Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add some e2ee clarifications #1294

Merged
merged 7 commits into from
Nov 17, 2022
Merged

Conversation

uhoreg
Copy link
Member

@uhoreg uhoreg commented Oct 18, 2022

@uhoreg uhoreg marked this pull request as ready for review November 1, 2022 22:48
@uhoreg uhoreg requested a review from a team as a code owner November 1, 2022 22:48
@uhoreg uhoreg requested a review from dkasak November 1, 2022 22:49
Copy link
Member

@dkasak dkasak left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What's there looks mostly good, but I have a few suggestions.

Also, in relation to #1275, I don't think this PR addresses these points:

  • The implementation should first check whether a given key ID is a MSK (referring to a cross-signing user identity), and only then check whether it matches a device.
  • Specify what it means for a device to be trusted

Did I just miss it?

content/client-server-api/modules/end_to_end_encryption.md Outdated Show resolved Hide resolved
content/client-server-api/modules/end_to_end_encryption.md Outdated Show resolved Hide resolved
data/event-schemas/schema/m.secret.request.yaml Outdated Show resolved Hide resolved
data/event-schemas/schema/m.secret.send.yaml Outdated Show resolved Hide resolved
@dbkr
Copy link
Member

dbkr commented Nov 8, 2022

Looks sensible & like useful clarifications to me. 👍

Copy link
Member

@dbkr dbkr left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

(Not approving yet since Denis has outstanding comments)

Co-authored-by: Denis Kasak <dkasak@termina.org.uk>
@uhoreg
Copy link
Member Author

uhoreg commented Nov 16, 2022

  • Specify what it means for a device to be trusted

Since we mean "verified" when we say "trusted", maybe we should just say "verified" instead? Especially since we use "trusted" in other contexts to mean something else.

@uhoreg uhoreg requested a review from dkasak November 16, 2022 00:20
Copy link
Member

@dkasak dkasak left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I left a final comment that needs addressing before merging, but otherwise this looks good to me.

The final comment concerns the goal of ending up not being vulnerable to key confusion bugs, which means we either have to flat out refuse to proceed in case of key ID collisions or we have to guarantee a consistent key checking order. I think I prefer flat out refusing, because it's simpler, unless you see a problem with it.

Once either suggestion is merged, I'm considering this good for merging.

content/client-server-api/modules/end_to_end_encryption.md Outdated Show resolved Hide resolved
uhoreg and others added 2 commits November 16, 2022 09:00
Co-authored-by: Denis Kasak <dkasak@termina.org.uk>
@uhoreg uhoreg requested a review from dkasak November 16, 2022 16:15
Copy link
Member

@dkasak dkasak left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yay, looks good!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
3 participants