User:B42/OTR: Difference between revisions

From base48
imported>B42
imported>B42
(Replaced content with "[http://wiki.znc.in/Otr This page has been moved to ZNC wiki.]")
 
(17 intermediate revisions by the same user not shown)
Line 1: Line 1:
This module allows you to encrypt private conversations using the [https://otr.cypherpunks.ca/ OTR protocol].
[http://wiki.znc.in/Otr This page has been moved to ZNC wiki.]
Several popular [https://otr.cypherpunks.ca/software.php IRC clients] support OTR (usually requiring a plugin).
 
For more information about OTR, see:
* https://otr.cypherpunks.ca/
* https://otr.im/
 
== Installing ==
 
The module source is available at https://github.com/mmilata/znc-otr. You can
download a
[https://github.com/mmilata/znc-otr/archive/master/znc-otr-master.tar.gz tarball]
directly if you don't want to use git. Once you have the source code,
follow the instructions for [http://wiki.znc.in/Compiling_modules compiling]
and [http://wiki.znc.in/Modules#.28Un.29Loading_Modules loading ZNC modules].
 
== Usage ==
To request OTR-encrypted conversation with someone, send them the message
''?OTR?'' in a private conversation. If the request succeeds the module informs
you about it and requests that you authenticate the other side if you haven't
previously done so.
 
The module is controlled by sending commands to the ''*otr'' nick. The commands
are listed below.
 
Please note that otr is a network module meaning that if your account has
multiple IRC networks then each has its own instance of the module and its own
''*otr'' nick.
 
=== Commands ===
 
==== help ====
Prints the table of available commands together with their short description.
 
==== info ====
Shows the table of known fingerprints. The table has five columns:
 
* '''Peer''' - nick on this network the following fingerprint belong to
* '''State''' - the peer can be in three states:
** ''plaintext'' - OTR not active, messages are not encrypted
** ''encrypted'' - OTR active, private messages are encrypted
** ''finished'' - peer finished the OTR session but we did not (using the finish command) - messages are blocked
* '''Fingerprint''' - fingerprint of the private key used by the peer some time in the past
* '''Act''' - if OTR is active for this nick, asterisk denotes the fingerprint corresponding to the private key used
* '''Trust''' -  whether the fingerprint is trusted:
** ''not trusted'' - default state for new unknown fingerprint
** ''manual'' - fingerprint set as trusted using the ''trust'' command
** ''shared secret'' - fingerprint set as trusted using the ''auth'' or ''authq'' command
 
Example:
<pre>
<alice> info
<*otr> +-------+-----------+----------------------------------------------+-----+---------------+
<*otr> | Peer  | State    | Fingerprint                                  | Act | Trust        |
<*otr> +-------+-----------+----------------------------------------------+-----+---------------+
<*otr> | bob  | plaintext | 94A1353B 60A58E73 82CE8999 CBBD7B92 5E9EBB87 |    | manual        |
<*otr> | carol | encrypted | 378A8445 3FC3933C 73C917C8 BFE4C18B 5CE65CFC |  *  | shared secret |
<*otr> |      |          | AEB4DEDE 5D025A1C 6A735BD5 7D82385A 7E03E21D |    | not trusted  |
<*otr> +-------+-----------+----------------------------------------------+-----+---------------+
<*otr> Your fingerprint: A305FE90 2B4A8038 03BF89F7 5BBD5595 4B9D209A.
</pre>
In this example, we know one fingerprint from bob which we manually verified.
We currently don't have OTR-encrypted conversation with bob. We have active
OTR session with carol for whom we have two known fingerprints - the first one
corresponds to the carol's private key used in our current conversation and has
been verified using the OTR shared secret authentication mechanism. We did not
verify that the other one really belongs to carol.
 
==== trust <nick|fingerprint> ====
If the argument is nick and we have OTR conversation with nick, their current
fingerprint is marked as trusted. You can pass the hexadecimal value directly
instead of the nick it belongs to.
 
You should only use this command after verifying over another channel (e.g.
phone, in person) that it is indeed the fingerprint used by your peer.
 
Example:
<pre>
<alice> trust bob
<*otr> [bob] Fingerprint 94A1353B 60A58E73 82CE8999 CBBD7B92 5E9EBB87 trusted!
<alice> trust 378A8445 3FC3933C 73C917C8 BFE4C18B 5CE65CFC
<*otr> [carol] Fingerprint 378A8445 3FC3933C 73C917C8 BFE4C18B 5CE65CFC trusted!
</pre>
 
==== distrust <nick|fingerprint> ====
This works the same way as the ''trust'' command, except that it marks the
fingerprint as not trusted.
 
==== finish <nick> ====
Terminates the OTR conversation with ''nick''. They are notified that the conversation ended.
 
Note that when ''nick'' terminates the conversation first, you have to use this command as well (or start new OTR session). This is to prevent the situation when the other side ends the OTR session just before you hit Enter and send in plaintext something you assumed will be encrypted.
 
==== auth <nick> <secret> ====
Starts authentication with ''nick'' using a shared secret. So called
[http://en.wikipedia.org/wiki/Socialist_millionaire socialist millionaire protocol]
is used to determine whether both of you know the same secret without
disclosing it to each other.
 
This command is also used to reply to authentication requests started by the other side.
 
Example:
<pre>
<alice> Let's authenticate with the answer to following question: what is my favorite book?
<alice> No capitals or punctuation.
<bob> OK.
</pre>
<pre>
<alice> auth bob the old man and the sea
<*otr> [bob] Initiated authentication.
(bob now does something similar in his client)
<*otr> [bob] Peer replied to authentication request.
<*otr> [bob] Successfully authenticated.
</pre>
 
==== authq <nick> <[question]> <secret> ====
This is similar as ''auth'' except that the question is sent as part of the
authentication request. This allows some graphical client to e.g. display the
question in a dialog box asking for the answer.
 
You have to enclose the question in a literal square brackets.
 
Please note that this form of shared secret authentication only works in
clients that support OTRv3.
 
Example:
<pre>
<alice> authq bob [What is my favorite book (no caps)?] the old man and the sea
<*otr> [bob] Initiated authentication.
(bob's client displays the question and he types the answer)
<*otr> [bob] Peer replied to authentication request.
<*otr> [bob] Successfully authenticated.
</pre>
 
==== authabort <nick> ====
Abort ongoing shared secret authentication with ''nick''.
 
==== genkey [--overwrite] ====
Generate new private key. You don't have to use this command directly as the
key is automatically generated the first time it is needed.
 
Use with the '''--overwrite''' parameter to throw away the old key and generate
a new one.
 
== Security considerations ==
* use it on client if possible
* ssl
* logging
* admin/sole user
 
== Bugs ==
broken clients - finish & ?OTR?

Latest revision as of 10:04, 12 April 2014