Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disable room key requests #26524

Closed
richvdh opened this issue Nov 8, 2023 · 3 comments · Fixed by matrix-org/matrix-js-sdk#3939
Closed

Disable room key requests #26524

richvdh opened this issue Nov 8, 2023 · 3 comments · Fixed by matrix-org/matrix-js-sdk#3939
Assignees
Labels
A-Element-R Issues affecting the port of Element's crypto layer to Rust T-Other Questions, user support, anything else Z-Labs

Comments

@richvdh
Copy link
Member

richvdh commented Nov 8, 2023

m.room_key_request messages are a huge source of to-device messages, and the value they bring is questionable. They also make it harder to track down and fix underlying bugs in the crypto implementation, by making symptoms disappear.

Apparently the mobile Element-X clients do not send room key requests at all, and the world keeps turning.

@ara4n says:

(i really really think we should just disable them, in order to avoid clouding bugs like this)

Disabling them would fix various issues like https://github.com/vector-im/element-web/issues/26313, #19488, matrix-org/matrix-spec#1659.

Given we have key backup as a more reliable mechanism for gossiping keys between devices, why exactly do we still have room_key_request?

(This is proposed for Element-R, though presumably if it's good enough for ER we could do the same on legacy crypto?)

@richvdh richvdh added T-Other Questions, user support, anything else A-Element-R Issues affecting the port of Element's crypto layer to Rust labels Nov 8, 2023
@github-actions github-actions bot added the Z-Labs label Nov 8, 2023
@dkasak
Copy link
Member

dkasak commented Nov 8, 2023

Presumably one edge case is people who deliberately turn off their key backup.

It should also be noted that key forwards (that is, trusted key forwards, the only kind remaining today) are authenticated whereas keys retrieved from today's broken backup implementation are not. This means all messages decrypted from keys obtained from the current backup will receive ugly grey shields.

@richvdh richvdh changed the title Consider disabling room key requests Disable room key requests Nov 30, 2023
@richvdh
Copy link
Member Author

richvdh commented Nov 30, 2023

We discussed this with @pmaier1 today, and we agreed to try disabling outgoing room-key requests for now, at least.

@richvdh richvdh self-assigned this Nov 30, 2023
@pmaier1
Copy link

pmaier1 commented Dec 1, 2023

Thanks! As we want to maintain focus and improve performance, we drop this for now. We don't want to cover up root causes of UTDs with gossiping. We for now rely on backup if the user wants to have message history on new devices. We might want to re-evaluate this decision later but this is it for now.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
A-Element-R Issues affecting the port of Element's crypto layer to Rust T-Other Questions, user support, anything else Z-Labs
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants