[MLS] User study relevant to MLS

Harry Halpin <harry.halpin@inria.fr> Mon, 25 March 2019 15:07 UTC

Return-Path: <harry.halpin@inria.fr>
X-Original-To: mls@ietfa.amsl.com
Delivered-To: mls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 30DD81203EE for <mls@ietfa.amsl.com>; Mon, 25 Mar 2019 08:07:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level:
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FsAYEG4DMcy4 for <mls@ietfa.amsl.com>; Mon, 25 Mar 2019 08:07:28 -0700 (PDT)
Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 334C51203CB for <mls@ietf.org>; Mon, 25 Mar 2019 08:07:27 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="5.60,269,1549926000"; d="scan'208,217";a="375655218"
X-MGA-submission: =?us-ascii?q?MDHLmnVnH5iqvOd1/TJZVYaISMbDhCyAF36QeE?= =?us-ascii?q?Q3Zya2ZSRwg5XeNd20Zp4v98X5Zf1hrhGIDq4hE+suURAQtvOCZf9x4B?= =?us-ascii?q?R7iXXNLNo1jQiSVj4tYkgI6CzTK+7p02uVGif/4xWrwET8GyWJSOzz2k?= =?us-ascii?q?jvog+9dn3pBI0gwvcIC6RSVA=3D=3D?=
Received: from zcs-store3.inria.fr ([128.93.142.30]) by mail2-relais-roc.national.inria.fr with ESMTP; 25 Mar 2019 16:07:25 +0100
Date: Mon, 25 Mar 2019 16:07:25 +0100 (CET)
From: Harry Halpin <harry.halpin@inria.fr>
To: mls@ietf.org
Message-ID: <545893773.1166471.1553526445768.JavaMail.zimbra@inria.fr>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="=_43e53a3a-7d89-41e6-b220-5ebf88aca59b"
X-Originating-IP: [128.93.82.17]
X-Mailer: Zimbra 8.7.11_GA_3789 (ZimbraWebClient - FF61 (Linux)/8.7.11_GA_3789)
Thread-Index: XGABztYYh1RMFSVKcWH8pEmU9uThZA==
Thread-Topic: User study relevant to MLS
Archived-At: <https://mailarchive.ietf.org/arch/msg/mls/ef9hCCasJZIv0IJ7RMEMSEL92os>
Subject: [MLS] User study relevant to MLS
X-BeenThere: mls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Messaging Layer Security <mls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mls>, <mailto:mls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mls/>
List-Post: <mailto:mls@ietf.org>
List-Help: <mailto:mls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mls>, <mailto:mls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Mar 2019 15:07:32 -0000

I'd just like to bring to everyone's attention a relatively large-scale user study done at Inria on secure messaging, with a focus on developers and high-risk users of secure messaging apps with groups (and thus a bit different than most user studies, that focus on university students and on pairwise messaging). 

Of course, I'd just like to summarize some points - and note overall, MLS is doing the right thing: 

1) Scalable group messaging is a real use-case: Many groups of high-risk users end up using Telegram rather than Signal and even WhatsApp due to its support for large groups, with groups of 600 not being unusual - and these groups have a lot of "chat" are are not just broadcast groups. Also, in some countries where the Web is censored, there are news groups with large (50,000) users. So, the idea to aim for scalability by MLS is the right one. 

2) Authentication of users in a group ends up being more important than deniability. While deniability is cryptographically very interesting, in practical use-cases we do not have any evidence to support key material ever being used in a court case to convict someone (for example, the Manning vs. Lamo case where Manning used OTR), as social context is used by the courts. That being said, it would be useful to support as an optional feature, because one never knows how sophisticated enemies may become in the future. The obvious idea that Benjamin, Sophia, and others have discussed is to enable out-of-band optional use of deniable keys (i.e. ring signatures if needed or key establishment via deniable channels). However, scalable group messaging is more important than deniability. 

3) Support for Pseudonymity: People really want pseudonyms per group in high-risk contexts, which is important. While this is more of an Authentication Service concern, it seems that if possible reducing or make optional the use of long-term identity keys for signing messages in MLS and instead having per-group long-term signatures vie a KDF of the identity key when joining a new group may be the way to go. That being said, users do indeed do some sort of verification (often out of band), so from an application-level per group (not per message authentication) should be possible, so some kind of long-term group key per participant is needed. 

4) Group Management: One of the greatest issues facing users of Signal is not being able to remove people from groups. This should be fixed by MLS, which is great news for everyone all around. The issue of archives, etc. is relatively controversial (and I assume dealt with by the Delivery Service) but should be possible. I think the current MLS approach of storing a hash of the archive and for having groups that need archiving, the DS can store and replay old messages seem right. 

5) Privacy: That being said, anything that reveals unnecessary details of participants in the group can be dangerous, particularly the "social graph" of who knows who. So, for example, if an admin creates a group, they may add new users who are their close friends first, and then others. As has been noted by Benjamin and Karthik in conversation, the tree of participants' key material in MLS may leak the ordering of participants, and there may be other, more subtle attacks. Thinking through these is worth it, such as randomizing the addition of new users to a group and so their place in the tree. 

Also, there's generally positive feelings about using standards and decentralization, although it's less important for people who are very high-risk users). I hope this report helps! For the full version (published as "Harry Halpin, Ksenia Ermoshina, Francesca Musiani:Co-ordinating Developers and High-Risk Users of Privacy-Enhanced Secure Messaging Protocols. SSR 2018: 56-75") see: https://hal.inria.fr/hal-01966560/document 

yours, 
harry