explain how to verify sender_key ownership
This commit is contained in:
parent
8274f91b0b
commit
76071bae98
1 changed files with 9 additions and 4 deletions
|
@ -360,6 +360,9 @@ The plaintext payload is of the form:
|
||||||
"type": "<type of the plaintext event>",
|
"type": "<type of the plaintext event>",
|
||||||
"content": "<content for the plaintext event>",
|
"content": "<content for the plaintext event>",
|
||||||
"room_id": "<the room_id>",
|
"room_id": "<the room_id>",
|
||||||
|
"keys": {
|
||||||
|
"ed25519": "<sender_ed25519_key>"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
The type and content of the plaintext message event are given in the payload.
|
The type and content of the plaintext message event are given in the payload.
|
||||||
|
@ -367,10 +370,12 @@ The type and content of the plaintext message event are given in the payload.
|
||||||
We include the room ID in the payload, because otherwise the homeserver would
|
We include the room ID in the payload, because otherwise the homeserver would
|
||||||
be able to change the room a message was sent in.
|
be able to change the room a message was sent in.
|
||||||
|
|
||||||
.. TODO: claimed_keys
|
Clients must confirm that the ``sender_key`` and the ``ed25519`` field value
|
||||||
|
under the ``keys`` property match the keys returned by |/keys/query|_ for
|
||||||
Clients must confirm that the ``sender_key`` belongs to the user that sent the
|
the given user, and must also verify the signature of the payload. Without
|
||||||
message. TODO: how?
|
this check, a client cannot be sure that the sender device owns the private
|
||||||
|
part of the ed25519 key it claims to have in the Olm payload.
|
||||||
|
This is crucial when the ed25519 key corresponds to a verified device.
|
||||||
|
|
||||||
``m.megolm.v1.aes-sha2``
|
``m.megolm.v1.aes-sha2``
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue