|
|
Log in / Subscribe / Register

Security

ScatterChat for encrypted instant messaging

July 26, 2006

This article was contributed by Jake Edge.

Usage of instant messaging (IM) is growing rapidly to facilitate real-time communication across the internet. Unfortunately, it provides the illusion of privacy which can fool users into chatting about subjects that they would not normally discuss in public. A new tool, ScatterChat has recently been released that provides a cross-platform solution for encryption over the public IM networks. Using it provides actual privacy for IM conversations without much additional burden for the user.

ScatterChat is a 'friendly fork' of the Gaim IM client that adds encrypted chat, key management, and encrypted file transfer for many of the IM protocols supported by Gaim. In addition, ScatterChat optionally interfaces to Tor to provide traffic analysis resistance for additional privacy. It is available in source form for Linux and MacOS as well as Windows binaries.

In order to use ScatterChat, a user first generates a public/private key pair that gets associated with a particular IM screen name. Once that is complete, the program logs the user into the IM network and provides the same basic interface as Gaim. A user can then choose a buddy to chat with and ScatterChat provides an extra button in the chat window to request encryption. If necessary, a key exchange is done between the user and their buddy, but one can always refuse encryption and the key exchange protocol will be silently ignored. This ability allows users to control who knows that they are using ScatterChat; if they refuse the key exchange, it will look no different than someone who is using a standard IM client.

Once an encrypted session has been established (verified by the now familiar padlock icon), it works just like an unencrypted session. Users can type back and forth to each other but any intermediary will not be able to decrypt the traffic without compromising the keys. Even if the conversation is recorded, it cannot be decrypted without compromising the private keys at both ends of the conversation, providing 'perfect forward security'. Of course, one must be careful that the other end is not logging the conversation as that would store an unencrypted version of the conversation on the hard drive of the logger.

ScatterChat seems to have a well thought out architecture and philosophy. Users are not allowed to choose encryption methods, key lengths or any of the other technical parameters that often accompany encryption tools. The choices made by the ScatterChat developers are very strong (2048-bit El Gamal public/private key with 256-bit AES symmetric encryption) and removing those kinds of choices makes it a much simpler solution to deploy for non-technical users. The developers also have chosen to use existing encryption code (libgcrypt) rather than creating yet another encryption library that needs to be audited.

ScatterChat is targeted for human rights activists and dissidents who may be communicating through internet servers that are or can be subverted by oppressive governments. It may also be useful for those living in supposedly free countries whose governments have recently determined that spying on its citizens leads to better national security. A great deal of communication of a sensitive nature is done via IM these days and companies may wish to use this tool to secure chats between their employees to protect trade secrets and the like. Many IM users will not have any need for the capabilities provided by ScatterChat, as the NSA is probably uninterested in teenage dating gossip and the like, but for those who do, ScatterChat is an essential tool.

Comments (9 posted)

New vulnerabilities

fbi: incorrect filtering

Package(s):fbi CVE #(s):CVE-2006-3119
Created:July 24, 2006 Updated:August 24, 2006
Description: Toth Andras discovered that the fbgs framebuffer postscript/PDF viewer contains a typo, which prevents the intended filter against malicious postscript commands from working correctly. This might lead to the deletion of user data when displaying a postscript file.
Alerts:
Gentoo 200608-22 fbida 2006-08-23
Debian DSA-1124-1 fbi 2006-07-24

Comments (none posted)

hiki: denial of service

Package(s):hiki CVE #(s):CVE-2006-3379
Created:July 24, 2006 Updated:July 26, 2006
Description: Akira Tanaka discovered a vulnerability in Hiki Wiki, a Wiki engine written in Ruby that allows remote attackers to cause a denial of service via high CPU consumption using by performing a diff between large and specially crafted Wiki pages.
Alerts:
Debian DSA-1119-1 hiki 2006-07-22

Comments (none posted)

kdelibs: denial of service

Package(s):kdelibs CVE #(s):CVE-2006-3672
Created:July 21, 2006 Updated:July 26, 2006
Description: KDE Konqueror 3.5.1 and earlier allows remote attackers to cause a denial of service (application crash) by calling the replaceChild method on a DOM object, which triggers a null dereference, as demonstrated by calling document.replaceChild with a 0 (zero) argument.
Alerts:
Ubuntu USN-322-1 kdelibs 2006-07-24
Mandriva MDKSA-2006:130 kdelibs 2006-07-20

Comments (none posted)

libdumb: arbitrary code execution

Package(s):libdumb CVE #(s):CVE-2006-3668
Created:July 24, 2006 Updated:August 9, 2006
Description: Luigi Auriemma discovered that DUMB, a tracker music library, performs insufficient sanitizing of values parsed from IT music files, which might lead to a buffer overflow and execution of arbitrary code if manipulated files are read.
Alerts:
Gentoo 200608-14 dumb 2006-08-08
Fedora FEDORA-EXTRAS-2006-003 dumb 2006-08-02
Debian DSA-1123-1 libdumb 2006-07-24

Comments (none posted)

mysql: format string bug

Package(s):mysql CVE #(s):CVE-2006-3469
Created:July 21, 2006 Updated:July 30, 2008
Description: Jean-David Maillefer discovered a format string bug in the date_format() function's error reporting. By calling the function with invalid arguments, an authenticated user could exploit this to crash the server.
Alerts:
Red Hat RHSA-2008:0768-01 mysql 2008-07-24
Slackware SSA:2006-211-01 mysql 2006-07-31
Ubuntu USN-321-1 mysql-dfsg-4.1 2006-07-21

Comments (none posted)

Net::Server: format string vulnerability

Package(s): libnet-server-perl per-net-server CVE #(s):CVE-2005-1127
Created:July 24, 2006 Updated:August 11, 2006
Description: Peter Bieringer discovered that the Perl Net::Server, is vulnerable to a format string attack which may be exploitable by remote attackers. Among others, the "postgrey" utility is affected by this vulnerability.
Alerts:
Gentoo 200608-18 net-server 2006-08-10
Mandriva MDKSA-2006:131 perl-Net-Server 2006-07-25
Debian DSA-1122-1 libnet-server-perl 2005-07-24
Debian DSA-1121-1 postgrey 2006-07-24

Comments (none posted)

ruby: multiple vulnerabilities

Package(s):ruby CVE #(s):CVE-2006-3694
Created:July 24, 2006 Updated:August 28, 2006
Description: Multiple unspecified vulnerabilities in Ruby before 1.8.5 allow remote attackers to bypass "safe level" checks via unspecified vectors involving the alias function and "directory operations".
Alerts:
Debian DSA-1157-1 ruby1.8 2006-08-27
Debian DSA-1139-1 ruby1.6 2006-08-03
Mandriva MDKSA-2006:134 ruby 2006-07-28
OpenPKG OpenPKG-SA-2006.016 ruby 2006-07-28
Red Hat RHSA-2006:0604-01 ruby 2006-07-27
Ubuntu USN-325-1 ruby1.8 2006-07-27
Fedora FEDORA-2006-849 ruby 2006-07-22
Fedora FEDORA-2006-842 ruby 2006-07-22

Comments (none posted)

shiela:arbitrary code execution

Package(s):shiela CVE #(s):CVE-2006-3633
Created:July 25, 2006 Updated:July 26, 2006
Description: Brian Caswell discovered vulnerabilities in OSSP Shiela, a CVS repository access control and logging extension. The vulnerabilities allow arbitrary code execution during CVS file commits if a filename is specially crafted to contain shell commands.
Alerts:
OpenPKG OpenPKG-SA-2006.014 shiela 2006-07-25

Comments (none posted)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2006, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds