J. Ryan Stinnett
96c8c2b9c3
Test for cross-signing private key as well as public
2019-12-04 15:16:38 +00:00
J. Ryan Stinnett
c0dbf2df7f
Publicise method testing for secret storage key existence
2019-12-04 14:23:47 +00:00
J. Ryan Stinnett
eeffe208ec
Clarify client-level method for adding secret storage keys
2019-12-04 13:45:56 +00:00
J. Ryan Stinnett
9dc61faa6f
Add bootstrap option to specify storage key
2019-12-04 11:36:25 +00:00
J. Ryan Stinnett
58ad1ecbfe
Sign secret storage keys when cross-signing keys change
2019-12-02 13:50:43 +00:00
J. Ryan Stinnett
463538178d
Clarify purpose of the after local key change helper
2019-12-02 13:02:21 +00:00
J. Ryan Stinnett
14907065d7
Rename device signing auth param
2019-11-29 17:50:59 +00:00
J. Ryan Stinnett
ce2059a4b9
Add follow-up steps when restoring from secret storage
...
If we restore cross-signing keys from secret storage, we also need to run many
of the same follow-up steps from resetting the keys, such as saving to the
crypto store, upgrading device verifications, etc.
2019-11-29 15:20:59 +00:00
J. Ryan Stinnett
2bfc157e64
Clarify cross-signing reset variable
2019-11-29 15:15:18 +00:00
J. Ryan Stinnett
e69de8c26f
Merge remote-tracking branch 'origin/develop' into jryans/4s-new-key-backup
2019-11-29 11:23:48 +00:00
J. Ryan Stinnett
f404c80714
Get cross-signing private keys from secret storage
...
If you've already set up cross-signing elsewhere and start using a new device,
this loads the private keys from secret storage and regenerates the public keys
to match.
We may also want to download the public keys from the homeserver's key sharing
and verify that they match the private keys, but for now that's left as future
work.
2019-11-29 11:11:45 +00:00
J. Ryan Stinnett
bdaf2e3b4f
Reflow comment
2019-11-28 12:13:48 +00:00
J. Ryan Stinnett
e000e2b9fd
Move cross-signing storage to 4S into class
2019-11-28 11:54:20 +00:00
J. Ryan Stinnett
d5000820fd
Fix comment typo
2019-11-27 17:19:41 +00:00
J. Ryan Stinnett
9d91d197e4
Revert to previous cross-signing keys on error
2019-11-27 16:11:06 +00:00
J. Ryan Stinnett
5b767ae948
More comment tweaks to cross-signing keys
2019-11-27 15:51:00 +00:00
RiotRobot
6ea8003df2
Merge branch 'master' into develop
2019-11-27 10:28:14 +00:00
Matthew Hodgson
fd73c3fb3a
fix bogus logline
2019-11-27 01:19:17 +00:00
Matthew Hodgson
46f8251e94
s/console/logger/ as per review
2019-11-26 12:03:28 -07:00
Matthew Hodgson
8c72fd104e
lint
2019-11-26 12:03:20 -07:00
Matthew Hodgson
549656884b
expand e2ee logging to better debug UISIs
2019-11-26 12:03:11 -07:00
Matthew Hodgson
fcbfaac1fd
Merge pull request #1090 from matrix-org/matthew/more_e2ee_logging
...
expand e2ee logging to better debug UISIs
2019-11-26 10:18:28 +00:00
Matthew Hodgson
3787b6f1c7
s/console/logger/ as per review
2019-11-26 09:07:23 +00:00
Matthew Hodgson
191695da5a
lint
2019-11-26 01:41:59 +00:00
Matthew Hodgson
2215087f96
expand e2ee logging to better debug UISIs
2019-11-26 01:17:12 +00:00
Michael Telatynski
32234ee7fc
Merge pull request #1087 from matrix-org/t3chguy/remove_bluebird_11
...
Remove Bluebird: phase 2
2019-11-26 00:03:22 +00:00
David Baker
49448fafaa
Correct comment (it's not just a cache)
2019-11-25 15:05:10 +00:00
Bruno Windels
11a958b8ca
Merge pull request #1085 from matrix-org/bwindels/verif-toasts
...
