You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It maybe reasonable to check that these timestamps are not in the future.
As an example (developer error), the creation_time of the pickle could be set in millis. That would mean that if some unwedging occurs this session will ~always be seen is the most recent session and will be wrongly used.
The text was updated successfully, but these errors were encountered:
It maybe reasonable to check that these timestamps are not in the future.
Not sure, time is a complicated topic. What about desync'd clocks (be it the server that sent the event, or the receiver's device)? One could say "well, we'll accept events that are up to N minutes off << now >>", but then we enter the realm of heuristics...
I think the proposal is just defensive code to guard against the obvious footgun of setting them to milliseconds rather than seconds. We could say: if it's more than 10000 years in the future, it's probably wrong...
(Of course, if the fields had a sensible name, people would be less likely to set off the footgun in the first place.)
Currently when importing an olm session, the
last_use_time
andcreation_time
are blindly copied without checks:matrix-rust-sdk/crates/matrix-sdk-crypto/src/olm/session.rs
Lines 251 to 261 in 75fe874
It maybe reasonable to check that these timestamps are not in the future.
As an example (developer error), the
creation_time
of the pickle could be set in millis. That would mean that if some unwedging occurs this session will ~always be seen is the most recent session and will be wrongly used.The text was updated successfully, but these errors were encountered: