[OTR-dev] Is "Version rollback" attack fixed in 4.0?

Ian Goldberg ian at cypherpunks.ca
Tue May 8 17:53:47 EDT 2012


On Mon, May 07, 2012 at 04:44:26PM +0000, Ague Mill wrote:
> Hi!
> 
> I am glad to see OTR development (visibly) moving foward again! :)
> 
> From a quick look at commit logs in libotr repository, I have not
> been able to figure out if the future version 4.0 is still vulnerable to
> the "Version rollback" attack that was described in the paper
> "Finite-State Security Analysis of OTR Version 2" [1] by Joseph Bonneau
> and Andrew Morrison.
> 
> [1] http://www.jbonneau.com/OTR_analysis.pdf
> 
> Has this been fixed already? And if it has not, would it be hard to
> prevent two clients to switch back to an earlier version of the
> protocol?
> 
> Thanks,
> -- 
> Ague

I actually wouldn't mind just removing support for v1 entirely.  I don't
know of any v1-only clients out there.  Does anyone else?

Then it would just be a matter of removing OTRL_POLICY_ALLOW_V1 from the
OTRL_POLICY_OPPORTUNISTIC, OTRL_POLICY_MANUAL, and OTRL_POLICY_ALWAYS
macros in proto.h.

   - Ian



More information about the OTR-dev mailing list