Re: [MLS] multiple devices per user?

Jon Millican <jmillican@fb.com> Sun, 25 March 2018 00:48 UTC

Return-Path: <prvs=66228ba95d=jmillican@fb.com>
X-Original-To: mls@ietfa.amsl.com
Delivered-To: mls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F23D127023 for <mls@ietfa.amsl.com>; Sat, 24 Mar 2018 17:48:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=fb.com header.b=goQfXrPc; dkim=pass (1024-bit key) header.d=fb.onmicrosoft.com header.b=QbFTqSFJ
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jQB7gMFDJvja for <mls@ietfa.amsl.com>; Sat, 24 Mar 2018 17:48:52 -0700 (PDT)
Received: from mx0b-00082601.pphosted.com (mx0b-00082601.pphosted.com [67.231.153.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CDBC612025C for <mls@ietf.org>; Sat, 24 Mar 2018 17:48:52 -0700 (PDT)
Received: from pps.filterd (m0109331.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w2P0iTBM001835; Sat, 24 Mar 2018 17:48:45 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fb.com; h=from : to : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=facebook; bh=wwgKhly5bhONRZcbebE9PyqmL4bi0Zcj1BBfSmITCh4=; b=goQfXrPcDCnWhcl/70VFhAN5W+ODyfntvyEMRZc2Ccb0xUShnjP2Zfr4ukj9q1Tft9na 98s7t9vLVu7m0ck/EYaHGNS0nu1XctyFKs9RxzkvkwvtbfQyEgULL6hLijapvpvj3sMj IJbCpZ+NAKr8+vi+Sj5RyZINrdzr4c0OH0Y=
Received: from mail.thefacebook.com ([199.201.64.23]) by mx0a-00082601.pphosted.com with ESMTP id 2gwmh58ym7-1 (version=TLSv1 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NOT); Sat, 24 Mar 2018 17:48:45 -0700
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (192.168.54.28) by o365-in.thefacebook.com (192.168.16.19) with Microsoft SMTP Server (TLS) id 14.3.361.1; Sat, 24 Mar 2018 17:48:43 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fb.onmicrosoft.com; s=selector1-fb-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=wwgKhly5bhONRZcbebE9PyqmL4bi0Zcj1BBfSmITCh4=; b=QbFTqSFJHUrtTWHWpiVU/F2l/mXAD3f8FibWneQe0gJYJTuq3Q/ZGiLZE1Cn2vxloc90l2YqjHia3yemTyDVoSvDrc6Hfr0+r4DHn9SLWcf9AS5g9/sKWb2q8JXSCHdkxfnucLKmuBW54EDtVvpk+HM8/7n/p2MRkVLnsV4aw0w=
Received: from CY4PR15MB1751.namprd15.prod.outlook.com (10.174.53.141) by CY4PR15MB1576.namprd15.prod.outlook.com (10.172.162.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.609.10; Sun, 25 Mar 2018 00:48:41 +0000
Received: from CY4PR15MB1751.namprd15.prod.outlook.com ([fe80::c4ba:acd7:6982:b659]) by CY4PR15MB1751.namprd15.prod.outlook.com ([fe80::c4ba:acd7:6982:b659%17]) with mapi id 15.20.0609.012; Sun, 25 Mar 2018 00:48:41 +0000
From: Jon Millican <jmillican@fb.com>
To: Simon Friedberger <simon.tls@a-oben.org>, "mls@ietf.org" <mls@ietf.org>
Thread-Topic: [MLS] multiple devices per user?
Thread-Index: AQHTw8Ae2CgUeIFvK0mYODDXyt5r4qPf+1KAgAAHQoCAABBAgIAAC7WA
Date: Sun, 25 Mar 2018 00:48:41 +0000
Message-ID: <CD6188E2-BB7E-4E08-AA7F-074E47B71B68@fb.com>
References: <87efk9m7e9.fsf@fifthhorseman.net> <CABcZeBOAaA2_SRSimo2-x-jCw=YjvDsU7h0kPzU9WroTBBHoKA@mail.gmail.com> <02DC72FA-0C57-4A1B-920D-4B456121CC55@fb.com> <b2ce2ddd-02e7-3161-dd97-fee31684366d@a-oben.org>
In-Reply-To: <b2ce2ddd-02e7-3161-dd97-fee31684366d@a-oben.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [2620:10d:c092:180::1:a3b9]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; CY4PR15MB1576; 7:FeG8YdT0bU1JWEgOeMfbkbzoE72mdfYLxzPGeM6ky13CLpgBEdu97pQDnNq+0GCaTPocO58rG2vXq1PX9EvPX3Mu8xB9bjHiOX2FSz92X7tfWjqzccW+dWygOAkQcgrNlzEjv6bXpoFdXiaPRmKsKuCZPeP93qkH5uURCp0oAhcufUm+TcU4Uh2QqgT1olj3yVUV1D+5Ldltb1WejK2K2JK1x7TWh0cQXS/j4b2ARagP1eQC+IR8p79blIUvptjs; 20:/5eF0g/eahWueW6739rFJQOjFNxt65CeRutZMagSgy89cInF8HiXmPyuztCW6vPgS1FfcxVutARl09vDRyYwvsL/GdzP+W+rIGAcODsV0Ul/jsvQVSzvEEPDh1SL2b4zlIMDTi7aJQEv+Yi3nw5zZvahpxYkcEjYIEWAA9dunTc=
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: d2719704-ebaa-401b-8de1-08d591ea27c4
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:CY4PR15MB1576;
x-ms-traffictypediagnostic: CY4PR15MB1576:
x-microsoft-antispam-prvs: <CY4PR15MB1576B2B441A998DEFDF18B76DAAE0@CY4PR15MB1576.namprd15.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(10436049006162)(209352067349851)(192374486261705)(81227570615382);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(10201501046)(3002001)(93006095)(93001095)(3231221)(11241501184)(944501327)(52105095)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123564045)(20161123558120)(20161123562045)(6072148)(201708071742011); SRVR:CY4PR15MB1576; BCL:0; PCL:0; RULEID:; SRVR:CY4PR15MB1576;
x-forefront-prvs: 0622A98CD5
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(346002)(39380400002)(396003)(376002)(366004)(199004)(189003)(68736007)(97736004)(99286004)(83716003)(59450400001)(76176011)(102836004)(6506007)(7736002)(53546011)(186003)(2616005)(110136005)(105586002)(106356001)(11346002)(446003)(575784001)(86362001)(46003)(3280700002)(2900100001)(3660700001)(25786009)(53936002)(8676002)(966005)(305945005)(478600001)(5660300001)(93886005)(82746002)(6306002)(81156014)(2501003)(81166006)(5250100002)(229853002)(6486002)(2906002)(6512007)(6246003)(14454004)(33656002)(6436002)(5890100001)(8936002)(6116002)(36756003)(316002); DIR:OUT; SFP:1102; SCL:1; SRVR:CY4PR15MB1576; H:CY4PR15MB1751.namprd15.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: fb.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: LRjVcxgeLPzQqOj2JI6Bn5WwuaBWbB/Xhs5+MkkqyyOew+kP2MPDYwgZWREPQfGbKr+sBdG6PpSrrDD3fxMzevg54JaNaJJk6a5qx2VffxnCoA+VE08ybcGeZYpacyCbGPuBtYEgLGU1kDA/xVhvY05wklZHiogGsU51ANFyj0jKwgC7eFAqzyLvlzC39yazls6GRNHKR38TpXzKmjLNU+yZnAnndAtwd+kHEWg6ZElybBkNggfnjgA6mvwJCvvD8+7G75YaVgSWq7oSVALnIGbvm0ZGN6o+ilejlDIkH1Kr3W8uXtxnGGzs5IcGMe5ZI924IdpxGYAVMgWJswwu0Q==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <6738A7002A719D4DB7BB184F2CFE8DD5@namprd15.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: d2719704-ebaa-401b-8de1-08d591ea27c4
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Mar 2018 00:48:41.7735 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 8ae927fe-1255-47a7-a2af-5f3a069daaa2
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR15MB1576
X-OriginatorOrg: fb.com
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2018-03-24_11:, , signatures=0
X-Proofpoint-Spam-Reason: safe
X-FB-Internal: Safe
Archived-At: <https://mailarchive.ietf.org/arch/msg/mls/lvhBPVLdUVIliewk264TsnyJChA>
Subject: Re: [MLS] multiple devices per user?
X-BeenThere: mls@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Messaging Layer Security <mls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mls>, <mailto:mls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mls/>
List-Post: <mailto:mls@ietf.org>
List-Help: <mailto:mls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mls>, <mailto:mls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 25 Mar 2018 00:48:55 -0000

Hi Simon!

    Won't this give us e2e encryption but no e2e security against active
    attackers? If we remove authentication in favor of ux what's to stop an
    mitm attacker?

I think this is likely application-specific, but in our case we surface all device list changes within E2E threads, and you can look at the specific device public keys if wish. If you see that I have a new device, you can thus - in theory - ask me out of band whether the key is legitimate. The relevant part of our threat model here is "you should know what endpoints you're sending messages to before you send the message", so this fulfils that requirement.

    I'm not sure that devices being added is such a common occurence that it
    would prohibit asking for authorization from a different device.

In our use case, this is common. Whenever somebody logs in on a new device, there's a strong chance that they don't have access to the previous one at the time - and won't want to be blocked from using Messenger until they can authorise the new device - particularly if it's a replacement phone for example. As Facebook Messenger itself is not an E2E app in the general case, we wouldn't want to add additional barriers that discourage people from using Secret Conversations.
 
    How would a user find out which devices are registered to their account
    when they don't have to authorize them? And if it can be done, isn't
    "authorize-on-first-use" more user-friendly than expecting that users
    will maintain a list of authorized devices, i.e. check at random
    intervals if the list is still correct?

I think I addressed this above, but we let people know when new devices are added to their account. Those who wish to can go check the list of devices on their account at this point.

Hope that all makes sense,
Jon

On 25/03/2018, 00:07, "MLS on behalf of Simon Friedberger" <mls-bounces@ietf.org on behalf of simon.tls@a-oben.org> wrote:

    Hi Jon and Eric!
    
    
    On 25.03.2018 00:08, Jon Millican wrote:
    >
    > I’d like to second Ekr’s points here. To provide a concrete use case,
    > in Facebook Messenger, we want Secret Conversations to work for a user
    > as soon as they log in on a new device. This somewhat blurs the
    > boundary between device loss/recovery and concurrent use as it is used
    > for both situations; but we don’t want to require existing device to
    > authorise new devices as – to be perfectly frank – we’re not convinced
    > that most people would actually do this, and it puts a potential
    > usability barrier in the way of people using the E2E mode.
    >
    
    Won't this give us e2e encryption but no e2e security against active
    attackers? If we remove authentication in favor of ux what's to stop an
    mitm attacker?
    
    
    Eric:
    > it's that there are use cases in
    > which users want to add a new device without an existing device being
    > online, and these are incompatible with type #0 designs.
    
    I'm not sure that devices being added is such a common occurence that it
    would prohibit asking for authorization from a different device.
    
    
    Eric:
    > Generally, I wouldn't expect them to take any action at all. It's a user's
    > responsibility to ensure that the right number of devices are registered
    > to their account, just as its common for the number of Web browsers
    > one has attached to ones Gmail account.
    
    How would a user find out which devices are registered to their account
    when they don't have to authorize them? And if it can be done, isn't
    "authorize-on-first-use" more user-friendly than expecting that users
    will maintain a list of authorized devices, i.e. check at random
    intervals if the list is still correct?
    
    
    Best Regards,
    Simon
    
    _______________________________________________
    MLS mailing list
    MLS@ietf.org
    https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_mls&d=DwIGaQ&c=5VD0RTtNlTh3ycd41b3MUw&r=M0CVEJydBVUX_bvEqMa84Q&m=ydPgBsdbgSFYUFwdJm-6v92W8jfmRX0bLCWotiZUV74&s=tAKK3eoV3faD6isIxu8BorPdnMf6vO8m3jA9DMs6o94&e=