note about how to handle key resets

fayed/tofu
Faye Duxovni 3 years ago
parent f8c1561607
commit 7d56dc0b5d

@ -100,6 +100,16 @@ device. If the device observes too many missing key indices in its
to-device Olm session, however, that may be a sign that the homeserver to-device Olm session, however, that may be a sign that the homeserver
is dropping messages. is dropping messages.
In this threat model, another thing the homeserver can do is falsely
claim that the user's cross-signing keys have been reset by another
device. For the most part, this simply amounts to a denial-of-service
attack on cross-signing, which is difficult to prevent in
general. However, it's important to note that if a formerly-verified
device is told by the server that there's been a key reset, it must
still hold onto its record of signatures created with the old TSK, and
re-sign those with the new TSK once it has been able to confirm the
new MSK as part of becoming re-verified.
## Unstable prefix ## Unstable prefix
This proposal does not add any new API endpoints, but does add some This proposal does not add any new API endpoints, but does add some

Loading…
Cancel
Save