-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Suggestion/discussion: E2E practicability in social rooms / missing "Enable URL previews by default" for E2E rooms setting and its impact #288
Comments
I just got some additional input for this from another user: it made me realize that essentially, |
Fwiw, I made some protocol change suggestions to help with this: #288 specifically to move the link preview generation from the home server to the sender client (such that receiver clients cannot be tricked into contacting rogue IP collecting servers), either only for E2E rooms or in general. I figured I'd just note this here since it seems like the matrix-central issue will remain closed in favor of this one, just so that this suggestion doesn't get lost. I think with this suggestion it might be possible to not only allow E2E rooms to opt-in to making link preview enabled by default for everyone who joins, but to actually make it the default as with all other rooms for more consistency. (But that's just my opinion of course, further input and discussion would be very appreciated.) Ideally, other clients would be convinced to pick up whatever solution is found here to get somewhere somewhat consistent, making this less of an element-specific thing in the longer run. |
I think you meant to link #1139 as the suggestion regarding moving URL preview to sender-side rather than relinking to this same issue. Notably this is how Signal generates URL previews too. |
The issue with url preview generation at sending client is it aids phishing. |
It does, but so does in general the ability to send URLs. If your URL is malicious to start with you can make it present any sort of preview you want in any case. If it's trustworthy then I'm not sure what presenting it with a misleading preview would achieve. (Tricking people to click a mostly harmless site?) So it seems like a smaller concern in comparison in my eyes, but I can see how you would find that debatable. |
|
Is anything being done about this still? |
There are quite a few disparate issues on this topic. Is there one master issue? Any chance this will be worked on? Many of us really want url preview in e2ee rooms notwithstanding the security impact but there does not appear to be any way to configure that currently. |
I'm wary of allowing Matrix homeservers to access URLs in e2ee rooms. If our ambition is to encourage the widespread/distributed use of Matrix, some homeservers will be in unfriendly jurisdictions. Scenario where homeservers being able to view URLs can cause trouble:
I think ell1e's suggestion to generate URL previews on the sender client's side is best, at least for e2ee rooms. When the sender sends a URL, they've most likely already viewed the URL to get an idea of what they're sending. So they've already exposed their IP to the website. Or, if the sender's using a VPN or Tor, the website will have neither the sender's nor the receiver's URL, unless the receiver clicks the link. URL preview generation can aid phishing, but this can be mitigated. Also,if the sender controls the malicious website, they can already make the preview appear however they want, regardless of what Element does. Reasonable compromise to respect privacy and mitigate phishing:
This way, receivers are never forced to preview URLs, and the Matrix server never sees URLs in e2ee rooms. Potential workflow to mitigate phishing from strangers who DM you randomly:
This way, you can view the stranger's text messages to satisfy your curiosity, while also not being misled by potentially modified URL previews until you consciously turn them on. Optionally: If you initiate the DM, then the warning message is not shown, and URL-previews are enabled by default, since you knew the risks going in. Alternatively, another compromise is to handle URL-previews the way Signal current handles them: My understanding is that, when Signal generates the URL preview for the 1st link, it can see https://signal.org, but not the full URL https://signal.org/blog/giphy-experiment/. This is still a privacy issue for websites where even accessing the website itself can generate suspicion (https://www.plannedparenthood.org/ or https://www.pornhub.com/) |
Sorry that I am proposing this in such an essay, but I am expecting this to be somewhat controversial but it is somewhat important to me:
Currently, I feel like there is a somewhat notable incentive to never enable E2E for any social non-super-private rooms if non-techies are in it. That makes me sad, I want encryption to be everywhere where it is practical, and it feels like here it could also be with minor changes.
The reason social hangouts clash with E2E is that the link preview will automatically be broken with
"Enable URL previews by default for participants in this room"
unavailable/forced off. And I get that it'd default to Off, but it being entirely unchangeable for room admins poses a problem: some rooms are just fun social hang outs, and if regular users (like, imagine WhatsApp crowd coming over, and shouldn't that be great?) need to poke in the settings for such a basic feature, some users will likely just move on. And you can blame or not blame them for that, but the result is that it makes an E2E setup way less practical for more casual non-techie social rooms.And here I get you could argue why even enable E2E then? Also, wouldn't letting room admins mess with this default risk security-conscious people unintentionally exposing themselves to a spying homeserver? Obviously it's a trade-off, but maybe think of it like this: it's still more secure to have an E2E room where link previews are enabled for regular unaware users by default (which they can still opt-out of!) than to have an unencrypted room entirely. And if gif previews are always, unchangeably opt-in even for fun social rooms, the truth is just many of these places won't enable E2E which is a total loss of security in numbers. It turns enabling E2E for a room admin from a no-brainer (outside of corner cases like bridges) to a difficult decision in some cases.
I am therefore proposing the following combined changes for discussion to balance this difficult situation:
Enable URL previews by default for participants in this room
for room admins of encrypted rooms, but default it to offOverride URL preview in encrypted rooms to off, no matter the room's default
that defaults to offAnd yes, I realize more settings is bad, and some people will miss both the per-channel opt-out and the new global opt-out and have links leaked when they thought they wouldn't be. I do realize many security hardliners will not like this. But I hope that you find it worth at least debating, in a possible future where hopefully E2E can reach everyone and their families, and security-conscious people can still find themselves at least somewhat sufficiently empowered to deviate and override to the defaults they want if they don't like how things are set by default. And I agree this isn't ideal, but neither does the current situation seem to be.
I am looking forward to your input!
The text was updated successfully, but these errors were encountered: