Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
.. image:: ./docs/element_logo_white_bg.svg :height: 60px
Element Synapse - Matrix homeserver implementation
|support| |development| |documentation| |license| |pypi| |python|
Synapse is an open source Matrix <https://matrix.org>
__ homeserver
implementation, written and maintained by Element <https://element.io>
_.
Matrix <https://github.com/matrix-org>
__ is the open standard for
secure and interoperable real time communications. You can directly run
and manage the source code in this repository, available under an AGPL
license. There is no support provided from Element unless you have a
subscription.
Alternatively, for those that need an enterprise-ready solution, Element
Server Suite (ESS) is available as a subscription <https://element.io/pricing>
.
ESS builds on Synapse to offer a complete Matrix-based backend including the full
Admin Console product <https://element.io/enterprise-functionality/admin-console>
,
giving admins the power to easily manage an organization-wide
deployment. It includes advanced identity management, auditing,
moderation and data retention options as well as Long Term Support and
SLAs. ESS can be used to support any Matrix-based frontend client.
.. contents::
The Synapse documentation describes how to install Synapse <https://element-hq.github.io/synapse/latest/setup/installation.html>
. We recommend using
Docker images <https://element-hq.github.io/synapse/latest/setup/installation.html#docker-images-and-ansible-playbooks>
or Debian packages from Matrix.org <https://element-hq.github.io/synapse/latest/setup/installation.html#matrixorg-packages>
_.
.. _federation:
Synapse has a variety of config options <https://element-hq.github.io/synapse/latest/usage/configuration/config_documentation.html>
_
which can be used to customise its behaviour after installation.
There are additional details on how to configure Synapse for federation here <https://element-hq.github.io/synapse/latest/federate.html>
_.
.. _reverse-proxy:
It is recommended to put a reverse proxy such as
nginx <https://nginx.org/en/docs/http/ngx_http_proxy_module.html>
,
Apache <https://httpd.apache.org/docs/current/mod/mod_proxy_http.html>
,
Caddy <https://caddyserver.com/docs/quick-starts/reverse-proxy>
,
HAProxy <https://www.haproxy.org/>
or
relayd <https://man.openbsd.org/relayd.8>
_ in front of Synapse. One advantage of
doing so is that it means that you can expose the default https port (443) to
Matrix clients without needing to run Synapse with root privileges.
For information on configuring one, see the reverse proxy docs <https://element-hq.github.io/synapse/latest/reverse_proxy.html>
_.
The instructions for upgrading Synapse are in the upgrade notes
_.
Please check these instructions as upgrading may require extra steps for some
versions of Synapse.
.. _the upgrade notes: https://element-hq.github.io/synapse/develop/upgrade.html
Synapse uses a number of platform dependencies such as Python and PostgreSQL,
and aims to follow supported upstream versions. See the
deprecation policy <https://element-hq.github.io/synapse/latest/deprecation_policy.html>
_
for more details.
Matrix serves raw, user-supplied data in some APIs -- specifically the content repository endpoints
_.
.. _content repository endpoints: https://matrix.org/docs/spec/client_server/latest.html#get-matrix-media-r0-download-servername-mediaid
Whilst we make a reasonable effort to mitigate against XSS attacks (for
instance, by using CSP
_), a Matrix homeserver should not be hosted on a
domain hosting other web applications. This especially applies to sharing
the domain with Matrix web clients and other sensitive applications like
webmail. See
https://developer.github.com/changes/2014-04-25-user-content-security for more
information.
.. _CSP: https://github.com/matrix-org/synapse/pull/1021
Ideally, the homeserver should not simply be on a different subdomain, but on
a completely different registered domain
_ (also known as top-level site or
eTLD+1). This is because some attacks
_ are still possible as long as the two
applications share the same registered domain.
.. _registered domain: https://tools.ietf.org/html/draft-ietf-httpbis-rfc6265bis-03#section-2.3
.. _some attacks: https://en.wikipedia.org/wiki/Session_fixation#Attacks_using_cross-subdomain_cookie
To illustrate this with an example, if your Element Web or other sensitive web
application is hosted on A.example1.com
, you should ideally host Synapse on
example2.com
. Some amount of protection is offered by hosting on
B.example1.com
instead, so this is also acceptable in some scenarios.
However, you should not host your Synapse on A.example1.com
.
Note that all of the above refers exclusively to the domain used in Synapse's
public_baseurl
setting. In particular, it has no bearing on the domain
mentioned in MXIDs hosted on that server.
Following this advice ensures that even if an XSS is found in Synapse, the impact to other applications will be minimal.
The easiest way to try out your new Synapse installation is by connecting to it from a web client.
Unless you are running a test instance of Synapse on your local machine, in
general, you will need to enable TLS support before you can successfully
connect from a client: see
TLS certificates <https://element-hq.github.io/synapse/latest/setup/installation.html#tls-certificates>
_.
An easy way to get started is to login or register via Element at
https://app.element.io/#/login or https://app.element.io/#/register respectively.
You will need to change the server you are logging into from matrix.org
and instead specify a Homeserver URL of https://<server_name>:8448
(or just https://<server_name>
if you are using a reverse proxy).
If you prefer to use another client, refer to our
client breakdown <https://matrix.org/ecosystem/clients/>
_.
