Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sealed sender messages to PNI are accepted #305

Open
hrdl-github opened this issue Mar 6, 2025 · 0 comments
Open

Sealed sender messages to PNI are accepted #305

hrdl-github opened this issue Mar 6, 2025 · 0 comments

Comments

@hrdl-github
Copy link
Contributor

Since yesterday I've been receiving short messages (e.g. "Hi") from multiple accounts with the display name "Lan" in gurk/presage. On my phone these seem to be filtered out by https://github.com/signalapp/Signal-Android/blob/0c6a45880c973b1ad81ac30903e5cac3cba390b1/app/src/main/java/org/thoughtcrime/securesms/messages/MessageDecryptor.kt#L125-L128 .

TRACE websocket: libsignal_service::websocket: decoded WebSocketMessage request msg_type=Request request.id=REQ_ID request.verb="PUT" request.path="/api/v1/message" request_body_size_bytes=2334 request.headers=["X-Signal-Key: false", "X-Signal-Timestamp:TS"]
TRACE websocket: libsignal_service::websocket: sending request with body
TRACE decrypt{is_signaling_key_encrypted=false signaling_key_present=true input_size=2334}: libsignal_service::envelope: Envelope::decrypt: not encrypted
TRACE open_envelope{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:decrypt{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:sealed_sender_decrypt{timestamp=Timestamp(TS) local_e164=None local_uuid="063e0d80-f58b-42a9-be6a-2023e44c19bf" local_device_id=DeviceId(2) ciphertext=2230}: presage_store_sled::protocol: getting identity_key_pair
DEBUG open_envelope{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:decrypt{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:sealed_sender_decrypt{timestamp=Timestamp(TS) local_e164=None local_uuid="063e0d80-f58b-42a9-be6a-2023e44c19bf" local_device_id=DeviceId(2) ciphertext=2230}: libsignal_protocol::sealed_sender: deserializing UnidentifiedSenderMessage with version 1    
 INFO open_envelope{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:decrypt{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:sealed_sender_decrypt{timestamp=Timestamp(TS) local_e164=None local_uuid="063e0d80-f58b-42a9-be6a-2023e44c19bf" local_device_id=DeviceId(2) ciphertext=2230}: libsignal_protocol::sealed_sender: deserialized UnidentifiedSenderMessageContent from 9d023164-c85f-438f-bab2-9595b16660b4.1 with type PreKey    
TRACE open_envelope{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:decrypt{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:sealed_sender_decrypt{timestamp=Timestamp(TS) local_e164=None local_uuid="063e0d80-f58b-42a9-be6a-2023e44c19bf" local_device_id=DeviceId(2) ciphertext=2230}: presage_store_sled::protocol: loading session address=9d023164-c85f-438f-bab2-9595b16660b4.1 session_exists=false
 WARN open_envelope{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:decrypt{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:sealed_sender_decrypt{timestamp=Timestamp(TS) local_e164=None local_uuid="063e0d80-f58b-42a9-be6a-2023e44c19bf" local_device_id=DeviceId(2) ciphertext=2230}: presage_store_sled::protocol: trusting new identity address=9d023164-c85f-438f-bab2-9595b16660b4.1
 INFO open_envelope{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:decrypt{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:sealed_sender_decrypt{timestamp=Timestamp(TS) local_e164=None local_uuid="063e0d80-f58b-42a9-be6a-2023e44c19bf" local_device_id=DeviceId(2) ciphertext=2230}: libsignal_protocol::session: processing PreKey message from 9d023164-c85f-438f-bab2-9595b16660b4.1    
TRACE open_envelope{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:decrypt{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:sealed_sender_decrypt{timestamp=Timestamp(TS) local_e164=None local_uuid="063e0d80-f58b-42a9-be6a-2023e44c19bf" local_device_id=DeviceId(2) ciphertext=2230}: presage_store_sled::protocol: getting identity_key_pair
