init
parent
fdea3e34a8
commit
7096092da9
@ -0,0 +1,190 @@
|
||||
# Separate Endpoints for Binding Threepids
|
||||
|
||||
On the Client Server API there is currently a single API for binding a
|
||||
threepid (an email or a phone number): [POST
|
||||
/_matrix/client/r0/account/3pid](https://matrix.org/docs/spec/client_server/r0.5.0#post-matrix-client-r0-account-3pid).
|
||||
Depending on whether the `bind` flag is `true` or `false`, the threepid will
|
||||
be bound to either a user's account on the homeserver, or both the homeserver
|
||||
and an identity server.
|
||||
|
||||
A threepid can be bound to an identity server to allow other users to find
|
||||
their Matrix ID using their email address or phone number. A threepid can
|
||||
also be bound to a user's account on the homeserver. This allows that
|
||||
threepid to be used for message notifications, login, password reset, and
|
||||
other important functions.
|
||||
|
||||
Typically, when using the `POST /_matrix/client/r0/account/3pid` endpoint,
|
||||
the identity server handles the verification -- either by sending an email to
|
||||
the email address, or a SMS message to the phone number. Once completed, the
|
||||
homeserver would check with the identity server that verification had indeed
|
||||
happened, and if so, the threepid would be bound (again, either to the
|
||||
homeserver, or the homeserver and identity server simultaneously).
|
||||
|
||||
Now, consider the fact that the identity server used in this process is
|
||||
provided by the user, using the endpoint's `id_server` parameter. If the user were
|
||||
to supply a malicious identity server that would immediately answer "yes" to
|
||||
any threepid validation, then the user could add any threepid to their
|
||||
account on the homeserver (which is likely not something homeserver admins want).
|
||||
|
||||
To solve this problem, we propose adding a second endpoint that is only used
|
||||
for binding to an identity server of the user's choice. This endpoint will
|
||||
not bind the threepid to the user's account on the homeserver, only on the
|
||||
identity server.
|
||||
|
||||
In addition, the existing binding endpoint will lose the ability to bind
|
||||
threepids to an identity server, by removing its `bind` flag. Instead, it
|
||||
will solely be used to bind to the user's account on the homeserver.
|
||||
|
||||
To be clear, the above issue is not a long-standing security issue. Indeed it
|
||||
is not a problem in any released version of Synapse, as Synapse keeps a list
|
||||
of "trusted identity servers" that acts a whitelist for what identity servers
|
||||
a user can specify.
|
||||
|
||||
Synapse is soon to lose this whitelist however, as part of lessening the
|
||||
reliance of homeservers on identity servers. This cannot be done while the
|
||||
homeserver is still trusting an identity server for validation of threepids.
|
||||
If the endpoints are split, the homeserver will handle the validation of
|
||||
threepids being added to user accounts, and identity servers will validate
|
||||
threepids being added to their own database.
|
||||
|
||||
One may question why clients don't just contact an identity server directly
|
||||
to bind a threepid, bypassing the implications of binding through a
|
||||
homeserver. While this will work, binds should still occur through a
|
||||
homeserver such that the homeserver can keep track of which binds were made,
|
||||
which is important when a user wishes to deactivate their account (and remove
|
||||
all of their bindings made on different identity servers).
|
||||
|
||||
A bind could be made on an identity server, which could then tell the
|
||||
homeserver that a validation occured, but then there are security
|
||||
considerations about how to authenticate an identity server in that instance
|
||||
(and prevent people pretending to be identity servers and telling homeservers
|
||||
about hundreds of fake binds to a user's account).
|
||||
|
||||
This MSC obseletes
|
||||
[MSC2229](https://github.com/matrix-org/matrix-doc/pull/2229), which dealt
|
||||
with changing the rules of the `bind` flag. Since this flag is being removed,
|
||||
the MSC is no longer relevant.
|
||||
|
||||
## Proposal
|
||||
|
||||
A new endpoint will be added to the Client Server API: `POST /_matrix/client/r0/account/3pid/identity/bind`, and requires authentication.
|
||||
|
||||
The endpoint definition is the same as `POST
|
||||
/_matrix/client/r0/account/3pid`, minus the `bind` flag.
|
||||
|
||||
An example of binding a threepid to an identity server with this new endpoint:
|
||||
|
||||
First the client must request the threepid be validated by its chosen identity server.
|
||||
|
||||
```
|
||||
POST https://identity.server/_matrix/identity/v2/validate/email/requestToken
|
||||
|
||||
{
|
||||
"client_secret": "don'tT3ll",
|
||||
"email": "bob@example.com",
|
||||
"send_attempt": 1
|
||||
}
|
||||
```
|
||||
|
||||
Once an email has been sent, the user clicks the link in the email, which
|
||||
notifies the identity server that the email has been verified.
|
||||
|
||||
Next, the client completes the bind by calling the new endpoint on the homeserver:
|
||||
|
||||
```
|
||||
POST https://home.server/_matrix/client/r0/account/3pid/identity/bind
|
||||
|
||||
{
|
||||
"three_pid_creds": {
|
||||
"id_server": "example.org",
|
||||
"id_access_token": "abc123_OpaqueString",
|
||||
"sid": "abc123987",
|
||||
"client_secret": "don'tT3ll"
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
The homeserver will then make a bind request on behalf of the user to the
|
||||
specified identity server. The homeserver will record if the bind was
|
||||
successful and notify the user.
|
||||
|
||||
And for completeness, here is an example of binding a threepid to the
|
||||
homeserver only, using the old endpoint:
|
||||
|
||||
The homeserver is validating the threepid in this instance, so the client
|
||||
must use the `/requestToken` endpoint of the homeserver:
|
||||
|
||||
```
|
||||
POST https://home.server/_matrix/client/r0/account/3pid/email/requestToken
|
||||
|
||||
{
|
||||
"client_secret": "don'tT3ll",
|
||||
"email": "bob@example.com",
|
||||
"send_attempt": 1,
|
||||
}
|
||||
```
|
||||
|
||||
Once an email has been sent, the user clicks the link in the email, which
|
||||
notifies the homeserver that the email has been verified.
|
||||
|
||||
The client then sends a request to the old endpoint to bind the threepid to
|
||||
user's account.
|
||||
|
||||
```
|
||||
POST /_matrix/client/r0/account/3pid
|
||||
|
||||
{
|
||||
"three_pid_creds": {
|
||||
"sid": "abc123987",
|
||||
"client_secret": "don'tT3ll"
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
The threepid will then be bound to the user's account.
|
||||
|
||||
Users will be able to perform binds to an identity server for a threepid even if that threepid has not been bound to the user's account on the homeserver before.
|
||||
|
||||
The achieve the above flow, some changes need to be made to existing
|
||||
endpoints as well. This MSC requests that the `id_server` and
|
||||
`id_access_token` parameters be removed from the Client-Server API's [POST
|
||||
/_matrix/client/r0/account/3pid/email/requestToken](https://matrix.org/docs/spec/client_server/r0.5.0#post-matrix-client-r0-account-3pid-email-requesttoken)
|
||||
endpoint, as this endpoint is now only intended for the homeserver to send
|
||||
emails from. Additionally, the same parameters will be removed from the [POST
|
||||
/_matrix/client/r0/account/3pid](https://matrix.org/docs/spec/client_server/unstable#post-matrix-client-r0-account-3pid)endpoint's
|
||||
`three_pid_creds` parameter as an identity server is no longer required to
|
||||
perform verification.
|
||||
|
||||
This MSC also requests that the text "It is imperative that the homeserver
|
||||
keep a list of trusted Identity Servers and only proxies to those that it
|
||||
trusts." be removed from all parts of the spec, as the homeserver should no
|
||||
longer need to trust any identity servers.
|
||||
|
||||
## Tradeoffs
|
||||
|
||||
It may be possible to reduce the two calls per flow into a single endpoint,
|
||||
but the current asynchronous approach makes it easy for a client to send a
|
||||
request, go offline, have the threepid be validated, and then come online
|
||||
again to finalize the validation afterwards.
|
||||
|
||||
## Backwards compatibility
|
||||
|
||||
TODO
|
||||
|
||||
## Security considerations
|
||||
|
||||
Reducing the homeserver's trust in identity servers should be a boost to security and improve decentralisation in the Matrix ecosystem to boot.
|
||||
|
||||
Caution should be taken for homeserver developers to be sure not to continue
|
||||
to use user-provided identity servers for any sensitive tasks once it removes
|
||||
the concept of a trusted identity server.
|
||||
|
||||
## Conclusion
|
||||
|
||||
This MSC helps reduce the homeserver's trust in an identity server even
|
||||
further to the point where it is only used for binding addresses for lookup -
|
||||
which was the original intention of the Identity Service API.
|
||||
|
||||
Additionally, by clearly separating the threepid bind endpoint into two
|
||||
endpoints that each have a clear intention, the concept of threepid binding
|
||||
becomes a lot easier to reason about.
|
Loading…
Reference in New Issue