feature request: Implement fallback keys to improve E2EE reliability #1228
Labels
No labels
Blocked
Bug
Cherry-picking
Database
Dependencies
Dependencies/Renovate
Difficulty
Easy
Difficulty
Hard
Difficulty
Medium
Documentation
Enhancement
Good first issue
Help wanted
Inherited
Matrix/Administration
Matrix/Appservices
Matrix/Auth
Matrix/Client
Matrix/Core
Matrix/Federation
Matrix/Hydra
Matrix/MSC
Matrix/Media
Meta
Meta/CI
Meta/Packaging
Priority
Blocking
Priority
High
Priority
Low
Security
Status
Confirmed
Status
Duplicate
Status
Invalid
Status
Needs Investigation
Support
To-Merge
Wont fix
old/ci/cd
old/rust
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
continuwuation/continuwuity#1228
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Right now continuwuity only supports one-time keys, however, if a device is offline for a long time, its one time key pool may become exhausted, and further attempts to send messages to that device will result in unable-to-decrypt errors, which may end up being unrecoverable under some circumstances.
Fallback keys were added in spec v1.2, and they allow devices to continue receiving new encrypted messages even when their one time keys are exhausted, with the added risk of replay attacks. Synapse currently supports this, and I believe Tuwunel added support for them recently.
We should implement support for uploading and replacing fallback keys, as well as serving them to consumers where needed. This will likely greatly improve the reliability of encryption when people don't spend every waking moment on matrix.