-
-
Notifications
You must be signed in to change notification settings - Fork 2.1k
404 during UI authentication with matrix-synapse-shared-secret-auth #12282
Comments
I'm pretty sure this is a client bug---clients need to be able to reject login methods they don't know how to handle. The spec makes no promises about the order flows are listed in AFAICS. I don't think there's even a meaningful way to order them anyway? |
Element Web developers see that differently... |
Thanks for the pointers. Reading through Michael K's comments and the spec, I agree that there isn't a bug in the client. However: those comments describe a different problem: Synapse not serving an HTTP response in the /fallback/ for I'm not sure who is responsible for not serving the |
@waclaw66 Do you have any server logs corresponding to step 4 in your element-web issue here? Can you also please confirm which version of |
I retitled this to what I think is a more accurate title, please shout if I'm wrong! |
I edited the description to also try and provide more context.
The error message |
@DMRobertson: I have that log of Synapse 1.55.0 and shared_secret_authenticator-2.0.2.
is that sufficient? |
To summarise what's going on here:
I don't know if the spec needs a rethink here? In the medium term, the module api should provide some way for plugins to provide a fallback. In the longer term, we'd be better served by using replacing our bespoke UIAuth with OAuth2. |
Any news? |
This Bug is compromising security I would like to get some proper response like now. |
As a workaround for those who have to be able to log out of sessions (e.g. when an account is compromised), some clients still allow you to log out. What worked for me was using Fractal 5alpha1 |
For some context: This is an issue when trying to log out of existing sessions via |
If you have a specific security concern, please report it; see https://github.com/matrix-org/synapse/security/policy.
As far as I can see, the summary in #12282 (comment) is still an accurate representation of the status quo.
Thanks, that context is very helpful; this makes for a particularly painful failure mode. Short of Element web providing better handling for a range of login types (element-hq/element-web#19605), the only other workaround that springs to mind is to delete a specific device using the Admin API (or delete a batch of multiple devices_). |
It's the same failure mode that was already reported in 2021 in the issue you linked to element-hq/element-web#19605 . I should have noticed this earlier. I'll ask our admin about which custom provider modules are installed. So there is no reason to believe this is an issue if no custom provider modules are installed. @53c70r do you have custom password provider modules installed like mentioned in element-hq/element-web#19605 ? |
element-hq/element-web#20292 (comment) describes a custom user-interactive auth flow which a client did not understand. The client tried to request a HTML fallback to show to its user. The response from synapse was an error:
Judging by Synapse's source code, this probably came with a 404 status code. However, the spec says:
The JSON blob returned does not constitute an HTML page, so we are not spec compliant.
The report in that issue claimed to be running on Synapse 1.49 and using an unspecified version of devture/matrix-synapse-shared-secret-auth.
Original Description
Flows provided by _get_available_ui_auth_types are unordered, it causes element-hq/element-web#19605 and devture/matrix-synapse-shared-secret-auth#12.
The text was updated successfully, but these errors were encountered: