TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The most backdoor-looking bug I’ve ever seen (2021)

173 pointsby ssklashover 3 years ago

10 comments

FiloSottileover 3 years ago
Previously: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=25726068" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=25726068</a> (2021)<p>I am moving my newsletter archives to my blog, and the issues must have hit the RSS feed, even if the pages are not well annotated yet.
评论 #30017715 未加载
评论 #30017499 未加载
Moodlesover 3 years ago
I remember seeing this bug years ago. As Filippo mentions at the end, I&#x27;m still not sure whether to attribute this to malice or incompetence as per Hanlon&#x27;s razor. I have not really followed what&#x27;s up with Telegram lately, but I recall they had a rather brusque attitude towards the cryptography community at the time: &quot;we have maths PhDs!&quot;, &quot;Here&#x27;s an encrypted message with no other context whatsoever: 0x459457453494530453409abc74f, $1 million if you can break it. No? Didn&#x27;t think so!&quot;. To be honest, their consistent hubris at the time combined with (as far as I&#x27;m aware?) no other suspicious code (in the sense of backdoors, not just weird crypto) since, actually leads me to think it might genuinely be incompetence rather than a deliberate backdoor. I do think it&#x27;s true that the security community can be a little outraged and not very welcoming to newcomers in the space if they get anything wrong: even Signal, pretty much the gold standard, receives constant (in my opinion, unfair) criticism for not being federated. Though, given the high stakes, I suppose this can be forgiven.
评论 #30014341 未加载
评论 #30015097 未加载
bshippover 3 years ago
&gt; Can we talk about how cool the Wayback Machine Compare feature is?<p>I consider myself an Internet Archive power-user; I spend hours playing with CDX queries, t̶r̶o̶l̶l̶i̶n̶g̶ trawling the archive for interesting tidbits that have been lost to time. I have spent countless evenings building scripts based on the internetarchive (<a href="https:&#x2F;&#x2F;github.com&#x2F;jjjake&#x2F;internetarchive" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;jjjake&#x2F;internetarchive</a>) and iamine (<a href="https:&#x2F;&#x2F;github.com&#x2F;jjjake&#x2F;iamine" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;jjjake&#x2F;iamine</a>) tools (along with a host of others).<p>I am utterly ashamed I had never heard of the &#x2F;diff&#x2F; feature between pages until I read your article. Thank you for bringing this to my attention! I am continuously impressed by the work they do at IA.
评论 #30015849 未加载
staticassertionover 3 years ago
&gt; The Telegram key exchange is described in the &quot;Key Generation&quot; section of Telegram&#x27;s end-to-end API docs. Concretely, Alice requests the DH parameters (p, g) from Telegram, painstakingly verifies them, computes a random a value, and sends g^a mod p to Telegram. Bob receives (p, g, g^a mod p), similarly computes b and g^b mod p, and sends the latter back (along with a truncated hash of the derived key, for some reason).<p>I assume the reason is that the recipient of the truncated hash can validate that they&#x27;ve derived the same key without exposing it. This makes it way more straightforward to reject invalid keys. Truncating the hash is pointless but I get why they&#x27;d do it - it doesn&#x27;t &quot;hurt&quot; since ultimately decryption will (hopefully) fail with an invalid key and this is just a shortcut to commit to a specific key.<p>Otherwise, a really interesting example of thinking &quot;I&#x27;ll add a nonce here, that&#x27;ll make things safer!&quot; and getting the exact opposite result.
评论 #30014981 未加载
the_biotover 3 years ago
If you&#x27;re trying to hide a backdoor in a more subtle way than leaving a telnet port open, disguising it as a bug is not a bad way to go. Much less work than, say, finagling your own magic numbers into a new crypto standard.<p>Anyway, Telegram MTProto backdoored; this never was a surprise to anyone I guess.
评论 #30014276 未加载
upofadownover 3 years ago
&gt;In a normal PitM, the server negotiates two separate Diffie-Hellman sessions with Alice and Bob, who end up with different shared keys, which they could detect by comparing fingerprints.<p>I think that normally A and B would compare whatever they were using for long term identity and not the shared key they got from a DH exchange. So that would be the fingerprint of some sort of public key from some signature scheme. There is a tendency to throw away the results of the DH exchange as part of a forward secrecy scheme and the users would not want to have to compare fingerprints constantly.<p>Does Telegram do something different?<p>Edit: Sort of answering my own question. Apparently each secret chat is self contained. You are supposed to verify your fingerprints when you start one. If you start another one you then would have to check the fingerprint again. This suggests that Telegram secret chats are indefinite and can stick around for a long time. I guess that is one way to simplify identity management. That also suggests that the forward secrecy is per secret chat session. It only kicks in when you end the secret chat.
ddtaylorover 3 years ago
Any messaging platform that wants a phone number gets a hard pass for me. Use Matrix instead.
评论 #30014232 未加载
评论 #30014642 未加载
friendlydogover 3 years ago
Hanlon&#x27;s razor:<p>&quot;never attribute to malice that which is adequately explained by stupidity.&quot;
评论 #30014687 未加载
jkaover 3 years ago
What&#x27;s an action that two people on different sides of a mirror can take in order to demonstrate a common commitment towards progress (despite mistakes)?
评论 #30013883 未加载
haolezover 3 years ago
This looks a lot like the Proof of Work from Bitcoin. Super interesting!
评论 #30014015 未加载