[messaging] Security arguments for read receipts

Ximin Luo infinity0 at pwned.gg
Tue Nov 3 03:08:34 PST 2015


I hear that OpenWhisperSystems don't want to implement "read receipts" because
they consider this to be a security issue, and have closed several user tickets
requesting this feature as "wont fix". I don't think it's a security issue, at
least not in a significant sense, and in fact I think *not* having read
receipts is a worse security issue.

Firsty, let's clear up some definitions:

Delivery receipt
  A notice by the transport layer that they delivered the message. Since it's
  by the transport layer, there's no security value in such things. TextSecure
  have implemented these, leading to user surprises such as #3245, #3528 [1].
  But the transport could lie, and the fact that TextSecure markets such weight
  in security in *other* aspects of itself, might lead users to falsely believe
  that delivery receipts have higher security levels than "trust the server".

Read receipt
  A notice by the actual reader (or a trusted delegate, such as another person
  at your house, or a program acting on behalf of you) that they read message.
  This *can* be done with end-to-end authenticated levels of security.

Implicit manual ack
  If your reader manually replies, in a new message, to acknowledge "I got
  this" (or the equivalent) and refers to your previous message(s), this can be
  implicitly interpreted to mean an end-to-end secure read receipt.

Explicit automatic ack
  End-to-end secure version of what is commonly called "read receipt" - an
  automatic reply from the reader that they got your message. On computer
  systems, the automation can be done by a program. Note that this doesn't have
  to happen immediately, and could happen after a random timeout.

For the rest of this post, I'll use "auto-ack" in place of "read receipt",
carrying the same end-to-end authenticated guarantee as normal messages.

[1] I guess because the transport doesn't know about the client-side blocking.
    But this furthur indicates just how worthless delivery receipts are.

Benefits of auto-acks:

1. As the author, your messaging program automatically verifies that the
   message was delivered successfully (reliability).

2. As a reader, your messaging program automatically verifies that other
   readers also saw the messages (consistency).

Specifically, you defend against (certain classes of) transport-level drop
attacks and all attacks that depend on these, such as consistency attacks.

Benefits of no auto-acks:

1. (reasonable argument) To avoid some notion of "creep factor" which some
   people think is important. You don't want an author to know that you've
   already received the message, because it would be socially awkward to not
   reply quickly, or something like that. You want to be in control of when the
   author gains that knowledge.

2. (fallacious argument) You leak timing information to an outside attacker,
   that might then use this information to deanonymise members of the group.

3. (fallacious argument) Normal postal conversations don't have read receipts,
   so we shouldn't do this either. (Analogous to deniability argument in OTR.)

Counterarguments:

1. a) For cases where people message you unexpectedly (e.g. strangers), this
   has high significance. However, the opposite scenario, where you're having a
   friendly co-operative conversation, is also common:

   - As the author, you can't be sure whether your readers received your
     message, unless they manually reply to do so. As the reader, this is such
     a common thing to do, the messaging layer should do it automatically,
     instead of expecting you to manually play these verification games.

   b) What is the majority use-case here? Actually that's a weak argument, we
   also want to protect minorities, if they are significant. I assert that read
   receipts are wanted by a significant portion of users - I want them, many
   messaging apps have it, and tickets have been filed against TS for them. Why
   not implement *both options* to allow users to choose, *based on their
   security needs*? E.g.: "Switch off/on automatic read receipts for this
   contact", default OFF for contacts who send you a message whom you've never
   talked to before, default ON for contacts that you talk to regularly.

   c) *Automatic* acks inherently carry less creep factor, your program does it
   automatically so it is perfectly reasonable to argue to the people socially
   judging you that you didn't actually read the message yet.

   d) For security purposes, one should *at least* warn authors after a timeout
   that "maybe your message wasn't actually delivered", if the program don't
   receive an ack (manual or automatic) within a given timeout. Of course, this
   won't fit OWS' standards of usability because the warning would *happen so
   often*. But this indicates that their position is flawed - just because you
   refuse to add a security warning, **doesn't mean there is no problem** -
   you've just brushed it under the carpet.
   
   e) Any user studies done without considering (d) are **fallacious** - you
   haven't communicated to the user that the opposite scenario carries security
   problems, i.e. the potential that their message was not delivered, so their
   supposed trade-off is **based upon incorrect information**. Of *course* you
   can pass user studies by not giving them all the relevant information - that
   is what insecure software has done to users for decades!!!

   f) What are the actual threat models here? With authenticity, you want to
   bring up your peer's belief in some fact to 100% - epsilon; with
   confidentiality you want to bring your attacker's belief as low as possible,
   hopefully (number of possibilities)^(-1). With auto-acks, you achieve
   authenticated reliability and consistency, i.e. close to full confidence,
   and transport-level drop attacks are *always a concern*. With no auto-acks,
   you achieve what? For an author (your attacker) that sent you a message,
   instead of having 100% confidence that you read it, they begin at 50% or
   whatever the base rate is, tending towards 80-90% as time passes? *Oooh
   great defense there(!)* And that's *only* if I even care to not give this
   information away in the first place.

2. If the reader had manually replied "I got this message", you would *also*
   leak timing information to an attacker. A good timing-defence-system must
   protect against this, and therefore it should be possible to do auto-acks
   (perhaps with a random timeout) to fall within this protection.

3. This argument holds for OTR due to other specifics; it is *not* a general
   principle that we want to emulate real world conversations all the time.

   For example, Tor does not emulate any real world conversation, though one
   *could* run it on the postal service, if one was very disciplined about it,
   and had the appropriate automation technologies. Similarly, one *could*
   implement automatic acks on the postal service, if one had similar low-cost
   technology. I often worry about whether my peer received my physical letter,
   and actually such technology would be pretty nice, as would Tor-over-post.

   Non-repudiability is indeed specifically wanted in some cases. But this is
   such a small minority of use cases of OTR, that it's reasonable to say "just
   sign your messages using some other program". If it was wanted more, it
   would be responsible to add this option to the protocol.

   OTOH, read receipts are wanted in a much greater proportion of cases. Yes,
   they are relevant in asynchronous messaging. In practise, I definitely worry
   that my emails haven't been received, more than I worry about being judged
   at not replying quickly enough. Yes, a user study about this would be nice.
   But please don't make fallacies like 1(e) in those studies.

Another proposal:

The UI could let readers specifically manually ack a message (or multiple at
once), and warn *them* if they don't do this after a timeout - the same timeout
as the "message maybe not delivered" warning on the author's side, that OWS
probably won't implement. The reader-side warning could read "Your peer isn't
sure if you've received the message, don't leave them hanging!" or something
like that. When the author receives the ack, instead of displaying it as a
whole new message (like how manual "I got this" acks would be displayed), just
mark a tick next to the appropriate acked messages.

Or just allow automatic acks, and not bother the user with this trivia.

I can also understand if OWS doesn't want to do this for engineering cost
reasons. It is entirely appropriate to get priorities straight, and fixing this
issue is less important than making sure the existing system has no bugs, or
whatever else is on the "priority" list. However, it is a disservice to users
to try to convince them that this feature is harmful to their security. At
least, excuse my potential ignorance, I haven't seen any acknowledgement from
OWS that read receipts *do* benefit some important security considerations, as
described at the beginning of this post, that in the rest of this post I've
argued is more important than the "socially awkward" security concern.


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://moderncrypto.org/mail-archive/messaging/attachments/20151103/19fe302f/attachment.sig>


More information about the Messaging mailing list