-
Notifications
You must be signed in to change notification settings - Fork 251
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Failed to deserialise key from key backup: missing field sender_claimed_keys #3211
Comments
This is related to element-hq/element-web#26774, in which we "solved" this problem by ignoring such backups. It has to be said that such backups are non-spec-compliant, and are presumably from old (or at least, non-spec-compliant) clients. It's not obvious to me that we should allow the problem to propagate by continuing to accept such non-compliant backups. (In other words: if we want to make |
I'm not sure I agree here. The failure mode is bad, and end users will not care that the reason they are unable to see year's old messages is because the key omitted a required field. If the field is useless, then we should absolutely make it optional in the spec. However, I don't think we should be waiting on a spec change to fix this, hence we would be "doing our own thing" until that lands, in the interests of letting people read their old messages. |
Well, we should do both. I'd be happy to see a fix for this merged provided there was an MSC proposing a change to the spec. If we just work aroundit in the rust-sdk (or ruma), then it means that the next person to implement a matrix client also has to violate the spec in the same way. And pretty soon you start wondering WTF the point of a spec is if everyone just has to ignore it. |
There's little point in arguing here, Ruma won't accept a PR without an MSC. |
This could be caused by famedly/matrix-dart-sdk#1739 E.g Fluffy chat will upload keys wihtout
|
Great find :D |
Fixed in famedly famedly/matrix-dart-sdk#1740 |
We can close the bug then (please do that yourself in that kind of situation), and reopen if anything is missing. |
The point here is less that famedly were doing the wrong thing, and more that we unnecessarily reject backups that are missing a property we don't even use. |
Sorry for the confusion here. The The
As such, I think this can be closed since we can't accept such backups, and the property can't be ignored during deseralization. |
During analysis of a rageshake log after an unable-to-decrypt error, I see an attempt to download a copy of the session key from backup:
The specification claims
sender_claimed_keys
is required but @poljar mentions:Given the failure mode is pretty bad (cannot decrypt a message), we should make that field optional.
The text was updated successfully, but these errors were encountered: