Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Clarify that arbitrary unicode is allowed in user/room IDs and room aliases #1506

Open
wants to merge 5 commits into
base: main
Choose a base branch
from

Conversation

tulir
Copy link
Member

@tulir tulir commented May 1, 2023

Nobody cares enough to implement matrix-org/matrix-spec-proposals#2828 or other spec changes that would disallow arbitrary unicode in the three identifiers, so here's a spec clarification to document how Matrix currently works.

Preview: https://pr1506--matrix-spec-previews.netlify.app

@tulir tulir requested a review from a team as a code owner May 1, 2023 10:23
Copy link
Member

@anoadragon453 anoadragon453 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This appears like the right thing to do to me, but I'd like a second opinion.

@richvdh
Copy link
Member

richvdh commented May 16, 2023

For the record: whilst I would love to see MSC2828 implemented, we can't actually do that without a room version bump, so, regardless of what happens with MSC2828, we have to document the status quo as it is :(.

Comment on lines 601 to 606
##### User IDs over federation

Due to a lack of validation in original Matrix homeserver implementations,
the localpart of user IDs over federation may contain any valid unicode
codepoints except `:`. A future spec change may create a new room version
to disallow such user IDs.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  1. aaaaaaaargh everything is awful
  2. I can't see any difference between this and "Historical user IDs". They are both "IDs you're not supposed to create but might have to deal with because apparently validation is hard"

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  1. do they even have to be valid unicode codepoints?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

aaaaaaaargh everything is awful

👍

I can't see any difference between this and "Historical user IDs". They are both "IDs you're not supposed to create but might have to deal with because apparently validation is hard"

The only difference is that there are real users who have created historical user IDs on normal clients and servers. Arbitrary unicode ids exist in the wild too, but it has never been possible to create them without modifying the server.

do they even have to be valid unicode codepoints?

I think server implementations try to decode utf-8 sufficiently early so that invalid unicode user IDs explode before being persisted anywhere, but I'm not completely sure.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The only difference is that there are real users who have created historical user IDs on normal clients and servers. Arbitrary unicode ids exist in the wild too, but it has never been possible to create them without modifying the server.

I don't see this as a significant difference for someone implementing a server (or a client). The fact is that they are both cr@p that you have to deal with.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think server implementations try to decode utf-8 sufficiently early so that invalid unicode user IDs explode before being persisted anywhere, but I'm not completely sure.

ok, that seems fair. Let's assume they do have to be UTF-8 until someone proves otherwise :)

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

(though, per #365 (comment): "valid UTF-8" is open to definition too...)

Comment on lines +669 to +673
The localpart of a room alias may contain any valid unicode codepoints
except `:`.

Room aliases MUST NOT exceed 255 bytes as UTF-8 (including the `#` sigil
and the domain).
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

similar questions: do they really have to be valid UTF-8? It probably depends on where they are used, I suppose...

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we should assume yes until proven otherwise, when we can update the spec again.

@turt2live
Copy link
Member

@richvdh I've updated this with permission from tulir - please take another look.

@turt2live turt2live requested a review from richvdh August 9, 2023 18:13
content/appendices.md Outdated Show resolved Hide resolved
content/appendices.md Outdated Show resolved Hide resolved
content/appendices.md Show resolved Hide resolved
content/appendices.md Show resolved Hide resolved
content/appendices.md Outdated Show resolved Hide resolved
content/appendices.md Outdated Show resolved Hide resolved
@@ -0,0 +1 @@
Clarify that arbitrary unicode is allowed in user/room IDs and room aliases.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Strongly disagree on this.

The original vintage 2014 Synapse implementation only allowed non URL quotable characters in user localparts when registering for an account. Unfortunately, federation did not apply the same check, alluded to by other comments here:

Arbitrary unicode ids exist in the wild too, but it has never been possible to create them without modifying the server.

If you are playing silly games (removing validation checks on your server) we should NOT set the precedent that we are just going to accept your games imo, otherwise where do you draw the line? Some comments in this proposal mention about excluding the null byte, but why? Sure, postgres cannot represent it when used with TEXT columns, but hey I am using a modified Synapse which doesn't have this problem, so why are we allowing some silly games but not others?

The result is an inconsistent mess, and it was never designed to be that way. This isn't like other cases where "hey this is what synapse does, in the spec it goes" because in order to get the failure mode of unicode characters you need a malicious and/or buggy actor.

The consequences of making this the rule in the specification, and hence removing these checks in Dendrite, Conduit, et al is an increased risk of homograph attacks. I cannot and will not support increasing the attack surface of Matrix just because a few people back in 2014 removed validation and sent unicode user IDs into a room, which synapse accepted.

It is worth emphasising that room versions ARE NOT a get-out-of-jail-free card here, as user IDs are outside the scope of rooms. For example, the sliding sync proxy recently had an issue with unicode user IDs in device list changes. It's not hard to see how this can also be an issue with the user directory and to-device msgs, both of which sit outside of rooms.

Counter proposal: sorry folks with smiley poos as user localparts, you're going to be broken in the next release of Synapse, and we remove / subsequently ignore events with malformed user IDs aka what we should have done in 2014.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

While I agree that this only really happens because of people modifying their servers, the result of enforcing those checks in one implementation and not in another can end up being outright disastrous for innocent users.

For example, if Dendrite enforces these checks but Synapse doesn't, then all it takes is for a Synapse user with an emoji localpart to make a power level change or perform any kind of power action to break the room for Dendrite users probably irreversibly.

Hell, they might not even have to perform a power action, because we might drop auth events (such as the user joining to begin with) or refuse to pull in prev events (from normal timeline events), which in turn causes us to run state resolution with a different set of input events (which can result in a different output state set or a complete state reset) or to accidentally propagate broken state to other servers when they ask us for /state_ids or /state.

This situation 100% sucks but Matrix only functions if implementations agree to handle these things in the same way, otherwise different implementations will never arrive at a consistent state. We already see this happen due to other corner cases and it just ends up feeling terrible for all users involved.

As for room versions, it is true that it's not a great solution to the problem due to the fact that it still leaks into device updates or other areas, but at least it's possible in a future room version to make sure that users with invalid localparts can't join the rooms to begin with. That is a huge step towards stamping out invalid localparts.

Servers SHOULD NOT produce user IDs with localparts outside of the following
character set, and SHOULD NOT forward such user IDs to clients when referenced
outside the context of an event. For example, device list updates from "invalid"
user IDs would be dropped by the receiving server.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is worse than just removing events by these users, as things will only half work (E2EE will entirely break for them in weird and wonderful ways).

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If you set your localpart to a smiley poo, E2EE will break for you. That's fine by me. What I care about is you not being able to DoS a room by setting your localpart to a smiley poo, which is why we have to accept events over federation whose senders are invalid; we don't have to do much else to help such users.

@richvdh
Copy link
Member

richvdh commented Feb 27, 2024

@tulir, @turt2live: would one of you be able to address the questions in my review #1506 (review)?

@turt2live
Copy link
Member

[...], @turt2live: would one of you be able to address the questions in my review #1506 (review)?

Which questions? The link hits a generic review. If there's outstanding comments needed, please ping inline on the threads.

@richvdh
Copy link
Member

richvdh commented Mar 4, 2024

Which questions? The link hits a generic review. If there's outstanding comments needed, please ping inline on the threads.

Looks like @tulir has updated the PR and addressed my questions since I wrote that. Thanks @tulir!

@richvdh richvdh self-requested a review March 4, 2024 11:54
Comment on lines +618 to +621
Servers SHOULD NOT produce user IDs with localparts outside of the following
character set, and SHOULD NOT forward such user IDs to clients when referenced
outside the context of an event. For example, device list updates from "invalid"
user IDs would be dropped by the receiving server.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How about this:

Suggested change
Servers SHOULD NOT produce user IDs with localparts outside of the following
character set, and SHOULD NOT forward such user IDs to clients when referenced
outside the context of an event. For example, device list updates from "invalid"
user IDs would be dropped by the receiving server.
User IDs with localparts containing characters outside the range U+0021 to U+007E, or with
an empty localpart, are considered non-compliant. For current room versions, servers must
still accept events using such user IDs over federation; however they SHOULD NOT forward
such user IDs to clients when referenced outside the context of an event. For example,
device list updates from non-compliant user IDs would be dropped by the receiving server.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants