Off-the-Record Messaging
Off-the-Record Messaging, commonly referred to as OTR, is a cryptographic protocol that provides strong encryption for instant messaging conversations. OTR uses a combination of the AES symmetric-key algorithm, the Diffie-Hellman key exchange, and the SHA-1 hash function. In addition to authentication and encryption, OTR provides perfect forward secrecy and malleable encryption.
The primary motivation behind the protocol was providing deniability for the conversation participants while keeping conversations confidential, like a private conversation in real life, or off the record in journalism sourcing. This is in contrast with the majority of cryptography tools which resemble more a signed writing on paper, which can be later used as a record to demonstrate the communication event, the participants, and the topic of communication. In most cases people using ordinary cryptography software are not aware of this and might be better served by OTR tools instead. The initial introductory paper was named "Off-the-Record Communication, or, Why Not To Use PGP".[1]
The OTR protocol was designed by cryptographers Ian Goldberg and Nikita Borisov. They provide a client library to facilitate support for instant messaging client developers who want to implement the protocol and a special OTR-proxy for AIM, ICQ, and .Mac clients which support proxies.
Implementation
In addition to providing encryption and authentication — features also provided by typical public-key cryptography suites, such as PGP, GnuPG, and X.509 (S/MIME) — OTR also offers some less common features:
- Perfect forward secrecy: Messages are only encrypted with temporary per-message AES keys, negotiated using the Diffie-Hellman key exchange protocol. The compromise of any long-lived cryptographic keys does not compromise any previous conversations, even if an attacker is in possession of ciphertexts.
- Deniable authentication: Messages in a conversation do not have digital signatures, and after a conversation is complete, anyone is able to forge a message to appear to have come from one of the participants in the conversation, assuring that it is impossible to prove that a specific message came from a specific person, after the conversation is ended. Within the conversation you are sure that a message is coming from the person you have identified.
Authentication
As of OTR 3.1 the protocol supports mutual authentication of users using a shared secret through the socialist millionaire protocol. This feature makes it possible for users to verify the identity of the remote party and avoid a man in the middle attack without the inconvenience of manually comparing public key fingerprints through an outside channel.
Limitations
Due to limitations of the protocol, OTR does not currently support multi-user group chat[2] or encrypted file transfers, but these may be implemented in the future. Support for encrypted audio or video is not planned.
Client support
Native
These clients support Off-the-Record Messaging out of the box.
- Adium (Mac OS X).
- climm (Unix-like), since (mICQ) 0.5.4.
- MCabber (Unix-like), since 0.9.4
- CenterIM (Unix-like), since 4.22.2
- GreenLife Emerald Viewer, a Second Life client (Cross-platform)[3]
- Sip communicator (Cross-platform)
Via plug-in
The following clients require a plug-in to use Off-the-Record Messaging. Plugin support allows use of OTR with all of a client's implemented instant messaging protocols (e.g. OSCAR, XMPP, MSN, YIM/YMSG etc.).
- Pidgin (Cross-platform), with an official plugin available from the OTR homepage[4]
- Kopete (Unix-like), either with a third-party plugin[5] or, since the addition of Kopete-OTR on 12th of March 2008, with the version of Kopete shipped with KDE 4.1.0 and later releases.[6][7]
- Miranda IM (Microsoft Windows), with a third-party plugin[8]
- Trillian (Microsoft Windows), with a third-party plugin[9]
- irssi, with a third-party plugin[10]
Proxy
For those clients which have no native OTR support, a GUI proxy is available. That means that the messages are sent to the proxy unencrypted and get encrypted while they "flow" through this locally installed and running application called a proxy. Presently the proxy provided by the OTR-project supports only the OSCAR-protocol, thus it can be used for .Mac, ICQ, Sametime, and AIM. The OTR proxy is capable of SOCKS5, HTTPS, and HTTP.
Some .Mac, ICQ, and AIM clients that support proxies, but do not support OTR natively:
External links
- OTR project site
- Protocol description
- Off-the-Record Messaging: Useful Security and Privacy for IM, talk by Ian Goldberg at the University of Waterloo (video).
References
- ↑ Nikita Borisov, Ian Goldberg, Eric Brewer (2004-10-28). "Off-the-Record Communication, or, Why Not To Use PGP" (PDF). Workshop on Privacy in the Electronic Society. http://www.cypherpunks.ca/otr/otr-wpes.pdf. Retrieved 2006-08-29.
- ↑ "lists.cypherpunks.ca/pipermail/otr-users/2009-May/001647.html". http://lists.cypherpunks.ca/pipermail/otr-users/2009-May/001647.html.
- ↑ [http://modularsystems.sl / "GreenLife Emerald Viewer"]. http://modularsystems.sl /.
- ↑ "OTR plugin for pidgin". http://www.cypherpunks.ca/otr/#downloads.
- ↑ "OTR Plugin for Kopete". http://kopete-otr.follefuder.org/.
- ↑ "kopete-otr in KDE for 4.1". http://kopete-otr.follefuder.org/news.html.
- ↑ "kopete-otr review request". http://lists.kde.org/?t=120397998900007&r=1&w=2.
- ↑ "Miranda OTR Plugin". http://addons.miranda-im.org/details.php?action=viewfile&id=2644.
- ↑ "Trillian OTR". http://trillianotr.kittyfox.net/.
- ↑ "irssi-otr". http://irssi-otr.tuxfamily.org.
- Joseph Bonneau, Andrew Morrison (2006-03-21) (PDF). Finite-State Security Analysis of OTR Version 2. http://www.jbonneau.com/OTR_analysis.pdf. Retrieved 2006-10-24.
cs:Off-the-Record Messaging de:Off-the-Record Messaging fr:Off-the-Record Messaging pl:Off-the-record messaging ru:Off-the-Record Messaging
If you like SEOmastering Site, you can support it by - BTC: bc1qppjcl3c2cyjazy6lepmrv3fh6ke9mxs7zpfky0 , TRC20 and more...