forked from mystiq/hydrogen-web
document steps needed to implement e2e
This commit is contained in:
parent
d34a0c73b5
commit
2ce0f6e30e
1 changed files with 88 additions and 0 deletions
88
doc/e2e.md
Normal file
88
doc/e2e.md
Normal file
|
@ -0,0 +1,88 @@
|
||||||
|
# Implementing e2e encryption:
|
||||||
|
## Olm
|
||||||
|
- implement MemberList as ObservableMap
|
||||||
|
- make sure we have all members (as we're using lazy loading members), and store these somehow
|
||||||
|
- do we need to update /members on every limited sync response or did we find a way around this?
|
||||||
|
- implement creating/loading an olm account
|
||||||
|
- add libolm as dependency
|
||||||
|
- store pickled account
|
||||||
|
- load pickled account
|
||||||
|
- update pickled account
|
||||||
|
- add initial one-time keys
|
||||||
|
- publish keys with /keys/upload
|
||||||
|
- implement creating/loading an olm session for (userid, deviceid)
|
||||||
|
- get olm session for [(userid, deviceid), ...] (array so they can all go out in one /keys/claim call?)
|
||||||
|
- create if not exists
|
||||||
|
- claim one-time key with /keys/claim
|
||||||
|
- verify signature on key
|
||||||
|
- ??? what about inbound/outbound sessions? do they require multiple OlmSession objects?
|
||||||
|
- doesn't look like it, more like a way to start the session but once started (type=1), they are equivalent?
|
||||||
|
- for outbound, see file:///home/bwindels/Downloads/matrix-docs/End-to-End%20Encryption%20implementation%20guide%20%7C%20Matrix.org.html#starting-an-olm-session
|
||||||
|
- for inbound, see: file:///home/bwindels/Downloads/matrix-docs/End-to-End%20Encryption%20implementation%20guide%20|%20Matrix.org.html#handling-an-mroomencrypted-event
|
||||||
|
- so in this case, it would the session would be created as an outbound session.
|
||||||
|
- store pickled, index by curve25519 identity key?
|
||||||
|
- get from storage if exists and unpickle
|
||||||
|
- implement device tracking
|
||||||
|
- store users?
|
||||||
|
- needs_update (riot has status with 4 states: not tracked, pending download, downloading, up to date)
|
||||||
|
- set during sync for users that appear in device_lists.changed
|
||||||
|
- store devices
|
||||||
|
- id
|
||||||
|
- userid
|
||||||
|
- signing KP
|
||||||
|
- identity KP
|
||||||
|
- algorithms
|
||||||
|
- device name
|
||||||
|
- verified
|
||||||
|
- known? riot has this ... what does it mean exactly?
|
||||||
|
- handle device_lists.changed in /sync response
|
||||||
|
- call /keys/changed to get updated devices and store them
|
||||||
|
- handle device_lists.left in /sync response
|
||||||
|
- we can keep verified devices we don't share a room with anymore around perhaps, but
|
||||||
|
shouldn't update them ... which we won't do anyway as they won't appear in changed anymore
|
||||||
|
- when e2e is enabled, start tracking:
|
||||||
|
- call /keys/query for all members in MemberList
|
||||||
|
- verify signature on device keys
|
||||||
|
- store devices
|
||||||
|
- implement maintaining one-time keys on server
|
||||||
|
- update account with new new keys when /sync responded with device_one_time_keys_count < MAX/2
|
||||||
|
- upload new one-time keys to /keys/upload
|
||||||
|
- mark them as published in account
|
||||||
|
- update picked session in storage
|
||||||
|
- implement encrypting olm messages
|
||||||
|
- roughly file:///home/bwindels/Downloads/matrix-docs/End-to-End%20Encryption%20implementation%20guide%20|%20Matrix.org.html#encrypting-an-event-with-olm
|
||||||
|
- packaging as m.room.encrypted event
|
||||||
|
- implement decrypting olm messages
|
||||||
|
- roughly file:///home/bwindels/Downloads/matrix-docs/End-to-End%20Encryption%20implementation%20guide%20|%20Matrix.org.html#handling-an-mroomencrypted-event
|
||||||
|
- decrypt with libolm
|
||||||
|
- verify signature
|
||||||
|
- check message index, etc to detect replay attacks
|
||||||
|
- handling wedged olm sessions
|
||||||
|
- ???
|
||||||
|
|
||||||
|
|
||||||
|
## Megolm
|
||||||
|
- create new megolm session
|
||||||
|
- create new outbound group session
|
||||||
|
- get megolm session id and key, put in m.room_key event
|
||||||
|
- store megolm session
|
||||||
|
- encrypt using olm and send as m.room.encrypted device message
|
||||||
|
- receiving new megolm session
|
||||||
|
- listen for m.room_key device message
|
||||||
|
- decrypt using olm
|
||||||
|
- store megolm session
|
||||||
|
- encrypt megolm message
|
||||||
|
- decrypt megolm message
|
||||||
|
- rotate megolm session
|
||||||
|
- ??? does this happen automatically?
|
||||||
|
- deactive sessions when members leave the room
|
||||||
|
|
||||||
|
## Verifying devices
|
||||||
|
- validate fingerprint
|
||||||
|
- have a look at SAS?
|
||||||
|
|
||||||
|
## Encrypted attachments
|
||||||
|
- use AES-CTR from https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto
|
||||||
|
|
||||||
|
## Notes
|
||||||
|
- libolm api docs (also for js api) would be great
|
Loading…
Reference in a new issue