<html><head><meta http-equiv="Content-Type" content="text/html charset=windows-1252"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"><div>I use „end-to-end encryption“ in contrast to „gateway-to-gateway“ (or „hop-by-hop“) encryption which is provided by the concatenation of multiple TLS-based c2s and s2s connections.</div><div><br></div><div>But it seems that I’ve stirred up a hornets’ nest with that statement. My understanding of end-to-end goes back to „End-to-End Arguments in System Design“ (Saltzer, Reed, and Clark, 1981). It says that the function is provided without intermediaries, i.e., does not need to be re-encrypted at intermediary servers. It is not meant to indicate „unbreakable“ or similar. Maybe an example helps:</div><div><br></div><div>I guess you would all agree that OTR provides end-to-end encryption as well. Assume an implementation bug or failure to compare fingerprints. IMHO, the encryption is still end-to-end, but may be vulnerable to MITM.</div><div><br></div><div>The same is true for WebRTC. But we appreciate any progress in this field and will do whatever we can to make our RTP channel more secure. (For example, we would like to use ZRTP for interoperability with Jitsi, which happens to be my native XMPP client of choice…)</div><div><br></div><div>-Marcel</div><div><br></div><div><div>PS: Going beyond XMPP/JSXC, I feel that we should make more and more data encrypted, leaking less and less information. We require two directions, which, depending on the use case can be in any order:</div><div>(1) make products using encryption easy to use and therefore widespread. For this step, even opportunistic encryption is good enough.</div></div><div>(2) make products watertight, so they are immune to active or pervasive attacks (this also implies the reduction of metadata).</div><div>Together, they will lead to a more secure world. But, if only one is available, I’ll take the one which is without waiting for the other. (Some more thoughts about mechanisms in either direction can be found at <a href="https://netfuture.ch/publications/">https://netfuture.ch/publications/</a>)</div><div><br></div><div>Back to JSXC: By reducing the entry threshold to general users, we can get them away from other, centralized/proprietary services, to the federated infrastructure of XMPP. Unfortunately, for a large part of the younger generation, even the better educated ones, services only exist if they are not preinstalled on their device or are web-accessible. JSXC is our approach to make the transition as easy as possible. When they get the hang of it, they can go for native clients, which always has more flexibility and power.</div><div><br></div><div><div>Am 15.06.2014 um 14:25 schrieb Emil Ivov <<a href="mailto:emcho@jitsi.org">emcho@jitsi.org</a>>:</div><blockquote type="cite"><div style="font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;"><br>On 13.06.14, 21:33, Philipp Hancke wrote:<br><blockquote type="cite">Am 13.06.2014 14:02, schrieb Emil Ivov:<br><blockquote type="cite">Hey Marcel,<br><br>Congrats for the release.<br></blockquote><br>same here, ^5 Klaus!<br><br><blockquote type="cite">One question<br><br>On 12.06.14, 18:40, Marcel Waldvogel wrote:<br><blockquote type="cite">* End-to-end encrypted audio and video calls from Firefox and Chrome<br>without plugin<br></blockquote><br>Is this referring to WebRTC's use of DTLS-SRTP? Because, if so,<br>"end-to-end" is a bit misleading given that today's implementation of<br>DTLS-SRTP there is vulnerable to to MitM attacks from the service<br>provider.<br></blockquote><br>Well, it's end-to-end. It's not end-to-end with authenticated peers.<br></blockquote><br>Sure but isn't that a core promise of and what's really meant by end-to-end? Without that constraint SDES would also qualify.<br><br>Quoting wikipedia:<br><br>"The intention of end-to-end encryption is to prevent intermediaries, such as Internet providers or application service providers, from being able to discover or tamper with the content of communications. "<br><br>There's currently no such protection in WebRTC's current DTLS-SRTP implementation.<br><br>Emil<br><br><br><br>--<span class="Apple-converted-space"> </span><br><a href="https://jitsi.org/">https://jitsi.org</a><br>_______________________________________________<br>JDev mailing list<br>Info:<span class="Apple-converted-space"> </span><a href="http://mail.jabber.org/mailman/listinfo/jdev">http://mail.jabber.org/mailman/listinfo/jdev</a><br>Unsubscribe:<span class="Apple-converted-space"> </span><a href="mailto:JDev-unsubscribe@jabber.org">JDev-unsubscribe@jabber.org</a><br>_______________________________________________</div></blockquote></div><br></body></html>