TRACE open_envelope{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:decrypt{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:sealed_sender_decrypt{timestamp=Timestamp(TS) local_e164=None local_uuid="063e0d80-f58b-42a9-be6a-2023e44c19bf" local_device_id=DeviceId(2) ciphertext=2230}: libsignal_protocol::state::session: set_sender_chain: ChainKey { key: [KEY], index: 0 }    
TRACE open_envelope{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:decrypt{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:sealed_sender_decrypt{timestamp=Timestamp(TS) local_e164=None local_uuid="063e0d80-f58b-42a9-be6a-2023e44c19bf" local_device_id=DeviceId(2) ciphertext=2230}: presage_store_sled::protocol: saving identity
TRACE open_envelope{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:decrypt{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:sealed_sender_decrypt{timestamp=Timestamp(TS) local_e164=None local_uuid="063e0d80-f58b-42a9-be6a-2023e44c19bf" local_device_id=DeviceId(2) ciphertext=2230}: presage_store_sled::content: storing a message with thread thread=Thread(contact=9d023164-c85f-438f-bab2-9595b16660b4) ts=TS
 INFO open_envelope{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:decrypt{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:sealed_sender_decrypt{timestamp=Timestamp(TS) local_e164=None local_uuid="063e0d80-f58b-42a9-be6a-2023e44c19bf" local_device_id=DeviceId(2) ciphertext=2230}: libsignal_protocol::session_cipher: 9d023164-c85f-438f-bab2-9595b16660b4.1 creating new chains.    
TRACE open_envelope{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:decrypt{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:sealed_sender_decrypt{timestamp=Timestamp(TS) local_e164=None local_uuid="063e0d80-f58b-42a9-be6a-2023e44c19bf" local_device_id=DeviceId(2) ciphertext=2230}: libsignal_protocol::state::session: set_sender_chain: ChainKey { key: [KEY], index: 0 }    
 INFO open_envelope{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:decrypt{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:sealed_sender_decrypt{timestamp=Timestamp(TS) local_e164=None local_uuid="063e0d80-f58b-42a9-be6a-2023e44c19bf" local_device_id=DeviceId(2) ciphertext=2230}: libsignal_protocol::session_cipher: decrypted PreKey message from 9d023164-c85f-438f-bab2-9595b16660b4.1 with current session state (base key BASE_KEY)    
TRACE open_envelope{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:decrypt{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:sealed_sender_decrypt{timestamp=Timestamp(TS) local_e164=None local_uuid="063e0d80-f58b-42a9-be6a-2023e44c19bf" local_device_id=DeviceId(2) ciphertext=2230}: presage_store_sled::protocol: storing session address=9d023164-c85f-438f-bab2-9595b16660b4.1
TRACE open_envelope{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:decrypt{self=ServiceCipher { protocol_store: "...", trust_root: "...", local_uuid: 063e0d80-f58b-42a9-be6a-2023e44c19bf, local_device_id: 2 } envelope="Envelope { source_address: None, source_device: 0, server_guid: \"ea2e8fcd-b4a9-4b05-8670-3e8d23b48cf8\", timestamp: TS, content: 2230 bytes, }"}:sealed_sender_decrypt{timestamp=Timestamp(TS) local_e164=None local_uuid="063e0d80-f58b-42a9-be6a-2023e44c19bf" local_device_id=DeviceId(2) ciphertext=2230}: presage_store_sled::protocol: removed kyber pre-key kyber_prekey_id=3
DEBUG presage::manager::registered: inserting profile key for sender=9d023164-c85f-438f-bab2-9595b16660b4
TRACE websocket: libsignal_service::websocket: sending response WebSocketResponseMessage { id: Some(REQ_ID), status: Some(200), message: Some("OK"), headers: [], body: None }
 INFO presage::manager::registered: saved contact on first sight sender_uuid=9d023164-c85f-438f-bab2-9595b16660b4
DEBUG presage_store_sled::content: saved contact
TRACE presage::store: updating expire timer thread=Thread(contact=9d023164-c85f-438f-bab2-9595b16660b4) timer=0 version=1
TRACE presage_store_sled::content: storing a message with thread thread=Thread(contact=9d023164-c85f-438f-bab2-9595b16660b4) ts=TS
TRACE execute: gurk::storage::sql::storage: sql executed elapsed=7.213493ms
DEBUG gurk::app: resolved name as profile name name="Lan"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant