aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAndreas Straub <andy@strb.org>2015-07-05 22:10:43 +0200
committerAndreas Straub <andy@strb.org>2015-07-05 22:10:43 +0200
commit4cc4e81b8e127c65a4932b0262255d71f2ec264f (patch)
tree9cc6be4c814b9d9f3e3b6f3176f9f7b9101c27af
parent72619de889a80f2d3b17f8ddbc30c2f60e6068e0 (diff)
Trust all IdentityKeys
The trust-on-first-use policy leads to problems when receiving messages from two different devices of a contact before sending a message to them (as their IdentityKeys will not have been added yet). Since session trust will be managed externally anyway, this change is not a security problem, and will allow us to decrypt messages from yet-untrusted sessions.
-rw-r--r--src/main/java/eu/siacs/conversations/crypto/axolotl/AxolotlService.java5
1 files changed, 3 insertions, 2 deletions
diff --git a/src/main/java/eu/siacs/conversations/crypto/axolotl/AxolotlService.java b/src/main/java/eu/siacs/conversations/crypto/axolotl/AxolotlService.java
index 420c75b5..cdd8d85d 100644
--- a/src/main/java/eu/siacs/conversations/crypto/axolotl/AxolotlService.java
+++ b/src/main/java/eu/siacs/conversations/crypto/axolotl/AxolotlService.java
@@ -233,8 +233,9 @@ public class AxolotlService {
*/
@Override
public boolean isTrustedIdentity(String name, IdentityKey identityKey) {
- Set<IdentityKey> trustedKeys = mXmppConnectionService.databaseBackend.loadIdentityKeys(account, name);
- return trustedKeys.isEmpty() || trustedKeys.contains(identityKey);
+ //Set<IdentityKey> trustedKeys = mXmppConnectionService.databaseBackend.loadIdentityKeys(account, name);
+ //return trustedKeys.isEmpty() || trustedKeys.contains(identityKey);
+ return true;
}
// --------------------------------------