matrix-doc/proposals/4203-appservice-to-device.md

4.8 KiB

MSC4203: Sending to-device events to appservices

This MSC is a part of adding end-to-end encryption support to application services. It was split off from MSC2409. The parent MSC for encrypted appservices is MSC3202.

Proposal

A new key, to_device, is added to the request body of the appservice API /transactions endpoint. The key contains a list of all to-device events sent to users who are covered by the namespaces of the appservice. If there are no new to-device events, the key can be omitted.

In addition to the usual keys that are included in to-device events in the client-server /sync API, appservice to-device events include to_user_id and to_device_id fields to specify which user and device the event was sent to.

{
  "to_device": [
    {
      "to_user_id": "@appservice_12345:example.com",
      "to_device_id": "VPLQFIDCIT",
      "type": "m.room.encrypted",
      "sender": "@user:example.com",
      "content": {
        "algorithm": "m.olm.v1.curve25519-aes-sha2",
        "sender_key": "...",
        "ciphertext": {
          "...": {}
        }
      }
    }
  ],
  "events": [
    // ...
  ],
  "ephemeral": [
    // MSC2409...
  ]
}

Like MSC3202, this MSC does not have an opt-in/out flag, as there usually aren't any devices or to-device traffic if the appservice doesn't support encryption.

Implementation detail: when to delete a to-device message

Not defined by this MSC is an explicit algorithm for when to delete a to-device message (mark it as sent). This is left as an implementation detail, though a suggested approach is as follows:

  • If the message is sent to a user under an appservice's exclusive namespace mark it as sent and delete it. Note that retried transactions will still need to include the message.
  • If the message is sent to a user under an appservice's inclusive namespace, mark it as sent to the appservice but do not delete it until a /sync request is completed which includes the message. Note that retried transactions will still need to include the message.

This approach is largely to align with how namespaces are used by appservices in practice, but is not applicable to all scenarios (and thus is an implementation detail). The majority of known appservices use exclusive namespaces, which typically also means that those users will not be calling /sync. Because of this, the server may never get another opportunity to delete the messages until it has confirmed that the appservice received the transaction successfully. Inclusive namespaces are typically used when the appservice wants to impact a subset of users, but without controlling those users explicitly. Typically, inclusive users are also calling /sync and so the appservice should be CC'd on the to-device messages that would normally go down /sync.

For inclusive namespaces, servers may also track who created a device, and not wait for /sync if the device was created using appservice login or equivalent future methods like MSC4190.

Potential issues

If servers forget to delete to-device events, they may accumulate in the database and fill up the disk.

Alternatives

Appservices can use /sync (as they already do), but it's rather clunky to need a different way to receive to-device events than normal events.

Appservices can also be unencrypted, which mostly removes the need for to-device events.

Nested event data

Instead of mixing to_user_id and to_device_id in with the existing fields, the existing fields could be nested inside another object. However, unlike room events, custom fields are not allowed in the top level of to-device events. The federation format is already quite different than the client-server format: https://spec.matrix.org/unstable/server-server-api/#definition-mdirect_to_device. Existing server implementations ignore custom top-level fields over federation when converting to the client format.

Security considerations

Receiving to-device events does not have any inherent security implications. Appservices are already able to log in as users in their namespace and use /sync to receive to-device events, which means no additional privileges are granted. As always, care should be taken when specifying appservice namespaces.

Unstable prefix

Until this MSC is accepted, de.sorunome.msc2409.to_device should be used as the key in transactions requests instead of to_device. The key is different than the MSC number to preserve compatibility with the older version which was a part of MSC2409.