Page MenuHomePhabricator

[protos][identity] Add RestoreUser RPCs
ClosedPublic

Authored by bartek on Mon, Sep 2, 11:20 PM.
Tags
None
Referenced Files
Unknown Object (File)
Sat, Sep 14, 12:06 PM
Unknown Object (File)
Sat, Sep 14, 12:05 PM
Unknown Object (File)
Wed, Sep 11, 9:45 AM
Unknown Object (File)
Mon, Sep 9, 9:54 AM
Unknown Object (File)
Mon, Sep 9, 9:14 AM
Unknown Object (File)
Mon, Sep 9, 3:41 AM
Unknown Object (File)
Sun, Sep 8, 10:16 AM
Unknown Object (File)
Fri, Sep 6, 3:03 PM
Subscribers

Details

Summary

Address ENG-8210.

Added RestorePasswordUser and RestoreWalletUser RPCs. These are described as "a single RPC" in the Whitepaper 5.2.
The API is very similiar to LogInPasswordUser[Start] / LogInWalletUser, with the additional device list payload. Also,
we're not doing OPAQUE login here for password users.

Test Plan

Flow, identity compiles.

Diff Detail

Repository
rCOMM Comm
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

bartek held this revision as a draft.
bartek published this revision for review.Tue, Sep 3, 12:04 AM
bartek added inline comments.
shared/protos/identity_unauth.proto
241–242 ↗(On Diff #43843)

We're not doing OPAQUE for password users here, so I wondered about replay attack protection.

Not sure if this is required, since we're requiring both curPrimarySignature and lastPrimarySignature in the signed device list.

ashoat requested changes to this revision.Wed, Sep 4, 11:04 PM

It would be helpful to include the parts of the whitepaper you're implementing:

Screenshot 2024-09-05 at 1.59.00 AM.png (1×1 px, 220 KB)

The referenced "Key Upload (6.2.2)" is here:

Screenshot 2024-09-05 at 1.59.14 AM.png (294×1 px, 80 KB)

Overall I don't think the dichotomy between password and Ethereum users makes sense here, given the protocol is substantially similar, and given that we're trying to get rid of this distinction going forward.

Maybe we could have a single RPC that has an optional input of a social proof? If the account is using an Ethereum wallet as their display name, then the RPC will fail without a new social proof. What do you think?

shared/protos/identity_unauth.proto
240 ↗(On Diff #43843)

Why username instead of user ID? What does this look like in the world where we get rid of the password vs Ethereum user dichotomy?

241–242 ↗(On Diff #43843)

What's "replay attack" mean in this context? What exactly is being replayed? Usually "replay attack protection" is in the context of something like a signed nonce being replayed, but it's unclear to me why we would need to use a nonce in the first place.

This revision now requires changes to proceed.Wed, Sep 4, 11:04 PM

Overall I don't think the dichotomy between password and Ethereum users makes sense here, given the protocol is substantially similar, and given that we're trying to get rid of this distinction going forward.

Maybe we could have a single RPC that has an optional input of a social proof? If the account is using an Ethereum wallet as their display name, then the RPC will fail without a new social proof. What do you think?

Generally, I don't mind merging these into one RPC. The main reason I split it into two was consistency with existing Login/Register RPCs

shared/protos/identity_unauth.proto
240 ↗(On Diff #43843)

Why username instead of user ID?

When restoring backup, we don't have access to user ID at this point. The ct1 (backup keys) doesn't contain this information. Instead we have username/wallet address that is needed anyway to download and decrypt backup.

Alternatively, we can call the FindUserID RPC before, but this makes clients call two RPCs instead of one.

What does this look like in the world where we get rid of the password vs Ethereum user dichotomy?

We can call this user_identifier, which can be either a username or wallet address, depending on the backup's security.

241–242 ↗(On Diff #43843)

Sorry for the confusion, I was blindly following the UploadKeysForRegisteredDeviceAndLogIn RPC logic, which requires a nonce

Discussed my above feedback with @bartek today in our 1:1. We identified several potential paths forward for unifying these two RPCs:

  1. Take userID as input here instead of username
    • The backup service could return the userID in the initial RPC
    • Alternately, if that is too complicated for some reason, the client could get the userID via FindUserID, but this would require an additional RPC
  2. Take oneof identifier as input here, to match FindUserIDRequest
    • This is probably slightly worse as it might require us to change / update this RPC later as part of ENG-8414

Based on this discussion it looks like the backup service doesn't query for the userID at all currently, and instead just uses the username. We'll need to update that as part of this work, so it's probably a good time to consider option 1a.

Discussed my above feedback with @bartek today in our 1:1. We identified several potential paths forward for unifying these two RPCs:

  1. Take userID as input here instead of username
    • The backup service could return the userID in the initial RPC
    • Alternately, if that is too complicated for some reason, the client could get the userID via FindUserID, but this would require an additional RPC
  2. Take oneof identifier as input here, to match FindUserIDRequest
    • This is probably slightly worse as it might require us to change / update this RPC later as part of ENG-8414

Based on this discussion it looks like the backup service doesn't query for the userID at all currently, and instead just uses the username. We'll need to update that as part of this work, so it's probably a good time to consider option 1a.

Option 1a makes the most sense to me too. This implies the following flow:

  1. User asks Backup Service for backupID and userID, given username/wallet address as input
  2. Backup Service queries Identity Service for userID, retrieves appropriate backupID and returns both values to the user
    • Updating Backup endpoint to query for user ID is tracked in ENG-6145
  3. User calls RestoreUser RPC, providing userID returned from Backup Service as input
  • Merged RPCs into one
  • Made the RPC accept userID

Thanks! I'll talk to Yiannis about updating the Yiannis to mention the first RPC return userID and the second RPC taking it as input.

sorry for the delay!

shared/protos/identity_unauth.proto
33 ↗(On Diff #43964)
This revision is now accepted and ready to land.Fri, Sep 13, 1:50 AM
This revision was automatically updated to reflect the committed changes.