Skip to content

Conversation

@uhoreg
Copy link
Member

@uhoreg uhoreg commented Oct 18, 2022

@uhoreg uhoreg marked this pull request as ready for review November 1, 2022 22:48
@uhoreg uhoreg requested a review from a team as a code owner November 1, 2022 22:48
@uhoreg uhoreg requested a review from dkasak November 1, 2022 22:49
Copy link
Member

@dkasak dkasak left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What's there looks mostly good, but I have a few suggestions.

Also, in relation to #1275, I don't think this PR addresses these points:

  • The implementation should first check whether a given key ID is a MSK (referring to a cross-signing user identity), and only then check whether it matches a device.
  • Specify what it means for a device to be trusted

Did I just miss it?

@dbkr
Copy link
Member

dbkr commented Nov 8, 2022

Looks sensible & like useful clarifications to me. 👍

Copy link
Member

@dbkr dbkr left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

(Not approving yet since Denis has outstanding comments)

@uhoreg
Copy link
Member Author

uhoreg commented Nov 16, 2022

  • Specify what it means for a device to be trusted

Since we mean "verified" when we say "trusted", maybe we should just say "verified" instead? Especially since we use "trusted" in other contexts to mean something else.

@uhoreg uhoreg requested a review from dkasak November 16, 2022 00:20
Copy link
Member

@dkasak dkasak left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I left a final comment that needs addressing before merging, but otherwise this looks good to me.

The final comment concerns the goal of ending up not being vulnerable to key confusion bugs, which means we either have to flat out refuse to proceed in case of key ID collisions or we have to guarantee a consistent key checking order. I think I prefer flat out refusing, because it's simpler, unless you see a problem with it.

Once either suggestion is merged, I'm considering this good for merging.

@uhoreg uhoreg requested a review from dkasak November 16, 2022 16:15
Copy link
Member

@dkasak dkasak left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yay, looks good!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Clarifiy spec on Key verification framework in room E2EE clarifications in the aftermath of the 2022-09-28 disclosure

3 participants