TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Some thoughts on the ETH's Threema analysis

86 pointsby mritzmannover 2 years ago

4 comments

tptacekover 2 years ago
I don&#x27;t understand why Threema stakeholders are responding so defensively to this. It doesn&#x27;t work. They&#x27;re not gaining anything by doing this. There is a smart way to handle academic findings against your protocol: by making the argument that formal analysis is making your system stronger, which it is.<p>Instead, what we seem to be getting is a bunch of mitigating handwaving that suggests the opposite thing: that when the vendor screws up their cryptosystem, they&#x27;re going to do an internal assessment about whether the practical details are a big enough to deal to merit taking them seriously.<p>To start with: this isn&#x27;t a paper &quot;by a master student at ETH&quot;; it&#x27;s a research paper by Kien Tuong Truong and Matteo Scarlata, both grad students at ETH Applied Cryptography, and Kenny Paterson, who is one of the best known academic cryptographers on the Internet.<p>Then: it&#x27;s true that Threema predates a lot of modern messaging cryptography --- it predates the Signal Protocol double ratchet, for instance. It does not, on the other hand, predate authenticated key exchanges. As the Threema paper points out and cites, OTR had a similar AKE vulnerability long before Threema; the 2005 OTR paper gives the desired property, missing in Threema, a name: &quot;session independence&quot;.<p>But, more importantly, it&#x27;s entirely besides the point whether Threema predates best practices in messaging cryptography. The point is: they&#x27;re best practices for a reason. You don&#x27;t get points for effort; your system either works or it doesn&#x27;t. Secure messaging is a ruthlessly difficult domain to work in, and it should be: these systems are asking people to entrust life-or-death secrets to them (Threema is the official secure messenger of the Swiss military).<p>The vulnerabilities here simply are what they are:<p>1. Because the client&#x2F;server protocol in Threema uses a hacked-up authenticated key exchange, rather than something from the literature, the loss of an ephemeral key destroys its security; it perhaps mightn&#x27;t not have had ephemeral keys at all, since they weaken the security of the protocol.<p>2. Because there isn&#x27;t any key separation between the protocols in the basic Threema protocol, you can encrypt end-to-end (person-to-person) messages and play them back in the client&#x2F;server protocol to bypass authentication.<p>3. Because the end-to-end protocol didn&#x27;t authenticate metadata, attackers can reorder and drop messages.<p>4. In part because the end-to-end protocol is simplistic (it has no forward security, let alone post-compromise security!), it has to do a gross nonce-tracking hack to prevent message replay, which means that Threema clients had to defensively save state to protect themselves from attackers, to which they would be susceptible if they ever reinstalled.<p>5. Again because of a lack of key separation, you could bounce the Threema registration protocol off of the end-to-end protocol and <i>forge authenticated messages</i> from users.<p>6. Because they designed a backup system for user comfort instead of resilience against attackers, an unlocked phone could be used for full account compromise.<p>Threema insists on spelling out all the reasons these attacks are difficult to carry out in practice. Who cares? The point is: don&#x27;t have these problems. This is academic cryptography research, the point of which is to inform future generations of implementers and researchers about what does and doesn&#x27;t work in protocol design. Taking potshots at the number of cores required to get the Threema E2E protocol to spoof a client&#x2F;server login is a waste of time. It shouldn&#x27;t be possible to carry out that attack with any number of cores, and the protocol change required to make that attack impossible is simple.<p>Everybody, most especially Threema, should be going out of their way to extract lessons from research like this, rather than throwing up smokescreens about it.<p>(We&#x27;ve got a podcast episode with this research team going out later today, if you want to hear more from the researcher&#x27;s side.)
评论 #34438027 未加载
评论 #34434232 未加载
评论 #34435787 未加载
deweyover 2 years ago
This is a very interesting and well written post, thanks for sharing. Even if you don&#x27;t care about Threema it&#x27;s a nice history lesson of how secure messengers evolved and in general how it&#x27;s easy to critisize something while assuming you know all the external constraints.<p>&gt; And then there was TextSecure, made by Twitter [...] Open Whisper Systems was founded in 2013, and until 2014 TextSecure had no support for group chats. (Today, the codebases of TextSecure and RedPhone have evolved into Signal.)<p>I totally forgot about the Twitter - Signal connection.
评论 #34435075 未加载
pmdulaneyover 2 years ago
Kids, don&#x27;t try this at home! That is, don&#x27;t take it upon yourself to discuss your company&#x27;s business without management approval. It will often get you fired. On the other hand, this post makes the company look good, as far as I can tell, so the author is probably safe.
评论 #34430061 未加载
评论 #34435063 未加载
nobadcryptoover 2 years ago
This is exactly what you should not be doing. There have been much less severe issues in protocols that have led to everyone going away from it. What may be difficult to exploit practically now, will be easy to exploit in a bit of time. And probably peanuts for gov actors with a lot of resources.<p>Why can&#x27;t you appreciate the research that has been done here?
评论 #34435069 未加载