conduit/src
Matthias Ahouansou c453d45598
fix(keys): only use keys valid at the time of PDU or transaction, and actually refresh keys
Previously, we only fetched keys once, only requesting them again if we have any missing, allowing for ancient keys to be used to sign PDUs and transactions
Now we refresh keys that either have or are about to expire, preventing attacks that make use of leaked private keys of a homeserver
We also ensure that when validating PDUs or transactions, that they are valid at the origin_server_ts or time of us receiving the transaction respectfully
As to not break event authorization for old rooms, we need to keep old keys around
We move verify_keys which we no longer see in direct requests to the origin to old_verify_keys
We keep old_verify_keys indefinitely as mentioned above, as to not break event authorization (at least until a future MSC addresses this)
2024-06-12 19:41:43 +02:00
..
api fix(keys): only use keys valid at the time of PDU or transaction, and actually refresh keys 2024-06-12 19:41:43 +02:00
config OpenID routes 2024-05-28 15:39:19 +01:00
database fix(keys): only use keys valid at the time of PDU or transaction, and actually refresh keys 2024-06-12 19:41:43 +02:00
service fix(keys): only use keys valid at the time of PDU or transaction, and actually refresh keys 2024-06-12 19:41:43 +02:00
utils chore: bump all dependencies 2024-06-11 20:35:56 +01:00
clap.rs allow including extra info in --version output 2024-03-11 20:11:59 -07:00
lib.rs Add argument parser for the conduit executable 2024-03-11 09:43:02 -07:00
main.rs chore: bump all dependencies 2024-06-11 20:35:56 +01:00