Ruben Pollan <mes...@sindominio.net> writes: > Quoting Greg Troxel (2015-11-13 17:43:06) >> Nathan of Guardian <nat...@guardianproject.info> writes: >> > Are you sure it was persisting key material? I think the idea with OMEMO >> > is to support the Axolotl/TextSecure pre-key technique using XMPP >> > infrastructure. This means, you can create a valid session key without >> > the other party needing to be online. >> >> I guess I need to go reread the protocol. I don't understand how one >> can create a session key that is used to send a message to a >> perhaps-offline party can work unless the other party is persisting the >> key needed to decrypt. > > The basic idea is that you generate a bunch of pre-keys (your part of the > diffie-hellman protocol) and store them in a server. When someone wants to > communicate with you and you are not online fetch an unused pre-key from the > server and write you a message with it and her part of the shared key: > https://whispersystems.org/blog/asynchronous-security/
That makes sense. But when you generate the prekeys which are something like x_i, g^{x_i) and publish g^{x_i}, then presumably you have to hang onto x_i, which may mean storing it in flash vs ram. Or have some long-term secret that is used to derive it, but no one seems to be doing that. I am not trying to complain about this - I see it as a hard-to-avoid PFS-strength vs availability tradeoff, which then gets into whether the keys get into backups, and how one overwrites flash I would just like to be clear about it.
signature.asc
Description: PGP signature
_______________________________________________ OTR-dev mailing list OTR-dev@lists.cypherpunks.ca http://lists.cypherpunks.ca/mailman/listinfo/otr-dev