# Key verification mechanisms Key verification is an essential part of ensuring that end-to-end encrypted messages are secure. Matrix may support multiple verification methods that require sending events; in fact, two such methods (such as [MSC 1267](https://github.com/matrix-org/matrix-doc/issues/1267) and [MSC 1543](https://github.com/matrix-org/matrix-doc/issues/1543)) have already been proposed. This proposal tries to present a common framework for verification methods to use, and presents a way to request key verification. ## Proposal Each key verification method is identified by a name. Verification method names defined in the Matrix spec will begin with `m.`, and verification method names that are not defined in the Matrix spec must be namespaced following the Java package naming convention. If Alice wants to verify keys with Bob, Alice's device may send `to_device` events to Bob's devices with the `type` set to `m.key.verification.request`, as described below. The `m.key.verification.request` messages should all have the same `transaction_id`, and are considered to be a single request. Thus, for example, if Bob rejects the request on one device, then the entire request should be considered as rejected across all of his devices. Similarly, if Bob accepts the request on one device, that device is now in charge of completing the key verification, and Bob's other devices no longer need to be involved. The `m.key.verification.request` event lists the verification methods that Alice's device supports, and upon receipt of this message, Bob's client should prompt him to verify keys with Alice using one of the applicable methods. In order to avoid displaying stale key verification prompts, if Bob does not interact with the prompt, it should be automatically hidden 10 minutes after the message is sent (according to the `timestamp` field), or 2 minutes after the client receives the message, whichever comes first. The prompt should also be hidden if an appropriate `m.key.verification.cancel` message is received. If Bob chooses to reject the key verification request, Bob's client should send a `m.key.verification.cancel` message to Alice's device. This indicates to Alice that Bob does not wish to verify keys with her. In this case, Alice's device should send an `m.key.verification.cancel` message to all of Bob's devices to notify them that the request has been rejected. If one of Bob's clients does not understand any of the methods offered, it should display a message to Bob saying so. However, it should not send a `m.key.verification.cancel` message to Alice's device unless Bob chooses to reject the verification request, as Bob may have another device that is capable of verifying using one of the given methods. To initiate a key verification process, Bob's device sends a `to_device` event to one of Alice's devices with the `type` set to `m.key.verification.start`. This may either be done in response to an `m.key.verification.request` message, or can be done independently. If it is done in response to an `m.key.verification.request` messsage, it should use the same `transaction_id` as the `m.key.verification.request` message. If Alice's device receives an `m.key.verification.start` message in response to an `m.key.verification.request` message, it should send an `m.key.verification.cancel` message to Bob's other devices that it had originally sent an `m.key.verification.request` to, in order to cancel the key verification request. Verification methods can define other events required to complete the verification. Event types for verification methods defined in the Matrix spec should be in the `m.key.verification` namespace. Event types that are not defined in the Matrix spec must be namespaced following the Java package naming convention. Alice's or Bob's devices can cancel a key verification process or a key verification request by sending a `to_device` event with `type` set to `m.key.verification.cancel`. ### Event Definitions #### `m.key.verification.request` Requests a key verification. Properties: - `from_device` (string): Required. The device ID of the device requesting verification. - `transaction_id` (string): Required. An identifier for the verification request. Must be unique with respect to the pair of devices. - `methods` ([string]): Required. The verification methods supported by the sender. - `timestamp` (integer): Required. The time when the request was made. If the timestamp is in the future (by more than 5 minutes, to allow for clock skew), or more than 10 minutes in the past, then the message must be ignored. #### `m.key.verification.start` Begins a key verification process. Properties: - `method` (string): Required. The verification method to use. - `from_device` (string): Required. The device ID of the device starting the verification process. - `transaction_id` (string): Required. An identifier for the verification process. If this message is sent in reponse to an `m.key.verification.request` event, then it must use the same `transaction_id` as the one given in the `m.key.verification.request`. - `next_method` (string): Optional. If the selected verification method only verifies one user's key, then this property can be used to indicate the method to use to verify the other user's key, which will be started immediately after after the current key verification is complete. Key verification methods can define additional properties to be included. #### `m.key.verification.cancel` Cancels a key verification process or a key verification request. Upon receiving an `m.key.verification.cancel` message, the receiving device must cancel the verification or the request. If it is a verification process that is cancelled, or a verification request initiated by the recipient of the cancellation message, the device should inform the user of the reason. Properties: - `transaction_id` (string): the identifier for the request or key verification to cancel. - `code` (string): machine-readable reason for cancelling. Possible reasons are: - `m.user`: the user cancelled the verification. - `m.timeout`: the verification process has timed out. Different verification methods may define their own timeouts. - `m.unknown_transaction`: the device does not know about the given transaction ID. - `m.unknown_method`: the device does not know how to handle the given method. This can be sent in response to an `m.key.verification.start` message, or can be sent in response to other verification method-specific messages. - `m.unexpected_message`: the device received an unexpected message. For example, a message for a verification method may have been received when it was not expected. - `m.key_mismatch`: the key was not verified. - `m.user_mismatch`: the expected user did not match the user verified. - `m.invalid_message`: an invalid message was received. - `m.accepted`: when an `m.key.verification.request` is accepted by one device, an `m.key.verification.cancel` message with `code` set to `m.accepted` is sent to the other devices - `reason` (string): human-readable reason for cancelling. This should only be used if the recieving client does not understand the code given in the `code` property. Verification methods may define their own additional cancellation codes. Cancellation codes defined in the Matrix spec will begin with `m.`; other cancellation codes must be namespaced following the Java package naming convention. ## Tradeoffs Rather than broadcasting verification requests to Bob's devices, Alice could simply send an `m.key.verification.start` request to a single device. However, this would require Alice to choose the right device to send to, which may be hard for Alice to do if, for example, Bob has many devices, or if his devices have similar names. ## Security considerations An attacker could try to spam a user with verification requests. Clients should take care that such requests do not interfere with a user's use of the client. ## Conclusion This proposal presents common event definitions for use by key verification methods and defines a way for users to request key verification.