From c4a70d47b7556bbf18aec631926ac36f365ca96d Mon Sep 17 00:00:00 2001 From: Tim Henkes Date: Sun, 19 Apr 2020 23:34:02 +0200 Subject: [PATCH 1/4] XEP-0384: Version 0.6 --- xep-0384.xml | 132 ++++++++++++++++++++++++++++++++++++--------------- 1 file changed, 95 insertions(+), 37 deletions(-) diff --git a/xep-0384.xml b/xep-0384.xml index 0bd9d717..a1328dc9 100644 --- a/xep-0384.xml +++ b/xep-0384.xml @@ -57,6 +57,17 @@ xmpp@larma.de jabber@larma.de + + 0.7.0 + 2020-09-05 + th + +
    +
  • Replaced the "naive" automatic session healing mechanism with a more sophisticated, hopefully secure alternative.
  • +
  • Various fixes, clarifications and general improvements.
  • +
+
+
0.6.0 2020-06-09 @@ -204,7 +215,7 @@
  • Confidentiality: Nobody else except sender and receiver is able to read the content of a message.
  • Forward Secrecy: Compromised key material does not compromise previous message exchanges. It has been demonstrated, that OMEMO provides only weak forward secrecy (it protects the session key only once both parties complete the key exchange).
  • -
  • Post-Compromize Security: A session which has been compromised due to leakage of key material recovers from the compromise after a few communication rounds.
  • +
  • Break-in Recovery: A session which has been compromised due to leakage of key material recovers from the compromise after a few communication rounds.
  • Authentication: Every peer is able to authenticate the sender or receiver of a message, even if the details of the authentication process is out-of-scope for this specification.
  • Integrity: Every peer can ensure that a message was not changed by any intermediate node.
  • Deniability: X3DH is weakly offline deniable and provides no online deniability, as far as the research shows.
  • @@ -212,7 +223,7 @@

    OMEMO is not intended to protect against the following use cases: