Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Off-the-record messaging

From Wikipedia, the free encyclopedia
(Redirected fromOff-the-Record Messaging)
Cryptographic protocol

Off-the-record Messaging (OTR) is acryptographic protocol that provides encryption forinstant messaging conversations. OTR uses a combination ofAESsymmetric-key algorithm with 128 bits key length, theDiffie–Hellman key exchange with 1536 bits group size, and theSHA-1 hash function. In addition toauthentication andencryption, OTR providesforward secrecy andmalleable encryption.

The primary motivation behind the protocol was providingdeniable authentication for the conversation participants while keeping conversations confidential, like a private conversation in real life, oroff the record injournalism sourcing. This is in contrast with cryptography tools that produce output which can be later used as a verifiable record of the communication event and the identities of the participants. The initial introductory paper was named "Off-the-Record Communication, or, Why Not To UsePGP".[1]

The OTR protocol was designed by cryptographersIan Goldberg andNikita Borisov and released on 26 October 2004.[2] They provide a clientlibrary to facilitate support for instant messaging client developers who want to implement the protocol. APidgin andKopete plugin exists that allows OTR to be used over any IM protocol supported by Pidgin or Kopete, offering anauto-detection feature that starts the OTR session with the buddies that have it enabled, without interfering with regular, unencrypted conversations. Version 4 of the protocol[3] has been in development since 2017[4] by a team led by Sofía Celi, and reviewed by Nik Unger and Ian Goldberg. This version aims to provide online and offline deniability, to update the cryptographic primitives, and to supportout-of-order delivery and asynchronous communication.

According to classifiedNSA documents published in theDer Spiegel article on 28 December 2014, theNSA intercepted a conversation between two users, but messages could not be decrypted by the NSA because the users were using the OTR protocol.[5]

History

[edit]

OTR was presented in 2004 by Nikita Borisov,Ian Avrum Goldberg, andEric A. Brewer as an improvement over the OpenPGP and the S/MIME system at the "Workshop on Privacy in the Electronic Society" (WPES).[1] The first version 0.8.0 of the reference implementation was published on 21 November 2004. In 2005 an analysis was presented by Mario Di Raimondo, Rosario Gennaro, and Hugo Krawczyk that called attention to several vulnerabilities and proposed appropriate fixes, most notably including a flaw in the key exchange.[6] As a result, version 2 of the OTR protocol was published in 2005 which implements a variation of the proposed modification that additionally hides the public keys. Moreover, the possibility to fragment OTR messages was introduced in order to deal with chat systems that have a limited message size, and a simpler method of verification against man-in-the-middle attacks was implemented.[7]

In 2007Olivier Goffart publishedmod_otr[8] forejabberd, making it possible to performman-in-the-middle attacks on OTR users who don't check key fingerprints. OTR developers countered this attack by introducing asocialist millionaire protocol implementation in libotr. Instead of comparing key checksums, knowledge of an arbitrary shared secret can be utilised for which relatively lowentropy can be tolerated.[9]

Version 3 of the protocol was published in 2012. As a measure against the repeated reestablishment of a session in case of several competing chat clients being signed on to the same user address at the same time, more precise identification labels for sending and receiving client instances were introduced in version 3. Moreover, an additional key is negotiated which can be used for another data channel.[10]

Several solutions have been proposed for supporting conversations with multiple participants. A method proposed in 2007 by Jiang Bian, Remzi Seker, and Umit Topaloglu uses the system of one participant as a "virtual server".[11] The method called "Multi-party Off-the-Record Messaging" (mpOTR) which was published in 2009 works without a central management host and was introduced inCryptocat by Ian Goldberg et al.[12]

In 2013, theSignal Protocol was introduced, which is based on OTR Messaging and theSilent Circle Instant Messaging Protocol (SCIMP). It brought about support for asynchronous communication ("offline messages") as its major new feature, as well as better resilience with distorted order of messages and simpler support for conversations with multiple participants.[13]OMEMO, introduced in an Android XMPP client calledConversations in 2015, integrates theDouble Ratchet Algorithm used in Signal into the instant messaging protocolXMPP ("Jabber") and also enables encryption of file transfers. In the autumn of 2015 it was submitted to theXMPP Standards Foundation for standardisation.[14][15]

Currently, version 4 of the protocol has been designed. It was presented by Sofía Celi and Ola Bini on PETS2018.[16]

Implementation

[edit]

In addition to providing encryption and authentication — features also provided by typical public-key cryptography suites, such asPGP,GnuPG, andX.509 (S/MIME) — OTR also offers some less common features:

Forward secrecy
Messages are onlyencrypted with temporary per-messageAES keys, negotiated using theDiffie–Hellman key exchange protocol. The compromise of any long-lived cryptographic keys does not compromise any previous conversations, even if an attacker is in possession ofciphertexts.
Deniable authentication
Messages in a conversation do not havedigital signatures, and after a conversation is complete, anyone is able to forge a message to appear to have come from one of the participants in the conversation, assuring that it is impossible to prove that a specific message came from a specific person. Within the conversation the recipient can be sure that a message is coming from the person they have identified.

Authentication

[edit]

As of OTR 3.1, the protocol supports mutual authentication of users using a shared secret through thesocialist millionaire protocol. This feature makes it possible for users to verify the identity of the remote party and avoid aman-in-the-middle attack without the inconvenience of manually comparingpublic key fingerprints through an outside channel.[citation needed]

Limitations

[edit]

Due to limitations of the protocol, OTR does not support multi-user group chat as of 2009[update][17] but it may be implemented in the future. As of version 3[10] of the protocol specification, an extra symmetric key is derived during authenticated key exchanges that can be used for secure communication (e.g., encryptedfile transfers) over a different channel. Support for encrypted audio or video is not planned. (SRTP withZRTP exists for that purpose.) A project to produce a protocol for multi-party off-the-record messaging (mpOTR) has been organized byCryptocat,eQualitie, and other contributors including Ian Goldberg.[12][18]

Since OTR protocol v3 (libotr 4.0.0) the plugin supports multiple OTR conversations with the same buddy who is logged in at multiple locations.[19]

Client support

[edit]
libotr
DeveloperOTR Development Team
Stable release
4.1.1 / 9 March 2016; 9 years ago (2016-03-09)
Written inC
Operating systemCross-platform
TypeSoftware Library
LicenseLGPL v2.1+[20]
Websiteotr.cypherpunks.ca/index.php#downloads

Native (supported by project developers)

[edit]

These clients support Off-the-Record Messaging out of the box (incomplete list).

Via third-party plug-in

[edit]
Off-The-Record authentication inPidgin usingSocialist millionaires protocol

The following clients require a plug-in to use Off-the-Record Messaging.

Confusion with Google Talk "off the record"

[edit]

Although Gmail'sGoogle Talk uses the term "off the record", the feature has no connection to the Off-the-Record Messaging protocol described in this article, its chats are not encrypted in the way described above—and could be logged internally by Google even if not accessible by end-users.[33][34]

See also

[edit]

References

[edit]
  1. ^abNikita Borisov,Ian Goldberg,Eric Brewer (28 October 2004)."Off-the-Record Communication, or, Why Not To Use PGP"(PDF).Workshop on Privacy in the Electronic Society. Retrieved6 March 2014.{{cite conference}}: CS1 maint: multiple names: authors list (link)
  2. ^Ian Goldberg (26 October 2014).[OTR-users] Happy 10th anniversary!. Retrieved27 April 2015.
  3. ^Sofía Celi, Ola Bini (15 February 2019)."Off-the-Record Messaging Protocol version 4".GitHub.
  4. ^"Add disclaimer · otrv4/otrv4@0c0847e".GitHub. Retrieved20 September 2023.
  5. ^"Inside the NSA's War on Internet Security". 28 December 2014.
  6. ^Mario Di Raimondo; Rosario Gennaro; Hugo Krawczyk (2005)."Secure off-the-record messaging"(PDF).Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society. Association for Computing Machinery:81–89.
  7. ^"Off-the-Record Messaging Protocol version 2".
  8. ^"mod_otr".
  9. ^Chris Alexander; Ian Avrum Goldberg (February 2007). "Improved user authentication in off-the-record messaging".Proceedings of the 2007 ACM workshop on Privacy in electronic society(PDF). New York: Association for Computing Machinery. pp. 41–47.doi:10.1145/1314333.1314340.ISBN 9781595938831.S2CID 17052562.
  10. ^ab"Off-the-Record Messaging Protocol version 3".
  11. ^Jiang Bian; Remzi Seker; Umit Topaloglu (2007).Off-the-Record Instant Messaging for Group Conversation. IEEE International Conference on Information Reuse and Integration. IEEE.doi:10.1109/IRI.2007.4296601.
  12. ^abIan Avrum Goldberg; Berkant Ustaoğlu; Matthew D. Van Gundy; Hao Chen (2009). "Multi-party off-the-record messaging".Proceedings of the 16th ACM conference on Computer and communications security(PDF). Association for Computing Machinery. pp. 358–368.doi:10.1145/1653662.1653705.hdl:11147/4772.ISBN 9781605588940.S2CID 6143588.
  13. ^Nik Unger; Sergej Dechand; Joseph Bonneau; Sascha Fahl; Henning Perl; Ian Avrum Goldberg; Matthew Smith (2015)."SoK: Secure Messaging"(PDF).Proceedings of the 2015 IEEE Symposium on Security and Privacy. IEEE Computer Society's Technical Committee on Security and Privacy:232–249.
  14. ^Straub, Andreas (25 October 2015)."OMEMO Encryption".XMPP Standards Foundation website. Archived fromthe original on 29 January 2016. Retrieved16 January 2016.
  15. ^Gultsch, Daniel (2 September 2015)."OMEMO Encrypted Jingle File Transfer".XMPP Standards Foundation website. Retrieved16 January 2016.
  16. ^Sofía Celi, Ola Bini (21 July 2018).No evidence of communication: Off-the-Record Protocol version 4(PDF). Retrieved29 November 2018.
  17. ^Ian Goldberg (27 May 2009)."multi-party OTR communications? (and other OTR details)".OTR-users mailing list.
  18. ^Nadim Kobeissi (1 February 2014)."mpOTR Project Plan".Cryptocat wiki on GitHub.
  19. ^Ian Goldberg (4 September 2012)."pidgin-otr and libotr 4.0.0 released!".OTR-announce mailing list.
  20. ^"Off-the-Record Messaging".
  21. ^"BitlBee Wiki". Wiki.bitlbee.org. 25 January 2014. Retrieved15 May 2014.
  22. ^"kopete-otr in KDE for 4.1". Archived fromthe original on 28 March 2008.
  23. ^"kopete-otr review request".
  24. ^ab"OTR Plugin". Github.com. Retrieved6 September 2017.
  25. ^"Psi+ snapshots". Github.com. Retrieved6 September 2017.
  26. ^"Tkabber OTR Plugin". Archived fromthe original on 11 March 2014.
  27. ^"Irssi Changelog - 1.2.0".
  28. ^"Off the record plugin for HexChat".GitHub. 2 December 2021.
  29. ^"Miranda OTR Plugin".
  30. ^"OTR plugin for Pidgin".
  31. ^"OTR plugin for WeeChat".GitHub. January 2019.
  32. ^"TingPing/hexchat-otr".GitHub. Retrieved14 March 2017.
  33. ^"Chatting off the record - Talk Help".
  34. ^"Google Talk - Privacy Policy".

Further reading

[edit]

External links

[edit]
Email clients
Secure
communication
OTR
SSH
TLS & SSL
VPN
ZRTP
P2P
DRA
Disk encryption
(Comparison)
Anonymity
File systems(List)
Security-focused
operating system
Service providers
Educational
Anti–computer forensics
Related topics
General
Software
packages
Community
Organisations
Licenses
Types and
standards
Challenges
Related
topics
Retrieved from "https://en.wikipedia.org/w/index.php?title=Off-the-record_messaging&oldid=1337905306"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp