matrix-doc/proposals/1719-olm_unwedging.md

2.8 KiB

Olm unwedging

Olm sessions sometimes get out of sync, resulting in undecryptable messages. This can happen for several reasons. For example, if a user restores their client state from a backup, the client will be using an old ratchet state (riot-web#3822). Or a client might expire a one-time key that another client is trying to use (riot-web#3309). This proposal documents a method for devices to create a new session to replace the broken session.

Proposal

When a device receives an olm-encrypted message that it cannot decrypt, it should assume that the olm session has become corrupted and create a new olm session to replace it. It should then send a dummy message, using that session, to the other party in order to inform them of the new session. To send a dummy message, clients may send an event with type m.dummy, and with empty contents.

In order to avoid creating too many extra sessions, a client should rate-limit the number of new sessions it creates per device that it receives a message from; the client should not create a new session with another device if it has already created one for that given device in the past 1 hour.

Clients may wish to take steps to mitigate the loss of the undecryptable messages. For example, megolm sessions that were sent using the old session would have been lost, so the client can send m.room_key_request messages to re-request any megolm sessions that it is unable to decrypt.

The spec currently says, "If a client has multiple sessions established with another device, it should use the session from which it last received a message." (the last paragraph of the m.olm.v1.curve25519-aes-sha2 section). When comparing the time of the last received message for each session, the client should only consider messages that were successfully decrypted, and for sessions that have never received a message, it should use the creation time of the session. The spec will be changed to read:

If a client has multiple sessions established with another device, it should use the session from which it last received and successfully decrypted a message. For these purposes, a session that has not received any messages should use its creation time as the time that it last received a message.

Tradeoffs

Potential issues

Security considerations

An attacker could use this to create a new session on a device that they are able to read. However, this would require the attacker to have compromised the device's keys.

Conclusion

This proposal outlines how wedged olm sessions can be replaced by a new session.