-
Notifications
You must be signed in to change notification settings - Fork 401
MSC4291: Room IDs as hashes of the create event #4291
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
+175
−0
Merged
Changes from all commits
Commits
Show all changes
8 commits
Select commit
Hold shift + click to select a range
c4ec556
msc4291 placeholder
ara4n 81cfe19
Add MSC4291: Room IDs as hashes of the create event
kegsay b2f4c9c
Fix image src
tulir 4abea87
Review comments
kegsay 0a7e97f
Add prose on blocking alternative
kegsay 60a3b7d
Add MSC4311 note
kegsay cafeaa6
Update proposals/4291-room-ids-as-hashes.md
ara4n c0dd8d2
11th hour review
turt2live File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,175 @@ | ||
## MSC4291: Room IDs as hashes of the create event | ||
|
||
kegsay marked this conversation as resolved.
Show resolved
Hide resolved
|
||
Currently rooms are identified by a room ID [made from a random string](https://spec.matrix.org/v1.14/appendices/#room-ids) | ||
selected by the creating server, namespaced to the origin server. This allows a malicious server to | ||
create a room whose ID collides with an existing ID, causing security issues if the rooms are confused | ||
together. Furthermore, despite the specification stating that room IDs are opaque identifiers, both clients | ||
and servers in the wild introspect the room ID for routing or moderation purposes. This is fundamentally | ||
_unsafe_ as there are no guarantees the room ID is accurate without some verified events in the room. | ||
By removing the domain from the room ID we ensure real world clients and servers cannot be manipulated | ||
by an attacker who may claim domains they do not control. | ||
|
||
This supplants [MSC4051](https://github.com/matrix-org/matrix-spec-proposals/pull/4051) with more information. | ||
|
||
### Proposal | ||
|
||
We redescribe the room ID to be the event ID of the room's `m.room.create` | ||
event with the room ID sigil `!` instead of the event ID sigil `$`. For example, if a create event ID is | ||
`$31hneApxJ_1o-63DmFrpeqnkFfWppnzWso1JvH3ogLM`, the room ID is | ||
`!31hneApxJ_1o-63DmFrpeqnkFfWppnzWso1JvH3ogLM`. | ||
*This effectively restricts the room ID grammar to be `!` + 43x unpadded urlsafe base64 characters.* | ||
turt2live marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
This binds a given room to a specific single `m.room.create` event, eliminating the risk of confusion. | ||
This can be seen as an extension of [MSC1659](https://github.com/matrix-org/matrix-spec-proposals/blob/main/proposals/1659-event-id-as-hashes.md), | ||
which replaced confusable `event_id`s with a hash of the event. | ||
|
||
The `room_id` field is removed entirely from the `m.room.create` event, but is reintroduced on | ||
kegsay marked this conversation as resolved.
Show resolved
Hide resolved
|
||
non-federation APIs, exactly like how the `event_id` is missing over federation but reintroduced on the | ||
other APIs. As the `room_id` is the create event ID, and all `auth_events` cite an `m.room.create` | ||
event, the `auth_events` no longer specify the create event ID. This will slightly reduce | ||
all event payload sizes. | ||
|
||
The following changes on a new room version are made: | ||
- Concerning the create event: | ||
Step 1 of the [Checks performed on receipt of a PDU](https://spec.matrix.org/v1.14/server-server-api/#checks-performed-on-receipt-of-a-pdu) | ||
is modified to remove the `room_id` as a universal example of: | ||
> Is a valid event, otherwise it is dropped. For an event to be valid, it must ~~contain a room_id, and it must~~ comply with the event format of that room version. | ||
- Concerning the [event format](https://spec.matrix.org/v1.14/rooms/v11/#event-format-1): | ||
* The "Description" field for `auth_events` is adjusted to state: | ||
> Required: Event IDs for the authorization events that would allow this event to be in the room. | ||
> | ||
> Must contain less than or equal to 10 events. Note that if the relevant auth event selection rules are used, | ||
> this restriction should never be encountered. | ||
> **NEW: MUST NOT contain the create event ID. This is already implied by the `room_id` field.** | ||
* The "Description" field for `room_id` is adjusted to state: | ||
> Required: Room identifier. Omitted on `m.room.create` events. | ||
- Concerning [auth rules](https://spec.matrix.org/v1.14/rooms/v11/#authorization-rules): | ||
* Change auth rule 1.2 (“If the domain of the `room_id` does not match the domain of the sender, reject.”) | ||
to be (“If the create event has a `room_id`, reject”) given we no longer have a `room_id` on create events. | ||
* Remove auth rule 2.4 (“If there is no `m.room.create` event among the entries, reject.”) given the create event is now implied by the `room_id`. | ||
* Add auth rule 2.5: "If there are entries whose `room_id` does not match the `room_id` of the event itself, reject." | ||
This overlaps with [MSC4307](https://github.com/matrix-org/matrix-spec-proposals/pull/4307). | ||
* Add auth rule 2 (inserted before the current rule 2): "If the event's `room_id` is not an event ID | ||
for an accepted (not rejected) `m.room.create` event, with the sigil `$` replaced with sigil `!`, reject." | ||
|
||
This creates a chicken/egg problem when upgrading rooms because: | ||
- The `m.room.tombstone` event needs a `content.replacement_room`. | ||
- The `content.replacement_room` ID is now the create event of the new room. | ||
- The create event of the new room needs the tombstone event ID in `content.predecessor.event_id`. | ||
- While the spec [does not require](https://spec.matrix.org/v1.15/client-server-api/#server-behaviour-19) | ||
the predecessor event to be the tombstone, there may be more than one "last event" if the DAG | ||
has forward extremities. Prior to sending the tombstone event, servers could heal the DAG using | ||
a dummy event, though this is far from elegant when the tombstone event performs this function. | ||
- The `m.room.tombstone` event needs ... | ||
|
||
<img width="793" alt="Creator chicken egg problem" src="images/4291-creator-chicken-egg.png" /> | ||
|
||
To break this cycle, this MSC deprecates the `content.predecessor.event_id` field from the `m.room.create` event. Clients | ||
MUST NOT expect the field to be set, but SHOULD continue to use it if set. There appear to be no security | ||
reasons why this field exists. This field is sometimes used in clients to jump back to the correct part in the old room's timeline when the tombstone | ||
occurred, which can be relevant when there are lots of leave events after the tombstone. Clients that wish to preserve this behaviour may instead | ||
search the old room state for the `m.room.tombstone` event and then jump to that. | ||
|
||
### Potential Issues | ||
turt2live marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
It is not immediately obvious which server created the room in the first place. See the "Alternatives" section | ||
for a discussion on the pros/cons of this. | ||
|
||
The loss of `content.predecessor.event_id` may negatively impact the way clients stitch together timelines in upgraded rooms. | ||
turt2live marked this conversation as resolved.
Show resolved
Hide resolved
|
||
In particular, some clients may crash if the field is missing (possibly Element iOS?). | ||
|
||
This proposal relies on the server being able to verify the create event in the room. This generally | ||
means the server must be joined to the room. In particular, invites/knocks are not protected against | ||
room confusion by this proposal alone. The security guarantees of this proposal are enhanced with | ||
[MSC4311: Ensuring the create event is available on invites and knocks](https://github.com/matrix-org/matrix-spec-proposals/pull/4311). | ||
|
||
Clients which were previously parsing the room ID to identify a server for `via` or similar puporposes | ||
are not able to do so. For `m.space.child` and similar cases, the user's own server may be used to | ||
populate `via` on the event, at least initially. For permalinks, `via` candidates are now more important | ||
when creating links (or the use of aliases). Clients can get their own server name by parsing the | ||
user ID they are operating under. | ||
|
||
### Alternatives | ||
kegsay marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
#### Keeping the domain suffix | ||
|
||
We could keep the colon+server suffix as it contains useful information about the creator's server, | ||
and has historically been used as routing information / auth checks in several places: | ||
- event auth for `m.federate` [in Synapse](https://github.com/element-hq/synapse/blob/9d43bec/synapse/event_auth.py#L312), though the specification [states]((https://spec.matrix.org/v1.15/rooms/v11/#authorization-rules)) this should be applied to the `sender` instead - Step 3. | ||
- It’s used as a last resort `?via=` candidate [in Synapse](https://github.com/element-hq/synapse/blob/v1.133.0/synapse/handlers/room_member.py#L1177). | ||
- It's used as a last resort `?via=` candidate in [Rory&::LibMatrix](https://cgit.rory.gay/matrix/LibMatrix.git/tree/LibMatrix/RoomTypes/GenericRoom.cs?h=0a82b7e2acc18def93818d8e405bf620c328975e#n223), NeoChat and others. | ||
turt2live marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
It is also desirable to know the creator's server name without having to join and get the full create event | ||
for Trust & Safety purposes. The create event in invites can be spoofed, as can the room ID, but spoofing the | ||
room ID makes the invite unusable whereas spoofing the create event does not. We could rely on the `sender` | ||
instead, but for this to be effective it would be important for servers to use the `sender` domain for routing | ||
purposes, such that if the `sender` was invalid it would cause the invite to be unusable. On the contrary, users | ||
unfamiliar with Matrix may see a room ID like `!OGEhHVWSdvArJzumhm:matrix.org` and think that `matrix.org` hosts/moderates/ | ||
is somehow responsible for the room in some way. By dropping the domain, we clearly express that the creator domain | ||
may not be responsible for the contents of the room. | ||
Comment on lines
+102
to
+109
This comment was marked as resolved.
Sorry, something went wrong. |
||
|
||
However, by adding the colon+server suffix we would allow malicious servers to create room IDs with _earlier room versions_ | ||
which have the same ID as the new proposed format. For example, a malicious server who knows of an existing | ||
vNext room `!31hneApxJ_1o-63DmFrpeqnkFfWppnzWso1JvH3ogLM:example.com` could create a v11 room with the exact | ||
same ID, causing confusion. We therefore need to create a new namespace for vNext room IDs which cannot conflict | ||
with earlier room versions. This is why the colon+server suffix has been removed. We could alternatively encode the | ||
room version along with the domain to form a new namespace e.g `!localpart:domain@version` where `@` has never been | ||
allowed in the set of `domain` characters, but there isn't a strong enough reason to encode such information in | ||
every event. By doing this, we would allow implementation confusion by specifying the wrong creator domain and/or | ||
wrong room version in the ID, which is important when the room ID is read in isolation without the matching create | ||
event (e.g invite handling, moderation tooling). | ||
|
||
#### Removing `room_id` entirely from all events | ||
|
||
We could remove `room_id` field from all events, and propagate it via `auth_events` instead. This | ||
would make it harder for servers to immediately know which room an event is in as there would be | ||
multiple potentially unknown event IDs as candidates. It’s less awkward to simply keep it in the | ||
`room_id` field and instead remove the create event from `auth_events`. | ||
|
||
We could rename `room_id` to `create_event_id` and require servers to universally populate `room_id` for every event | ||
(and drop `create_event_id`) for all events delivered to clients. This better encodes the fact that the | ||
room ID _is_ the create event ID, but it's not clear this provides any advantages beyond that, whilst incurring | ||
fixed costs to rename fields to clients, as well as update existing codebases to look in a different key, | ||
and update the specification to conditionally say "room ID" or "create event ID" depending on the room version. | ||
It's likely not worth the effort, despite it being a clearer key name. | ||
|
||
#### Using an ephemeral public key as identifier instead of the create event ID | ||
|
||
We could generate an ephemeral keypair, sign the create event with the private key and use the public | ||
key as the room ID. [MSC1228](https://github.com/matrix-org/matrix-spec-proposals/pull/1228) proposed this. | ||
The problem with this approach is that we cannot guarantee that servers will actually treat the keypair | ||
as ephemeral: they could reuse the same keypair to create a spoofed room. | ||
|
||
#### Blocking servers which eclipse their own rooms | ||
|
||
We could make honest servers block other servers when they detect that the other server has reused a | ||
room ID. However, this is a reactive approach compared to the proactive approach this proposal takes. | ||
By relying on servers to "detect" when a room ID is reused, malicious servers can selectively disclose | ||
the duplicate room to target servers. This would allow the malicious server to force servers with | ||
admins in the room to no longer participate in the room, effectively removing the ability to moderate | ||
the room. | ||
|
||
### Security Considerations | ||
|
||
This fixes a class of issues caused by confusable room IDs. Servers can currently perform a form of | ||
eclipse attack when other servers join via them by presenting a completely different room to some | ||
servers. This isolates the target server, controlling information that the target server sees. By | ||
linking together the room ID (which is user-supplied e.g via `matrix:` URIs) we can guarantee that | ||
all servers agree on the same create event, and thus the subsequent hash DAG that forms. | ||
|
||
Servers may accidentally create the same room if a client creates >1 room in a single millisecond. | ||
This happens because the entropy in the create event is quite small, primarily relying on the | ||
`origin_server_ts`. Server authors concerned about this MAY add in sufficient entropy as a custom | ||
key in the `content` of the create event. As of v11, the redaction algorithm preserves the entire | ||
`content` so such extra keys become part of the event ID and thus the room ID. Servers may also | ||
prefer to apply strong rate limits to prevent this scenario. | ||
|
||
The removal of enforced server domain namespaces means event IDs truly are _global_. This means we | ||
rely on the security of the hash function to avoid collisions (which we've always relied on _within_ a | ||
room). This has always been implied due to the federation endpoint `/event/{eventID}`, but this change | ||
makes the data model rely on global uniqueness. See [MSC2848](https://github.com/matrix-org/matrix-spec-proposals/pull/2848) | ||
for more discussion. | ||
|
||
### Dependencies | ||
kegsay marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
This MSC has no dependencies. |
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Implementation requirements:
Some clients to test/verify (incomplete list):
Uh oh!
There was an error while loading. Please reload this page.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Draupnir will crash, and please do not assume that ticking off the matrix-bot-sdk will cover us in future. We have our own infrastructure for parsing matrix events and matrix identifiers.
room_id
is removed from the top level of events. Not sure whether that specifically is illegal or not. We have a tolerant strategy for handling other fields that don't match the schema (including all content), but this isn't the case forroom_id
andevent_id
.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fractal doesn't crash with the changes in this MSC.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
matrix.to appears to overly validate the room ID:

There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Resolved in Rory&::LibMatrix as of https://cgit.rory.gay/matrix/LibMatrix.git/commit/?id=c39d18efd0e6a610d2dc29832407e99e0079bc13