Monitor verification request over DM as well
2019-11-22 16:39:07 +00:00
Bruno Windels
6952db6762
no need to filter here anymore when listening for timeline, also remove obsolete docs
2019-11-22 17:32:37 +01:00
Bruno Windels
51898cffe8
add comments for timeout constants
2019-11-22 17:31:48 +01:00
Bruno Windels
ca89b6e7a8
use adapter for to_device requests to have same api as for verif over DM
...
Riot doesn't fully implement to_device verifications, e.g.
it doesn't send a `request` but immediately sends a `start` event.
Because of this, `crypto.verification.request` doesn't get fired,
as that code path doesn't get triggered. This is why MatrixChat
in the react-sdk was listening for `crypto.verification.start`.
Verification over DM *does* send a `request` event first, so
to have the same API for both methods, we fake the request and
wrap the verifier in it.
2019-11-22 16:12:19 +01:00
Bruno Windels
ac1173c628
also emit crypto.verification.request for verification over DM
2019-11-22 16:11:49 +01:00
Michael Telatynski
0a0ae111f6
replace Bluebird::map
2019-11-22 15:03:03 +00:00
Michael Telatynski
549b0f9313
Stop using Bluebird.delay and Bluebird promise::delay
...
Signed-off-by: Michael Telatynski <7t3chguy@gmail.com >
2019-11-21 10:05:59 +00:00
J. Ryan Stinnett
4116d89d5f
Store cross-signing keys in secret storage
2019-11-20 17:48:36 +00:00
J. Ryan Stinnett
cc192efe45
Create the SSSS default key when needed
2019-11-20 17:27:57 +00:00
J. Ryan Stinnett
feef1a35b9
Add first pass at bootstrapping Secure Secret Storage
...
This adds a first chunk of bootstrapping Secure Secret Storage by creating
cross-signing keys and supporting interactive auth to upload them.
Part of https://github.com/vector-im/riot-web/issues/11212
2019-11-20 17:23:21 +00:00
J. Ryan Stinnett
55a2f46604
Remove doesCrossSigningHaveKeys, use getId instead
2019-11-20 14:42:46 +00:00
Bruno Windels
c785b10603
Merge pull request #1077 from matrix-org/bwindels/dm-verif-in-e2ee-rooms
...
Fix SAS verification in encrypted DMs
2019-11-19 14:32:01 +00:00
Bruno Windels
90512bdd5f
also listen for non-encrypted events when verifying over DM
2019-11-19 15:23:05 +01:00
J. Ryan Stinnett
10751e9a6d
Merge pull request #1078 from matrix-org/jryans/4s-new-key-backup
...
Cross-signing / secret storage tweaks
2019-11-19 12:54:38 +00:00
J. Ryan Stinnett
d51c5a2d68
Rename secret storage file to match the default class
2019-11-19 11:21:20 +00:00
Bruno Windels
cd735ef459
use getRelation as getContent()[m.relates_to] doesn't work in e2ee rooms
2019-11-18 18:31:39 +01:00
Bruno Windels
180fea8ace
only send decrypted events to Verifier in e2ee rooms
2019-11-18 18:30:43 +01:00
J. Ryan Stinnett
5f02c4b5ad
Namespace default secret storage key methods
2019-11-18 15:19:18 +00:00
David Baker
440274d639
Fix local trust for key backups
...
https://github.com/matrix-org/matrix-js-sdk/pull/832 added
cross-signing checks for backup trust but we failed to merge in the
check for the the backup being trusted locally.
Fixes https://github.com/vector-im/riot-web/issues/11404
2019-11-18 13:30:00 +00:00
J. Ryan Stinnett
f93130a8a7
Add method to check whether cross-signing has keys
2019-11-18 12:32:39 +00:00
David Baker
f84ec090cb
backticks in jsdoc
...
Co-Authored-By: J. Ryan Stinnett <jryans@gmail.com >
2019-11-15 14:38:27 +00:00
David Baker
545ebf81bf
Move Crypto.prototype.init back to its rightful place
2019-11-15 12:29:03 +00:00
David Baker
6f42824c35
Typo
...
Co-Authored-By: J. Ryan Stinnett <jryans@gmail.com >
2019-11-15 12:26:24 +00:00