spread further: Here's some questions: When would we ask the user for consent?
|
Okay... so the answers i am currently exploring are the most simple possible:
That means new keys would propagate through the verified groups without user intervention. It's an attack vector for spreading bogus keys. However the person performing that attack...
That's pretty strong assumptions. On the positive side we gain quick recovery from device loss across all connected verified contacts by just performing a single verification. |
The conflict only arises from mixing up oob in-person contact verification with in-band "key endorsement" (in lack of a better name). If the different levels would be visible to the user (e.g. as check-marked vs. black silhouette contacts), an additional message could be enough to notify the user about the status change, while the message exchange can continue normaly until the verified contact status can be reached again during a personal meeting ...or video chat. Edit: That would be three contact states actually: black silhouette (opportunistic), no special marker (regular endorsed user), check-marked (personal oob verification) |
This is an Autocrypt / Delta Chat implementation question and not directly related to the countermitm-paper, however, i think it is discussed better here as in the delta-repository.
The question:
If a verified-key stored by a peer seems to be no longer valid (does not match direct-key or gossip-key) and the peer receives a new verified-key through gossip (step 7 of the verified-group-protocol) - shall we change the verified-key to the gossiped-key then?
Otherwise, a verified key is never updated and we're stuck with it until we do a qr scan with this person again which might be annoying.
The text was updated successfully, but these errors were encountered: