A fork of the Signal Messenger known as Sessions has omitted several important security properties found in the original source code, making it a less secure alternative, a researcher says. The deficiencies include:
-- no forward secrecy
https://soatok.blog/2025/01/14/dont-use-session-signal-fork/
=> More informations about this toot | More toots from dangoodin@infosec.exchange
@dangoodin That post totally misunderstands signature schemes and how they are used.
https://social.scriptjunkie.us/@sj/113834017119054709
=> More informations about this toot | More toots from sj@social.scriptjunkie.us
@sj @dangoodin the signature should be validated with a key that you know belongs to the legitimate sender. If you just use the public key that is contained within the very same message you are trying to validate then what is stopping an attacker from supplying a key of their choice?
=> More informations about this toot | More toots from robertguetzkow@infosec.exchange
@robertguetzkow @dangoodin I think you're assuming there's another "from" address in the message or connection context or something. There isn't. The public key is the identifier of the sender. There's no separate "from" address. The attacker can't put a different key into a message "from" Alice. It would no longer be a message from Alice. It would (accurately) be a message from the attacker.
=> More informations about this toot | More toots from sj@social.scriptjunkie.us
@sj @dangoodin how would you know whether or not the public key belongs to Alice? Usually in protocols you would have a handshake at the beginning where you'd verify that the sender can sign a message properly. The public key of the sender would have to be known prior and out of band (think certificates like in TLS). Here they just place the public key in the message and use it for the signature verification. As far as I can see, there is nothing in the snippet ensuring that the public key belongs to the sender we are expecting to communicate with.
=> More informations about this toot | More toots from robertguetzkow@infosec.exchange
@robertguetzkow @dangoodin sharing a public key out of band is literally how you start chatting with someone
=> More informations about this toot | More toots from sj@social.scriptjunkie.us This content has been proxied by September (3851b).Proxy Information
text/gemini