Show newer

Earlier this year, I wrote about planned effort to design a federated Key Transparency proposal.

The end goal for this work was constrained to building end-to-end encryption into a new type of Direct Message on the Fediverse, with other protocols and services being a stretch goal rather than its primary purpose.

The ideal situation is to enable developers to write code that looks as simple as this:

async function initialize(message, recipient) {  const bundle = await fediverse.getSignedPreKeyBundle(recipient);  // This also checks the inclusion proof and witness cosigs:  const pubKey = await directory.fetch(recipient, bundle.keyId);  if (!await pubKey.verify(bundle)) {    throw new Error('Invalid signature or bundle');  }  const session = await e2ee.beginSession(bundle);  return session.send(message);}initialize("OwO what's this?", "soatok@furry.engineer")  .then(async (session) => { /* ... */ });

And then have secure end-to-end encryption such that only a trusted public key for the intended recipient can decrypt.

Work on the specification for the Public Key Directory component has recently started. A few things have changed since my last blog post on the topic. I’ve also gotten a lot of similar questions that wouldn’t be appropriate to try to answer within the specification itself.

[🖼 "Crypto means Cryptography."]Original art: CMYKat, poorly edited by myself

The Big Picture

This section is written mostly for anyone who hasn’t paid attention to my other writing on this project.

This is how I believe this project will develop in the immediate future.

  1. Public Key Directory (PKD)
    • Specification (WIP)
    • Reference Implementation (Not Started)
    • Client-Side SDKs (Not Started)
      • Go
      • Ruby
      • PHP
      • TypeScript
  2. End-to-End Encryption for the Fediverse (FediE2EE)
    • Specification (WIP)
      • Client-Side Secret Key Management
      • Federated Public Key Infrastructure (See: PKD)
      • Asynchronous Forward-Secure Ratcheting Protocol + Group Key Agreement
      • Symmetric-Key Authenticated Encryption
    • Reference Implementations (Not Started)
      • Go
      • Ruby
      • PHP
      • TypeScript
  3. Fediverse Instance Patches to Support E2EE
    • Mastodon
    • ?????
  4. Client-Side Software
    • ?????
  5. PKD Extensions

Once the PKD complete is complete, there’s nothing stopping other people from defining their own PKD extensions and building on top of our design to add Key Transparency to their own protocols.

My focus, once we have a solid specification and reference implementation, is going to shift towards building FediE2EE.

I will not, however, be working on client-side software unless no one else expresses interest.

The reason for my tentative recusal is simple: I absolutely suck at user interface design, and you’ll probably hate whatever I can cobble together. I am many things, but an artist is not one of them.

[🖼 Speechless Sticker]You don’t want me designing UIs.
Art: CMYKat

To that end, my final deliverable in this project will be open source libraries (and accompanying guidance for using said libraries) than user experience experts can glue into their own clients.

That said, the only client-side software that should exist are browser extensions, desktop clients, and mobile apps.

I strongly discourage anyone from trying to deploy any code that touches secret keys to a traditional web application, or JavaScript running inside of a WebView.

I’m ambivalent on Electron. It’s better than redownloading the code from a server and running it blindly every page load, but it’s not highly regarded by security professionals.

Decisions Made

The most important topic to cover is design decisions I’ve made with my specification that will shape the evolution of this project.

Account Recovery

The current draft of the specification includes two Protocol Message types, BurnDown and Fireproof, which warrant further examination.

BurnDown is simple in concept: It revokes all of a particular user’s public keys and auxiliary data records. If you have no currently-trusted public keys, you are permitted to push a self-signed AddKey message.

A not-so-subtle detail of BurnDown that everyone should pay attention to is that the instance admin can issue them on behalf of other users hosted on that server.

[🖼 Clipboard Sticker]CMYKat

If you aren’t comfortable with your admin being able to issue a BurnDown at any time, that’s where Fireproof comes in: It allows you to opt out of this capability entirely.

Fireproof is a double-edged sword. It protects you from malicious admins, but it prevents you from ever recovering your account if you lose access to all of your secret keys.

The most important decision I made here is: Fireproof is an opt-in protection, which (as of the current draft) has no “undo”. (I’m considering allowing an “undo” if it makes sense to ever do so. Tell me what you think!)

It’s often said that security at the expense of usability comes at the expense of security. Account recovery mechanisms are, necessarily, always some kind of a backdoor.

Conversely, defaults matter to security. Allowing BurnDown messages be issued by default, from a specification perspective, implies most users will not issue a Fireproof message. (Client software may counteract this by prompting users with a choice when they first enroll, without a default setting, but I digress.)

I believe this choice is the best of all possible options, but you’re certainly welcome to disagree. It’s important to me that I be very loudly transparent about this decision.

No ECDSA Support

I had floated the idea of supporting NIST P-384 in my initial blog post.

Ultimately, there is no real incentive to do so, considering Ed25519 is now in FIPS 186-5 (which has been a standard for 18 months now).

And since we’re already using Ed25519, that satisfies any hypothetical FIPS use-case, should any governments choose to use my design for anything.

Thus, there will be no NIST P-384 support in the Public Key Directory project.

[🖼 i0.wp.com/soatok.blog/wp-conte…]Art: AJ

Right To Be Forgotten

Key Transparency involves creating a global, immutable history. The Right To Be Forgotten enshrined in the EU’s GDPR law is fundamentally incompatible with the security goals of key transparency.

What this means is that, if I just shrugged and plugged Actor IDs and Public Keys into a hash function and committed that hash to a Merkle tree, then, years later, a malicious troll demands their data be removed in accordance with the GDPR, it immediately becomes a catch-22.

Do you comply with the asserted right and break the history and provable security of your transparency ledger? Or do you risk legal peril for noncompliance?

When I first noodled over this, a few people said, “But you’re not in the EU. Why do you care?”

And, like, some of the people that will want to use this design one day are in the EU. Some of them may want to run their own Public Key Directory instances. I want them to have a good time with it. Is that so strange?

There is a way to get both properties without sacrificing the universal consistency of a single Merkle tree, but it relies on untested legal theory.

[🖼 Soatok rainbow sticker]MarleyTanuki

In short, what you need to do is:

  1. Client-side: Encrypt the sensitive fields, then send the ciphertext and the ephemeral key to the Directory.
  2. The Directory will commit to the ciphertext, not the plaintext, and hold onto the keys in order to decrypt records on-the-fly.
  3. When a data erasure request comes in by an EU citizen asserting their right to be forgotten, erase the key to render the data irrecoverable.

This constitutes a forceful BurnDown with amnesia.

Does This Introduce Any Specific Risks?

This works in principle, but a couple of things need to hold true in order to maintain the integrity of the transparency log.

  1. You need to use a committing authenticated encryption mode.

    Without this property, it’s possible to swap one key for another (rather than simply erasing it) and get a valid plaintext for the (ciphertext, tag) committed in the ledger.

    This protects the Directory from a malicious user that later gets privileged access and manipulates stored keys.

  2. You need a plaintext commitment that is independent of the key. In addition to key-independence, it needs to be difficult to brute force, and you can’t have additional randomness (i.e., salts) added that could be changed after-the-fact to produce a “valid” commitment for another plaintext.

    This protects users from a Directory that lies about which plaintext a particular ciphertext decrypts to.

This is currently specified as follows:

  1. Encryption is AES-256-CTR then HMAC-SHA512, Encrypt-then-MAC.
  2. The authentication tag covers a random value used for subkey derivation, as well as a Plaintext Commitment (Q).
  3. The Plaintext Commitment (Q) is derived from Argon2id and HMAC of the plaintext. There are some subtle detains with how the Argon2id salt is derived, and why specific parameters were chosen the way they are, but this is covered in the specification document.

I had considered using Zero Knowledge Proofs here, but the current HMAC + Argon2 approach solves the problem securely without needing to study ZKDocs (and its supporting material) for hours.

Does This Give Us Compliance?

If we assume that “crypto shredding” is a valid technique for complying with data erasure demands, this lets us honor those requests while ensuring independent third parties can maintain a consistent view of the state of the transparency log.

It is worth repeating: This is not based on a tested legal theory. It is not legal advice. It is a best effort, good faith attempt to engineer a solution that would adhere to the “spirit of the law” as interpreted by an American furry with no academic or legal credentials from any country.

That being said, page 75 of this report about distributed ledgers and GDPR implies it’s not an entirely unfounded hypothesis.

Frequently Asked Questions

I’ve been asked a lot of similar questions since I started this project. This is a good a place as any to answer some of them.

Have you talked with ____?

Short answer: No, I haven’t.

Longer answer: My goal is simply to build a specification, then an implementation, that allows end-to-end encryption on the Fediverse.

No part of that sentence implies getting anyone else’s permission, or compromising on my security decisions in order to meet a competing concern.

For example, there’s always pressure from the open source community to support RSA keys, or to interoperate with other software (i.e., Matrix).

Those are non-goals of mine.

Should the ActivityPub authors or Mastodon developers decide differently from me, I wouldn’t want to sign off on their protocol design just because it appeases someone else.

I also don’t have any sort of requirement that what I specify and build becomes “standardized” in any meaningful way.

So, no, I haven’t talked with any of them yet. I also don’t plan to until the specifications and reference implementations are closer to maturity.

And even then, the message I have in mind for when that time comes looks something like this:

Hiya,

I’m building my own end-to-end encryption design for the Fediverse. Here’s the specification, here’s a reference implementation. (Links go here.)

[If applicable: I see you accepted a grant to build something similar.]

Please feel free to reuse whatever you deem useful (if anything) of my work in your own designs. I’m not interested in changing mine.

If you’d like to just adopt what I’ve already built, that’s fine too.

Soatok

I don’t want a deep involvement in anyone else’s political or social mess. I don’t want any of their grant money either, for that matter.

I just want to make security and privacy possible, to help queer people decide when, where, and how they selectively reveal themselves to others.

That said, if the W3C grant recipients want to look at the work I’m doing, they can consider it licensed under public domain, ISC, CC0, WTFPL, or whatever license is easiest for their lawyers to digest. I literally do not give a shit about intellectual property with this project. Go wild.

What if no one steps up to build client software?

Then, as a last resort, I will build something myself. Most likely, a browser extension.

It will probably be ugly, but lightweight, as I am deathly allergic to React Native, NextJS, and other front-end development frameworks.

How can I contribute?

The GitHub repository for the Public Key Directory spec is located here, if you’d like to read and/or suggest improvements to the specification.

As mentioned in my previous blog post on this topic, there is a Signal group for meta-discussion. If you are interested in writing code, that would be the best place to hang out.

What about money? Although my Ko-Fi isn’t difficult to locate, nor hard to guess, I’m not soliciting any financial contributions for this project. It isn’t costing me anything to design or build, presently.

If you represent a company that focuses on cryptography development or software assurance consulting, I may be interested in talking at some point about getting the designs reviewed and implementations audited by professionals. However, we’re a long way from that right now.

Do you have a timeline in mind?

Somewhat, yeah.

I’d like to have version 0.1 of the specification tagged by the end of September 2024.

If I have the time to stick to that timeline, I intend to start working on the reference implementation and client SDKs in a few languages. This is when software developers’ contributions will begin to be the most welcomed.

I can’t really project a timeline beyond that, today.

In addition to building a reference implementation, I would like to pursue formal verification for my protocol design. This allows us to be confident in the correctness and security of the protocol as specified. I cannot provide even a rough estimate for how long that will take to complete.

Once this Public Key Directory project is in a good place, however, my focus will be shifting back towards specifying end-to-end encryption for the Fediverse. Because that’s why I’m doing all this in the first place.

[🖼 Soatok hugging a giant pink heart while making a blep face]AJ

https://soatok.blog/2024/08/21/federated-key-transparency-project-update/

#crypto #cryptography #OnlinePrivacy #symmetricCryptography

It is a damning indictment of white feminism that we're finally seeing someone properly stick it to JK Rowling and it's a 25 year old Algerian woman.

There are so many people in the world who have more power than Imane Khelif. So much more. Fucking piles and piles of power laying around, doing fuck all.

And all she wanted to do was box, but she's going to stand up for herself anyway.

And once again, we will all benefit from the work of women of colour.

Details:

1. The hacker has not been doxxed. There's no evidence linking the accused KF user to the Twitter account and no evidence linking the accused KF user to the GitHub account.

2. The only source for the claim that the hacker lost $300,000 is the hacker. This is after the hacker posted screenshots purporting to be their cryptocurrency balance and someone pointed out they lost $300,000 that day, according to those screenshots.

Those screenshots were probably not real: among other things, they implied the hacker had $15,000,000. Even if they were, it's not obvious how the hack would have affected the hacker's cryptocurrency balance. A more likely explanation (if one is even needed) is price fluctuation, but I choose to believe the entire crypto story is fake.

3. The only people in a position to know how the hacker got access to the account are the tech team who have a legitimate reason to access it. We have no statement from the tech team. The closest thing we have to a statement on this is from Susan on the GoFundMe, who admits to being very nontechnical. She claims "Know it wasn't as simple and someone having a password. It was done maliciously using very personal information and fraud." (gofund.me/b5b62ea0)

Show thread

We don't do anything to stop climate change because it makes people who are already rich a lot of money.

That's it. That's the only reason.

@garrwolfdog I'll have to look into them some more! I've got some purple spandex sleeve things and they're nice to wear and make me feel very Renamon ^.^

"There's no machine known that is more efficient than a human on a bicycle. Bowl of oatmeal, thirty miles. You can't come close to that."

—Not surprising that Bill Nye, the Science Guy, has known about the efficiency of the bicycle for a long time.

yeah I'm clicker trained: I get unreasonably panicked when a hard drive starts clicking

Update from the #FurAffinity Discord:

Great news everyone! We’ve connected with all necessary contacts and finally made progress in recovering our domain. The tech team has regained control and temporarily locked down the site while they double-check everything and continue to move things forward.

Signal boosting: Furaffinity staff have manually logged everyone out to protect against session token theft.

They're asking people to not log in again until they give the green light!

To add a note of my own: the reason they've done that is the attackers don't need your password, they just need you to open the website & then they can steal your authentication cookies and pretend they're you.

#furaffinity

@BridleTimeout Thank you. I think it's something I'm gonna need to look into, as thinking about it I don't think I have this problem with pizza or naans so I'm not sure if it is just bread or more ^^;

Show older
Computer Fairies

Computer Fairies is a Mastodon instance that aims to be as queer, friendly and furry as possible. We welcome all kinds of computer fairies!