On 08.06.2011 17:23 Ted wrote: > I'm removing the classification as a security vulnerability, because the > expected behavior currently for OTR sessions is that they'll be either > manually initiated or automatically initiated once a client detects that > a chat partner is also OTR-capable. > > This is a feature request, but one that I doubt will be implemented on > any client, since OTR is all in-band, and it would require sending a > message that non-OTR'd clients would see bare. > > ** Changed in: libotr (Ubuntu) > Status: New => Confirmed > > ** This bug is no longer flagged as a security vulnerability >
Thanks for your comment, Ted. I assume I may not have properly explained this, though, which may have caused a misunderstanding on the impact of this issue. It is not just the first message ever sent to a person which goes unencrypted, but the first message every new day you send to someone whom you have defined you only want to exchange encrypted messages with. So even when both sides did the key exchange and are set to encrypt, the first message a pidgin-otr user sends on any new day (or after an IP address change or ... I'm not sure what exactly the trigger is) still goes over the wire unencrypted, with no warnig given to the sending user. I hope this explanation is better. So I wonder: Is this how you understood my report in the first place? Do you not think this is a security vulnerability then? Thanks, Moritz -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/794453 Title: First message is sent unencrypted To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pidgin-otr/+bug/794453/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs