\documentclass{article} \usepackage{fetamont} \begin{document} \title{ \textffm{Meow} messaging protocol} \author{Author \texttt{author@address.net}} \date{\today} \maketitle \begin{abstract} The \textffm{Meow} protocol is a privacy driven instant messaging protocol. That protocol might be used for creating secure and distributed chat services or allowing machine to machine communication. This document describes the services provided by the protocol, the messaging structures and the transport protocols that might be used. \end{abstract} \section{Services} \subsection{Unregulated identities} The only requirement to get a valid \textffm{Meow} identity is to generate a user key pair. No phone number or email check will be performed, unlike main instant messaging protocols, there is no central administration. \subsection{Fine grained privacy control} \subsubsection{Trustable server based communication} Like most widely available messaging softwares, (Whatsapp, Signal, Viber, Telegram...), \textffm{Meow} provides a simple server based messaging. The main difference is that allows to explicitly choose which server you want to use. The server code being open source, we strongly encourage you to run your own server at home or in your company. The server requires very few ressources and will run on any low cost single board computer. \subsubsection{Anonymized message transfer} \textffm{Meow} also provides an anonymizing transfer services very similar to the Tor Onion protocol, we called it the Matriochka protocol. Any server can be used for building the transfer chain. Some of them might be marked as trusted. It is strongly advised to use trusted servers as your first node and message server (the one that holds your incoming messages). \subsubsection{Presence protocol for direct messaging} A presence service associating your conversation keys to your IP address for direct peer to peer connection is also provided. The presence protocol is simply activated by setting a flag in the message poll requests. If that flag is set, your encrypted IP will be published on the server, allowing your only your peer(s) to decrypt it and directly communicate with your terminal. \subsubsection{Peer based privacy settings} You might define specific communication privacy preferences for each of your contacts : \begin{itemize} \item simple server based communication allowed for Joe, \item direct communication prefered with Julian, fallback to my own server, \item matriochka protocol required for Edward, first node is one of my trusted servers, my message node is my own server, randomly switch from trusted server lists for others. \item ... \end{itemize} \subsection{Multiple devices support} \textffm{Meow} allows you to be connected from multiple devices and offers chat synchronization capability. A device might be revoqued anytime from an other any one. Proof of your identity (password or other) shall be provided in order to grant device revocation. \subsection{Adding contacts} If you want to add a new contact, keys and uuids will be generated, then a rendez-vous card will be created. That rendez-vous card might be sent by any trustable communication means, or preferably from hand to hand, as a file on a flash disk or a QR code.\\ In return your contact will provide the exact same data, encrypted with your public key and delivered to the address specified in the initial rendez-vous card. \subsection{Contacts forwarding} Using the \textffm{Meow} protocol a user won't be able to forward your contact information without your consent. Each user knows you as a different identity, thus forwarding a known identity to another user is meaningless, any message to that identity signed by another user would be discarded. \subsection{Group conversation} A very basic group messaging service is available. It allows to exchange group information between users. After that, a message to a group will send a copy of the message to each member. \subsection{Emergency broadcast} The \subsection{Public networks shortage resilience} \textffm{Meow} may run without Internet connection, either on an isolated wifi access point, either on a meshed network of wifi routers or even via serial IOT transport layers (LoRa,...) \subsection{User directory service} This service allows to restore a lost functionality of Internet historic chat services (like ICQ). You could simply set a "Free for chat" status that allowed other people to contact you, either randomly or based on a short description that you might provide. Why providing that service while the internet is suffocating due to the abundance of social networks ?\\ Well, that option offered a few advantages : \begin{itemize} \item you're still an anonymous user chatting with other anonymous users. \item no social network algorithm will select people that think/behave/vote/eat... just like you. Diversity makes a better world. \item a smaller community of users, skilled enough to operate a \textffm{Meow} chat app... that might provide a first filter. It's a bit like in the old times, when people had to be able to start a win98 computer, connect it to internet, then download and install ICQ... If you lost some time in social networks, and experienced ICQ in the 2000's, you know what I mean. \end{itemize} \section{Identities and keys} \subsection{User identity} Each \textffm{Meow} user has a unique identity. That identity is strictly private, only used to manage your own data (local encryption, devices, ...) Let's call that one the User Key Pair (Ukp) \subsection{Contact identity} Each of your contacts will know you as a different identity, we'll call that one the Contact Key Pair (Ckp) This means that : \begin{itemize} \item none of your contacts will be able to forward your id to another person without your consent \item any message to that Ckp, not signed by the user associated to it, will be discarded. \end{itemize} \subsection{Conversation encryption} Each conversation with one of your contacts will be encrypted using an encryption keypair (Ekp) The Ekp might be changed anytime by its owner and the new public key will be sent along the last message. The Ekp is used to cypher your conversation. \subsection{Conversation lookup} A contact conversation Lookup Key Pair(Lkp) is also associated with your conversation. The Lkp public key is used to identify your conversation on a server. the private key allows you to sign your tequest and prove the server that you are the legitimate recipient for a message. This Lkp can be changed anytime by it's owner and the new public key will be sent along the last message. The Lkp and the Ekp are only changed, once the change has beeen acknowledged by your contact. \subsection{Server identity} Each server has a Server key (Skp). That key allows you to cypher the messages that you're sending to the server. \subsection{Device identity} Each device is identified by a key (Dkp), that device key allows you to perform secured exchanges between your devices for synchronization/revocation purposes. Communication between devices is achieved using the same principle as the user to user communication. A device might be considered as any another user. The messages content are based on a synchronization protocol. \section{Contact management} \subsection{Adding a contact} Rendez-vous card, containing : \begin{itemize} \item Your public key for that contact \item An initial conversation public key for getting encrypted messages from that contact \item An initial conversation uuid that you'll use to lookup for incoming messages on the servers \item A list of your prefered message servers \item A signature to prevent transmission of tampered data \end{itemize} \subsection{Sharing a contact} If a user wants to forward one of his contacts to you, that will be handled as a double request : \begin{enumerate} \item I'm receiving a contact name, without any key \item \end{enumerate} \section{Messaging} \subsection{User messages} TODO \subsection{Server stored message} TODO \subsection{Matriochka message packing} TODO \subsection{Synchronization messages} TODO \section{Transport protocols} \subsection{URLs} Server urls do define the protocol used for communicating with the server. Some of the protocols will be described hereafter, but that list is not exhaustive, and might be extended in the future.\\ Examples of a valid url: \begin{verbatim} http://myserver.com https://user:pass@myauthenticatedserver.net:8443 mqtt://mymqttserver:6203 udp://myudpserver.org:41325 serial://dev/ttyS0 \end{verbatim} \subsection{HTTP/S} TODO \subsection{UDP} TODO \subsection{Internetless alternative routing} TODO \section{Server Features} \subsection{Server catalog} \subsection{Antispam} \subsection{Self defense} \section{Backup} \section{Recovery} \section{Very secure devices} You don't trust your phone ? \end{document}