keyring.py 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716
  1. # -*- coding: utf-8 -*-
  2. # Copyright 2014-2016 OpenMarket Ltd
  3. # Copyright 2017, 2018 New Vector Ltd.
  4. #
  5. # Licensed under the Apache License, Version 2.0 (the "License");
  6. # you may not use this file except in compliance with the License.
  7. # You may obtain a copy of the License at
  8. #
  9. # http://www.apache.org/licenses/LICENSE-2.0
  10. #
  11. # Unless required by applicable law or agreed to in writing, software
  12. # distributed under the License is distributed on an "AS IS" BASIS,
  13. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  14. # See the License for the specific language governing permissions and
  15. # limitations under the License.
  16. import hashlib
  17. import logging
  18. from collections import namedtuple
  19. from signedjson.key import (
  20. decode_verify_key_bytes,
  21. encode_verify_key_base64,
  22. is_signing_algorithm_supported,
  23. )
  24. from signedjson.sign import (
  25. SignatureVerifyException,
  26. encode_canonical_json,
  27. sign_json,
  28. signature_ids,
  29. verify_signed_json,
  30. )
  31. from unpaddedbase64 import decode_base64, encode_base64
  32. from OpenSSL import crypto
  33. from twisted.internet import defer
  34. from synapse.api.errors import Codes, SynapseError
  35. from synapse.crypto.keyclient import fetch_server_key
  36. from synapse.util import logcontext, unwrapFirstError
  37. from synapse.util.logcontext import (
  38. LoggingContext,
  39. PreserveLoggingContext,
  40. preserve_fn,
  41. run_in_background,
  42. )
  43. from synapse.util.metrics import Measure
  44. logger = logging.getLogger(__name__)
  45. VerifyKeyRequest = namedtuple("VerifyRequest", (
  46. "server_name", "key_ids", "json_object", "deferred"
  47. ))
  48. """
  49. A request for a verify key to verify a JSON object.
  50. Attributes:
  51. server_name(str): The name of the server to verify against.
  52. key_ids(set(str)): The set of key_ids to that could be used to verify the
  53. JSON object
  54. json_object(dict): The JSON object to verify.
  55. deferred(Deferred[str, str, nacl.signing.VerifyKey]):
  56. A deferred (server_name, key_id, verify_key) tuple that resolves when
  57. a verify key has been fetched. The deferreds' callbacks are run with no
  58. logcontext.
  59. """
  60. class KeyLookupError(ValueError):
  61. pass
  62. class Keyring(object):
  63. def __init__(self, hs):
  64. self.store = hs.get_datastore()
  65. self.clock = hs.get_clock()
  66. self.client = hs.get_http_client()
  67. self.config = hs.get_config()
  68. self.perspective_servers = self.config.perspectives
  69. self.hs = hs
  70. # map from server name to Deferred. Has an entry for each server with
  71. # an ongoing key download; the Deferred completes once the download
  72. # completes.
  73. #
  74. # These are regular, logcontext-agnostic Deferreds.
  75. self.key_downloads = {}
  76. def verify_json_for_server(self, server_name, json_object):
  77. return logcontext.make_deferred_yieldable(
  78. self.verify_json_objects_for_server(
  79. [(server_name, json_object)]
  80. )[0]
  81. )
  82. def verify_json_objects_for_server(self, server_and_json):
  83. """Bulk verifies signatures of json objects, bulk fetching keys as
  84. necessary.
  85. Args:
  86. server_and_json (list): List of pairs of (server_name, json_object)
  87. Returns:
  88. List<Deferred>: for each input pair, a deferred indicating success
  89. or failure to verify each json object's signature for the given
  90. server_name. The deferreds run their callbacks in the sentinel
  91. logcontext.
  92. """
  93. verify_requests = []
  94. for server_name, json_object in server_and_json:
  95. key_ids = signature_ids(json_object, server_name)
  96. if not key_ids:
  97. logger.warn("Request from %s: no supported signature keys",
  98. server_name)
  99. deferred = defer.fail(SynapseError(
  100. 400,
  101. "Not signed with a supported algorithm",
  102. Codes.UNAUTHORIZED,
  103. ))
  104. else:
  105. deferred = defer.Deferred()
  106. logger.debug("Verifying for %s with key_ids %s",
  107. server_name, key_ids)
  108. verify_request = VerifyKeyRequest(
  109. server_name, key_ids, json_object, deferred
  110. )
  111. verify_requests.append(verify_request)
  112. run_in_background(self._start_key_lookups, verify_requests)
  113. # Pass those keys to handle_key_deferred so that the json object
  114. # signatures can be verified
  115. handle = preserve_fn(_handle_key_deferred)
  116. return [
  117. handle(rq) for rq in verify_requests
  118. ]
  119. @defer.inlineCallbacks
  120. def _start_key_lookups(self, verify_requests):
  121. """Sets off the key fetches for each verify request
  122. Once each fetch completes, verify_request.deferred will be resolved.
  123. Args:
  124. verify_requests (List[VerifyKeyRequest]):
  125. """
  126. try:
  127. # create a deferred for each server we're going to look up the keys
  128. # for; we'll resolve them once we have completed our lookups.
  129. # These will be passed into wait_for_previous_lookups to block
  130. # any other lookups until we have finished.
  131. # The deferreds are called with no logcontext.
  132. server_to_deferred = {
  133. rq.server_name: defer.Deferred()
  134. for rq in verify_requests
  135. }
  136. # We want to wait for any previous lookups to complete before
  137. # proceeding.
  138. yield self.wait_for_previous_lookups(
  139. [rq.server_name for rq in verify_requests],
  140. server_to_deferred,
  141. )
  142. # Actually start fetching keys.
  143. self._get_server_verify_keys(verify_requests)
  144. # When we've finished fetching all the keys for a given server_name,
  145. # resolve the deferred passed to `wait_for_previous_lookups` so that
  146. # any lookups waiting will proceed.
  147. #
  148. # map from server name to a set of request ids
  149. server_to_request_ids = {}
  150. for verify_request in verify_requests:
  151. server_name = verify_request.server_name
  152. request_id = id(verify_request)
  153. server_to_request_ids.setdefault(server_name, set()).add(request_id)
  154. def remove_deferreds(res, verify_request):
  155. server_name = verify_request.server_name
  156. request_id = id(verify_request)
  157. server_to_request_ids[server_name].discard(request_id)
  158. if not server_to_request_ids[server_name]:
  159. d = server_to_deferred.pop(server_name, None)
  160. if d:
  161. d.callback(None)
  162. return res
  163. for verify_request in verify_requests:
  164. verify_request.deferred.addBoth(
  165. remove_deferreds, verify_request,
  166. )
  167. except Exception:
  168. logger.exception("Error starting key lookups")
  169. @defer.inlineCallbacks
  170. def wait_for_previous_lookups(self, server_names, server_to_deferred):
  171. """Waits for any previous key lookups for the given servers to finish.
  172. Args:
  173. server_names (list): list of server_names we want to lookup
  174. server_to_deferred (dict): server_name to deferred which gets
  175. resolved once we've finished looking up keys for that server.
  176. The Deferreds should be regular twisted ones which call their
  177. callbacks with no logcontext.
  178. Returns: a Deferred which resolves once all key lookups for the given
  179. servers have completed. Follows the synapse rules of logcontext
  180. preservation.
  181. """
  182. loop_count = 1
  183. while True:
  184. wait_on = [
  185. (server_name, self.key_downloads[server_name])
  186. for server_name in server_names
  187. if server_name in self.key_downloads
  188. ]
  189. if not wait_on:
  190. break
  191. logger.info(
  192. "Waiting for existing lookups for %s to complete [loop %i]",
  193. [w[0] for w in wait_on], loop_count,
  194. )
  195. with PreserveLoggingContext():
  196. yield defer.DeferredList((w[1] for w in wait_on))
  197. loop_count += 1
  198. ctx = LoggingContext.current_context()
  199. def rm(r, server_name_):
  200. with PreserveLoggingContext(ctx):
  201. logger.debug("Releasing key lookup lock on %s", server_name_)
  202. self.key_downloads.pop(server_name_, None)
  203. return r
  204. for server_name, deferred in server_to_deferred.items():
  205. logger.debug("Got key lookup lock on %s", server_name)
  206. self.key_downloads[server_name] = deferred
  207. deferred.addBoth(rm, server_name)
  208. def _get_server_verify_keys(self, verify_requests):
  209. """Tries to find at least one key for each verify request
  210. For each verify_request, verify_request.deferred is called back with
  211. params (server_name, key_id, VerifyKey) if a key is found, or errbacked
  212. with a SynapseError if none of the keys are found.
  213. Args:
  214. verify_requests (list[VerifyKeyRequest]): list of verify requests
  215. """
  216. # These are functions that produce keys given a list of key ids
  217. key_fetch_fns = (
  218. self.get_keys_from_store, # First try the local store
  219. self.get_keys_from_perspectives, # Then try via perspectives
  220. self.get_keys_from_server, # Then try directly
  221. )
  222. @defer.inlineCallbacks
  223. def do_iterations():
  224. with Measure(self.clock, "get_server_verify_keys"):
  225. # dict[str, dict[str, VerifyKey]]: results so far.
  226. # map server_name -> key_id -> VerifyKey
  227. merged_results = {}
  228. # dict[str, set(str)]: keys to fetch for each server
  229. missing_keys = {}
  230. for verify_request in verify_requests:
  231. missing_keys.setdefault(verify_request.server_name, set()).update(
  232. verify_request.key_ids
  233. )
  234. for fn in key_fetch_fns:
  235. results = yield fn(missing_keys.items())
  236. merged_results.update(results)
  237. # We now need to figure out which verify requests we have keys
  238. # for and which we don't
  239. missing_keys = {}
  240. requests_missing_keys = []
  241. for verify_request in verify_requests:
  242. server_name = verify_request.server_name
  243. result_keys = merged_results[server_name]
  244. if verify_request.deferred.called:
  245. # We've already called this deferred, which probably
  246. # means that we've already found a key for it.
  247. continue
  248. for key_id in verify_request.key_ids:
  249. if key_id in result_keys:
  250. with PreserveLoggingContext():
  251. verify_request.deferred.callback((
  252. server_name,
  253. key_id,
  254. result_keys[key_id],
  255. ))
  256. break
  257. else:
  258. # The else block is only reached if the loop above
  259. # doesn't break.
  260. missing_keys.setdefault(server_name, set()).update(
  261. verify_request.key_ids
  262. )
  263. requests_missing_keys.append(verify_request)
  264. if not missing_keys:
  265. break
  266. with PreserveLoggingContext():
  267. for verify_request in requests_missing_keys:
  268. verify_request.deferred.errback(SynapseError(
  269. 401,
  270. "No key for %s with id %s" % (
  271. verify_request.server_name, verify_request.key_ids,
  272. ),
  273. Codes.UNAUTHORIZED,
  274. ))
  275. def on_err(err):
  276. with PreserveLoggingContext():
  277. for verify_request in verify_requests:
  278. if not verify_request.deferred.called:
  279. verify_request.deferred.errback(err)
  280. run_in_background(do_iterations).addErrback(on_err)
  281. @defer.inlineCallbacks
  282. def get_keys_from_store(self, server_name_and_key_ids):
  283. """
  284. Args:
  285. server_name_and_key_ids (list[(str, iterable[str])]):
  286. list of (server_name, iterable[key_id]) tuples to fetch keys for
  287. Returns:
  288. Deferred: resolves to dict[str, dict[str, VerifyKey]]: map from
  289. server_name -> key_id -> VerifyKey
  290. """
  291. res = yield logcontext.make_deferred_yieldable(defer.gatherResults(
  292. [
  293. run_in_background(
  294. self.store.get_server_verify_keys,
  295. server_name, key_ids,
  296. ).addCallback(lambda ks, server: (server, ks), server_name)
  297. for server_name, key_ids in server_name_and_key_ids
  298. ],
  299. consumeErrors=True,
  300. ).addErrback(unwrapFirstError))
  301. defer.returnValue(dict(res))
  302. @defer.inlineCallbacks
  303. def get_keys_from_perspectives(self, server_name_and_key_ids):
  304. @defer.inlineCallbacks
  305. def get_key(perspective_name, perspective_keys):
  306. try:
  307. result = yield self.get_server_verify_key_v2_indirect(
  308. server_name_and_key_ids, perspective_name, perspective_keys
  309. )
  310. defer.returnValue(result)
  311. except Exception as e:
  312. logger.exception(
  313. "Unable to get key from %r: %s %s",
  314. perspective_name,
  315. type(e).__name__, str(e),
  316. )
  317. defer.returnValue({})
  318. results = yield logcontext.make_deferred_yieldable(defer.gatherResults(
  319. [
  320. run_in_background(get_key, p_name, p_keys)
  321. for p_name, p_keys in self.perspective_servers.items()
  322. ],
  323. consumeErrors=True,
  324. ).addErrback(unwrapFirstError))
  325. union_of_keys = {}
  326. for result in results:
  327. for server_name, keys in result.items():
  328. union_of_keys.setdefault(server_name, {}).update(keys)
  329. defer.returnValue(union_of_keys)
  330. @defer.inlineCallbacks
  331. def get_keys_from_server(self, server_name_and_key_ids):
  332. results = yield logcontext.make_deferred_yieldable(defer.gatherResults(
  333. [
  334. run_in_background(
  335. self.get_server_verify_key_v2_direct,
  336. server_name,
  337. key_ids,
  338. )
  339. for server_name, key_ids in server_name_and_key_ids
  340. ],
  341. consumeErrors=True,
  342. ).addErrback(unwrapFirstError))
  343. merged = {}
  344. for result in results:
  345. merged.update(result)
  346. defer.returnValue({
  347. server_name: keys
  348. for server_name, keys in merged.items()
  349. if keys
  350. })
  351. @defer.inlineCallbacks
  352. def get_server_verify_key_v2_indirect(self, server_names_and_key_ids,
  353. perspective_name,
  354. perspective_keys):
  355. # TODO(mark): Set the minimum_valid_until_ts to that needed by
  356. # the events being validated or the current time if validating
  357. # an incoming request.