If all goes well you should at least be able to log in, create a room, and start sending messages.
.. _client-user-reg
:
By default, registration of new users via Matrix clients is disabled. To enable it:
In the
registration config section <https://element-hq.github.io/synapse/latest/usage/configuration/config_documentation.html#registration>
_
set enable_registration: true
in homeserver.yaml
.
Then either:
a. set up a CAPTCHA <https://element-hq.github.io/synapse/latest/CAPTCHA_SETUP.html>
_, or
b. set enable_registration_without_verification: true
in homeserver.yaml
.
We strongly recommend using a CAPTCHA, particularly if your homeserver is exposed to the public internet. Without it, anyone can freely register accounts on your homeserver. This can be exploited by attackers to create spambots targeting the rest of the Matrix federation.
Your new user name will be formed partly from the server_name
, and partly
from a localpart you specify when you create the account. Your name will take
the form of::
@localpart:my.domain.name
(pronounced "at localpart on my dot domain dot name").
As when logging in, you will need to specify a "Custom server". Specify your
desired localpart
in the 'User name' box.
Enterprise quality support for Synapse including SLAs is available as part of an
Element Server Suite (ESS) <https://element.io/pricing>
_ subscription.
If you are an existing ESS subscriber then you can raise a support request <https://ems.element.io/support>
_
and access the knowledge base <https://ems-docs.element.io>
_.
The Admin FAQ <https://element-hq.github.io/synapse/latest/usage/administration/admin_faq.html>
_
includes tips on dealing with some common problems. For more details, see
Synapse's wider documentation <https://element-hq.github.io/synapse/latest/>
_.
For additional support installing or managing Synapse, please ask in the community support room |room|_ (from a matrix.org account if necessary). We do not use GitHub issues for support requests, only for bug reports and feature requests.
.. |room| replace:: #synapse:matrix.org
.. _room: https://matrix.to/#/#synapse:matrix.org
.. |docs| replace:: docs
.. _docs: docs
Identity servers have the job of mapping email addresses and other 3rd Party IDs (3PIDs) to Matrix user IDs, as well as verifying the ownership of 3PIDs before creating that mapping.
They are not where accounts or credentials are stored - these live on home servers. Identity Servers are just for mapping 3rd party IDs to matrix IDs.
This process is very security-sensitive, as there is obvious risk of spam if it
is too easy to sign up for Matrix accounts or harvest 3PID data. In the longer
term, we hope to create a decentralised system to manage it (matrix-doc #712 <https://github.com/matrix-org/matrix-doc/issues/712>
), but in the meantime,
the role of managing trusted identity in the Matrix ecosystem is farmed out to
a cluster of known trusted ecosystem partners, who run 'Matrix Identity
Servers' such as Sydent <https://github.com/matrix-org/sydent>
, whose role
is purely to authenticate and track 3PID logins and publish end-user public
keys.
You can host your own copy of Sydent, but this will prevent you reaching other
users in the Matrix ecosystem via their email address, and prevent them finding
you. We therefore recommend that you use one of the centralised identity servers
at https://matrix.org
or https://vector.im
for now.
To reiterate: the Identity server will only be used if you choose to associate an email address with your account, or send an invite to another user via their email address.
We welcome contributions to Synapse from the community!
The best place to get started is our
guide for contributors <https://element-hq.github.io/synapse/latest/development/contributing_guide.html>
.
This is part of our larger documentation <https://element-hq.github.io/synapse/latest>
, which includes
information for Synapse developers as well as Synapse administrators. Developers might be particularly interested in:
Synapse's database schema <https://element-hq.github.io/synapse/latest/development/database_schema.html>
_,notes on Synapse's implementation details <https://element-hq.github.io/synapse/latest/development/internal_documentation/index.html>
_, andhow we use git <https://element-hq.github.io/synapse/latest/development/git.html>
_.Alongside all that, join our developer community on Matrix:
#synapse-dev:matrix.org <https://matrix.to/#/#synapse-dev:matrix.org>
_, featuring real humans!
.. |support| image:: https://img.shields.io/badge/matrix-community%20support-success :alt: (get community support in #synapse:matrix.org) :target: https://matrix.to/#/#synapse:matrix.org
.. |development| image:: https://img.shields.io/matrix/synapse-dev:matrix.org?label=development&logo=matrix :alt: (discuss development on #synapse-dev:matrix.org) :target: https://matrix.to/#/#synapse-dev:matrix.org
.. |documentation| image:: https://img.shields.io/badge/documentation-%E2%9C%93-success :alt: (Rendered documentation on GitHub Pages) :target: https://element-hq.github.io/synapse/latest/
.. |license| image:: https://img.shields.io/github/license/element-hq/synapse :alt: (check license in LICENSE file) :target: LICENSE
.. |pypi| image:: https://img.shields.io/pypi/v/matrix-synapse :alt: (latest version released on PyPi) :target: https://pypi.org/project/matrix-synapse
.. |python| image:: https://img.shields.io/pypi/pyversions/matrix-synapse :alt: (supported python versions) :target: https://pypi.org/project/matrix-synapse
FAQs
Homeserver for the Matrix decentralised comms protocol
We found that matrix-synapse demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 10 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.