+
{getErrorMessage(mxEvent, verificationState)}
);
diff --git a/src/i18n/strings/en_EN.json b/src/i18n/strings/en_EN.json
index 70089dcf3b..5a0b9d7cac 100644
--- a/src/i18n/strings/en_EN.json
+++ b/src/i18n/strings/en_EN.json
@@ -1427,6 +1427,8 @@
"dynamic_room_predecessors": "Dynamic room predecessors",
"dynamic_room_predecessors_description": "Enable MSC3946 (to support late-arriving room archives)",
"element_call_video_rooms": "Element Call video rooms",
+ "exclude_insecure_devices": "Exclude insecure devices when sending/receiving messages",
+ "exclude_insecure_devices_description": "When this mode is enabled, encrypted messages will not be shared with unverified devices, and messages from unverified devices will be shown as an error. Note that if you enable this mode, you may be unable to communicate with users who have not verified their devices.",
"experimental_description": "Feeling experimental? Try out our latest ideas in development. These features are not finalised; they may be unstable, may change, or may be dropped altogether.
Learn more.",
"experimental_section": "Early previews",
"extended_profiles_msc_support": "Requires your server to support MSC4133",
@@ -3301,6 +3303,8 @@
"historical_event_no_key_backup": "Historical messages are not available on this device",
"historical_event_unverified_device": "You need to verify this device for access to historical messages",
"historical_event_user_not_joined": "You don't have access to this message",
+ "sender_identity_previously_verified": "Verified identity has changed",
+ "sender_unsigned_device": "Encrypted by a device not verified by its owner.",
"unable_to_decrypt": "Unable to decrypt message"
},
"disambiguated_profile": "%(displayName)s (%(matrixId)s)",
diff --git a/src/settings/Settings.tsx b/src/settings/Settings.tsx
index 2fadb53dde..76bb109cac 100644
--- a/src/settings/Settings.tsx
+++ b/src/settings/Settings.tsx
@@ -11,6 +11,7 @@ import React, { ReactNode } from "react";
import { UNSTABLE_MSC4133_EXTENDED_PROFILES } from "matrix-js-sdk/src/matrix";
import { _t, _td, TranslationKey } from "../languageHandler";
+import DeviceIsolationModeController from "./controllers/DeviceIsolationModeController.ts";
import {
NotificationBodyEnabledController,
NotificationsEnabledController,
@@ -309,6 +310,16 @@ export const SETTINGS: { [setting: string]: ISetting } = {
supportedLevelsAreOrdered: true,
default: false,
},
+ "feature_exclude_insecure_devices": {
+ isFeature: true,
+ labsGroup: LabGroup.Encryption,
+ controller: new DeviceIsolationModeController(),
+ displayName: _td("labs|exclude_insecure_devices"),
+ description: _td("labs|exclude_insecure_devices_description"),
+ supportedLevels: LEVELS_DEVICE_ONLY_SETTINGS_WITH_CONFIG_PRIORITISED,
+ supportedLevelsAreOrdered: true,
+ default: false,
+ },
"useOnlyCurrentProfiles": {
supportedLevels: LEVELS_ACCOUNT_SETTINGS,
displayName: _td("settings|disable_historical_profile"),
diff --git a/src/settings/controllers/DeviceIsolationModeController.ts b/src/settings/controllers/DeviceIsolationModeController.ts
new file mode 100644
index 0000000000..03fee77742
--- /dev/null
+++ b/src/settings/controllers/DeviceIsolationModeController.ts
@@ -0,0 +1,37 @@
+/*
+Copyright 2024 New Vector Ltd.
+SPDX-License-Identifier: AGPL-3.0-only OR GPL-3.0-only
+Please see LICENSE files in the repository root for full details.
+*/
+
+import { AllDevicesIsolationMode, OnlySignedDevicesIsolationMode } from "matrix-js-sdk/src/crypto-api";
+import { MatrixClient } from "matrix-js-sdk/src/matrix";
+
+import SettingController from "./SettingController";
+import { MatrixClientPeg } from "../../MatrixClientPeg";
+import { SettingLevel } from "../SettingLevel";
+
+/**
+ * A controller for the "exclude_insecure_devices" setting, which will
+ * update the crypto stack's device isolation mode on change.
+ */
+export default class DeviceIsolationModeController extends SettingController {
+ public onChange(level: SettingLevel, roomId: string, newValue: any): void {
+ setDeviceIsolationMode(MatrixClientPeg.safeGet(), newValue);
+ }
+}
+
+/**
+ * Set the crypto stack's device isolation mode based on the current value of the
+ * "exclude_insecure_devices" setting.
+ *
+ * @param client - MatrixClient to update to the new setting.
+ * @param settingValue - value of the "exclude_insecure_devices" setting.
+ */
+export function setDeviceIsolationMode(client: MatrixClient, settingValue: boolean): void {
+ client
+ .getCrypto()
+ ?.setDeviceIsolationMode(
+ settingValue ? new OnlySignedDevicesIsolationMode() : new AllDevicesIsolationMode(true),
+ );
+}
diff --git a/test/components/structures/MatrixChat-test.tsx b/test/components/structures/MatrixChat-test.tsx
index 1003d1d167..83b4feea3a 100644
--- a/test/components/structures/MatrixChat-test.tsx
+++ b/test/components/structures/MatrixChat-test.tsx
@@ -1002,6 +1002,7 @@ describe("
", () => {
getUserVerificationStatus: jest
.fn()
.mockResolvedValue(new UserVerificationStatus(false, false, false)),
+ setDeviceIsolationMode: jest.fn(),
};
loginClient.isCryptoEnabled.mockReturnValue(true);
loginClient.getCrypto.mockReturnValue(mockCrypto as any);
diff --git a/test/components/views/messages/DecryptionFailureBody-test.tsx b/test/components/views/messages/DecryptionFailureBody-test.tsx
index 8ba4503446..021e58d071 100644
--- a/test/components/views/messages/DecryptionFailureBody-test.tsx
+++ b/test/components/views/messages/DecryptionFailureBody-test.tsx
@@ -103,4 +103,32 @@ describe("DecryptionFailureBody", () => {
// Then
expect(container).toHaveTextContent("You don't have access to this message");
});
+
+ it("should handle messages from users who change identities after verification", async () => {
+ // When
+ const event = await mkDecryptionFailureMatrixEvent({
+ code: DecryptionFailureCode.SENDER_IDENTITY_PREVIOUSLY_VERIFIED,
+ msg: "User previously verified",
+ roomId: "fakeroom",
+ sender: "fakesender",
+ });
+ const { container } = customRender(event);
+
+ // Then
+ expect(container).toMatchSnapshot();
+ });
+
+ it("should handle messages from unverified devices", async () => {
+ // When
+ const event = await mkDecryptionFailureMatrixEvent({
+ code: DecryptionFailureCode.UNSIGNED_SENDER_DEVICE,
+ msg: "Unsigned device",
+ roomId: "fakeroom",
+ sender: "fakesender",
+ });
+ const { container } = customRender(event);
+
+ // Then
+ expect(container).toHaveTextContent("Encrypted by a device not verified by its owner");
+ });
});
diff --git a/test/components/views/messages/__snapshots__/DecryptionFailureBody-test.tsx.snap b/test/components/views/messages/__snapshots__/DecryptionFailureBody-test.tsx.snap
index 22e44fd16a..b2ba5b2a2e 100644
--- a/test/components/views/messages/__snapshots__/DecryptionFailureBody-test.tsx.snap
+++ b/test/components/views/messages/__snapshots__/DecryptionFailureBody-test.tsx.snap
@@ -19,3 +19,18 @@ exports[`DecryptionFailureBody Should display "Unable to decrypt message" 1`] =
`;
+
+exports[`DecryptionFailureBody should handle messages from users who change identities after verification 1`] = `
+