Help, My Signal has Bad Device! Breaking the Signal Messenger’s Post-Compromise Security Through a Malicious Device

Jan Wichelmann*, Sebastian Berndt, Claudius Pott, Thomas Eisenbarth

*Corresponding author for this work

Abstract

In response to ongoing discussions about data usage by companies and governments, and its implications for privacy, there is a growing demand for secure communication techniques. While during their advent, most messenger apps focused on features rather than security, this has changed in the recent years: Since then, many have adapted end-to-end encryption as a standard feature. One of the most popular solutions is the Signal messenger, which aims to guarantee forward secrecy (i. e. security of previous communications in case of leakage of long-term secrets) and future secrecy (i. e. security of future communications in case of leakage of short-term secrets). If every user uses exactly one device, it is known that Signal achieves forward secrecy and even post-compromise security (i. e. security of future communications in case of leakage of long-term secrets). But the Signal protocol also allows for the use of multiple devices via the Sesame protocol. This multi-device setting is typically ignored in the security analysis of Signal. In this work, we discuss the security of the Signal messenger in this multi-device setting. We show that the current implementation of the device registration allows an attacker to register an own, malicious device, which gives them unrestricted access to all future communication of their victim, and even allows full impersonation. This directly shows that the current Signal implementation does not guarantee post-compromise security. We discuss several countermeasures, both simple ones aiming to increase detectability of our attack, as well as a broader approach that seeks to solve the root issue, namely the weak device registration flow.

Original languageEnglish
Title of host publicationDetection of Intrusions and Malware, and Vulnerability Assessment
PublisherSpringer International Publishing
Publication date2021
Pages88-105
ISBN (Electronic)978-3-030-80825-9
DOIs
Publication statusPublished - 2021

Fingerprint

Dive into the research topics of 'Help, My Signal has Bad Device! Breaking the Signal Messenger’s Post-Compromise Security Through a Malicious Device'. Together they form a unique fingerprint.

Cite this