mirror of
https://github.com/chatmail/core.git
synced 2026-04-19 06:26:30 +03:00
feat: do not mark Bob as verified if auth token is old
This commit is contained in:
@@ -22,6 +22,7 @@ use crate::qr::check_qr;
|
||||
use crate::securejoin::bob::JoinerProgress;
|
||||
use crate::sync::Sync::*;
|
||||
use crate::token;
|
||||
use crate::tools::{create_id, time};
|
||||
|
||||
mod bob;
|
||||
mod qrinvite;
|
||||
@@ -86,10 +87,21 @@ pub async fn get_securejoin_qr(context: &Context, group: Option<ChatId>) -> Resu
|
||||
let sync_token = token::lookup(context, Namespace::InviteNumber, grpid)
|
||||
.await?
|
||||
.is_none();
|
||||
// invitenumber will be used to allow starting the handshake,
|
||||
// auth will be used to verify the fingerprint
|
||||
// Invite number is used to request the inviter key.
|
||||
let invitenumber = token::lookup_or_new(context, Namespace::InviteNumber, grpid).await?;
|
||||
let auth = token::lookup_or_new(context, Namespace::Auth, grpid).await?;
|
||||
|
||||
// Auth token is used to verify the key-contact
|
||||
// if the token is not old
|
||||
// and add the contact to the group
|
||||
// if there is an associated group ID.
|
||||
//
|
||||
// We always generate a new auth token
|
||||
// because auth tokens "expire"
|
||||
// and can only be used to join groups
|
||||
// without verification afterwards.
|
||||
let auth = create_id();
|
||||
token::save(context, Namespace::Auth, grpid, &auth, time()).await?;
|
||||
|
||||
let self_addr = context.get_primary_self_addr().await?;
|
||||
let self_name = context
|
||||
.get_config(Config::Displayname)
|
||||
@@ -377,7 +389,19 @@ pub(crate) async fn handle_securejoin_handshake(
|
||||
);
|
||||
return Ok(HandshakeMessage::Ignore);
|
||||
};
|
||||
let Some(grpid) = token::auth_foreign_key(context, auth).await? else {
|
||||
let Some((grpid, timestamp)) = context
|
||||
.sql
|
||||
.query_row_optional(
|
||||
"SELECT foreign_key, timestamp FROM tokens WHERE namespc=? AND token=?",
|
||||
(Namespace::Auth, auth),
|
||||
|row| {
|
||||
let foreign_key: String = row.get(0)?;
|
||||
let timestamp: i64 = row.get(1)?;
|
||||
Ok((foreign_key, timestamp))
|
||||
},
|
||||
)
|
||||
.await?
|
||||
else {
|
||||
warn!(
|
||||
context,
|
||||
"Ignoring {step} message because of invalid auth code."
|
||||
@@ -395,7 +419,11 @@ pub(crate) async fn handle_securejoin_handshake(
|
||||
}
|
||||
};
|
||||
|
||||
if !verify_sender_by_fingerprint(context, &fingerprint, contact_id).await? {
|
||||
let sender_contact = Contact::get_by_id(context, contact_id).await?;
|
||||
if sender_contact
|
||||
.fingerprint()
|
||||
.is_none_or(|fp| fp != fingerprint)
|
||||
{
|
||||
warn!(
|
||||
context,
|
||||
"Ignoring {step} message because of fingerprint mismatch."
|
||||
@@ -403,6 +431,11 @@ pub(crate) async fn handle_securejoin_handshake(
|
||||
return Ok(HandshakeMessage::Ignore);
|
||||
}
|
||||
info!(context, "Fingerprint verified via Auth code.",);
|
||||
|
||||
// Mark the contact as verified if auth code is 600 seconds old.
|
||||
if time() < timestamp + 600 {
|
||||
mark_contact_id_as_verified(context, contact_id, Some(ContactId::SELF)).await?;
|
||||
}
|
||||
contact_id.regossip_keys(context).await?;
|
||||
ContactId::scaleup_origin(context, &[contact_id], Origin::SecurejoinInvited).await?;
|
||||
// for setup-contact, make Alice's one-to-one chat with Bob visible
|
||||
|
||||
Reference in New Issue
Block a user