I guess, why are they doubling down and not just saying good catch? Like checking against the identity is pretty much DH 101. David Wong quite literally says “check validity of public keys or expect bugs”.
The fact Signal didn’t check them is also non ideal. But Matrix mentions this as a whattaboutism. What’s most grating in their reply is that they say it’s not an issue, note that Signal didn’t patch a similar bug until last week, and then AFTER defending not checking it, they decide to patch it (and not even fully ack the risk)
It’s worth saying that in our private correspondence with the reporter we agreed to add the check as a defence-in-depth and to remove any doubt of whether this constitutes a vulnerability. The check will be added in a future vodozemac release.
If Signal decides to patch a similar vulnerability (which risk has not yet been assessed), then is Matrix still handwaving if it as though it has no risk at all? Defense in depth is not a debate, it’s required for secure applications.
I.e., software engineers deploy redundancy for production systems - not because we expect to deploy bad systems, but it provides failover strategy if an unknown occurs. And after enough time, those unknown grow larger with more complexity.
Either Signal patched a real vulnerability (risk not yet determined), and this no check in Matrix is definitely a vulnerability of at least some correlation; or Signal had no vulnerability and their patch was just pre-emptive and Matrix was right all along.
Now I’m curious: was the lack of the DH identity check in Signal exploitable in the same way as Matrix is?
I once tried self hosting matrix, and I also concur it was a bit of a PITA. I wanted to utilize bridges, but honestly ditched it in favor of a direct IRC hosted service when needed. For my limited time, I prefer to host simpler things.
This is the one use case I don’t terribly mind Matrix. Assuming public discussion of FOSS,