On Thu, 17 Mar 2016, David Goulet wrote:

We've mostly discussed the OTR version 4 "design and specification".

Thanks for the notes!

- Kill SHA1 with fire and use SHA3.

I'd be okay with SHA2 or SHA3 at this point.

- Ratcheting: use axolotl
 Ref: https://github.com/trevp/axolotl/wiki

good :)

- DAKE (Deniability AKE)
 Ref: https://cs.uwaterloo.ca/~iang/pubs/dake-ccs15.pdf
   - Proposal is being tested and written by Ian's student. O(weeks) before
     seeing something.
   - Free feature: offline message

Not qualified to comment on :P

- Have an unauthenticated encrypted channel at the very beginning of the data
 exchange.

How is that different from v3?

Use curve25519.

Why not Curve448? We are talking about high value content that might
decades of confidentiality. See https://tools.ietf.org/html/rfc7748#section-7

There is no mention of AES in these notes. I assume there is at least a
move from AES128 to AES256?

- Algorithm agility is in the version protocol. Let's _NOT_ exchange ciphers
 list.

Will the default be at first to speak both 3 and 4? eg using ?OTRv34?" Is
there some assurance this would be safe against a downgrade attack so
that two clients capable of speaking v4 will not end up on v3 and thus
have a far lower security due to aes128/sha1/modp1536 ?

- Improve version rollback issues with v4.

Probably related?

Thanks,

Paul
_______________________________________________
OTR-dev mailing list
OTR-dev@lists.cypherpunks.ca
http://lists.cypherpunks.ca/mailman/listinfo/otr-dev

Reply via email to