Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Server might swap, replace, replay ciphertexts #31

Open
lsd-cat opened this issue Dec 22, 2023 · 2 comments
Open

Server might swap, replace, replay ciphertexts #31

lsd-cat opened this issue Dec 22, 2023 · 2 comments
Labels
security Potential and confirmed security issues

Comments

@lsd-cat
Copy link
Member

lsd-cat commented Dec 22, 2023

As reported by @mmaker the tuples meaages_id -> (MEPK,ciphertext,mgdh) are not cryptographically bound together. The server might act honestly in running the fetching protocol, and then act dishonestly by serving a different (MEPK, ciphertext) when specifically requested a message_id obtained through the fetching protocol.

Related to #30

More details will be added.

@lsd-cat lsd-cat added the security Potential and confirmed security issues label Dec 22, 2023
@lsd-cat lsd-cat changed the title Server might swap, reaplce, replay ciphertexts Server might swap, replace, replay ciphertexts Dec 22, 2023
@mmaker
Copy link

mmaker commented Dec 22, 2023

An additional note I didn't put in the report: it's hard for anybody to see that ME_PK is different between polling and reading (it's Decisional Diffie Hellman again)

@lsd-cat
Copy link
Member Author

lsd-cat commented Mar 27, 2024

Keeping this open, as it matters if we end up choosing X3DH or similar instead of just public-key encryption. In any case, I argue that the risks and exploitability are extremely low as explained in #30 (comment) and not probably warranting a key decision change in the protocol.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security Potential and confirmed security issues
Projects
None yet
Development

No branches or pull requests

2 participants