  358. query_response = yield self.client.post_json(
  359. destination=perspective_name,
  360. path="/_matrix/key/v2/query",
  361. data={
  362. u"server_keys": {
  363. server_name: {
  364. key_id: {
  365. u"minimum_valid_until_ts": 0
  366. } for key_id in key_ids
  367. }
  368. for server_name, key_ids in server_names_and_key_ids
  369. }
  370. },
  371. long_retries=True,
  372. )
  373. keys = {}
  374. responses = query_response["server_keys"]
  375. for response in responses:
  376. if (u"signatures" not in response
  377. or perspective_name not in response[u"signatures"]):
  378. raise KeyLookupError(
  379. "Key response not signed by perspective server"
  380. " %r" % (perspective_name,)
  381. )
  382. verified = False
  383. for key_id in response[u"signatures"][perspective_name]:
  384. if key_id in perspective_keys:
  385. verify_signed_json(
  386. response,
  387. perspective_name,
  388. perspective_keys[key_id]
  389. )
  390. verified = True
  391. if not verified:
  392. logging.info(
  393. "Response from perspective server %r not signed with a"
  394. " known key, signed with: %r, known keys: %r",
  395. perspective_name,
  396. list(response[u"signatures"][perspective_name]),
  397. list(perspective_keys)
  398. )
  399. raise KeyLookupError(
  400. "Response not signed with a known key for perspective"
  401. " server %r" % (perspective_name,)
  402. )
  403. processed_response = yield self.process_v2_response(
  404. perspective_name, response, only_from_server=False
  405. )
  406. for server_name, response_keys in processed_response.items():
  407. keys.setdefault(server_name, {}).update(response_keys)
  408. yield logcontext.make_deferred_yieldable(defer.gatherResults(
  409. [
  410. run_in_background(
  411. self.store_keys,
  412. server_name=server_name,
  413. from_server=perspective_name,
  414. verify_keys=response_keys,
  415. )
  416. for server_name, response_keys in keys.items()
  417. ],
  418. consumeErrors=True
  419. ).addErrback(unwrapFirstError))
  420. defer.returnValue(keys)
  421. @defer.inlineCallbacks
  422. def get_server_verify_key_v2_direct(self, server_name, key_ids):
  423. keys = {}
  424. for requested_key_id in key_ids:
  425. if requested_key_id in keys:
  426. continue
  427. (response, tls_certificate) = yield fetch_server_key(
  428. server_name, self.hs.tls_client_options_factory, requested_key_id
  429. )
  430. if (u"signatures" not in response
  431. or server_name not in response[u"signatures"]):
  432. raise KeyLookupError("Key response not signed by remote server")
  433. if "tls_fingerprints" not in response:
  434. raise KeyLookupError("Key response missing TLS fingerprints")
  435. certificate_bytes = crypto.dump_certificate(
  436. crypto.FILETYPE_ASN1, tls_certificate
  437. )
  438. sha256_fingerprint = hashlib.sha256(certificate_bytes).digest()
  439. sha256_fingerprint_b64 = encode_base64(sha256_fingerprint)
  440. response_sha256_fingerprints = set()
  441. for fingerprint in response[u"tls_fingerprints"]:
  442. if u"sha256" in fingerprint:
  443. response_sha256_fingerprints.add(fingerprint[u"sha256"])
  444. if sha256_fingerprint_b64 not in response_sha256_fingerprints:
  445. raise KeyLookupError("TLS certificate not allowed by fingerprints")
  446. response_keys = yield self.process_v2_response(
  447. from_server=server_name,
  448. requested_ids=[requested_key_id],
  449. response_json=response,
  450. )
  451. keys.update(response_keys)
  452. yield logcontext.make_deferred_yieldable(defer.gatherResults(
  453. [
  454. run_in_background(
  455. self.store_keys,
  456. server_name=key_server_name,
  457. from_server=server_name,
  458. verify_keys=verify_keys,
  459. )
  460. for key_server_name, verify_keys in keys.items()
  461. ],
  462. consumeErrors=True
  463. ).addErrback(unwrapFirstError))
  464. defer.returnValue(keys)
  465. @defer.inlineCallbacks
  466. def process_v2_response(self, from_server, response_json,
  467. requested_ids=[], only_from_server=True):
  468. time_now_ms = self.clock.time_msec()
  469. response_keys = {}
  470. verify_keys = {}
  471. for key_id, key_data in response_json["verify_keys"].items():
  472. if is_signing_algorithm_supported(key_id):
  473. key_base64 = key_data["key"]
  474. key_bytes = decode_base64(key_base64)
  475. verify_key = decode_verify_key_bytes(key_id, key_bytes)
  476. verify_key.time_added = time_now_ms
  477. verify_keys[key_id] = verify_key
  478. old_verify_keys = {}
  479. for key_id, key_data in response_json["old_verify_keys"].items():
  480. if is_signing_algorithm_supported(key_id):
  481. key_base64 = key_data["key"]
  482. key_bytes = decode_base64(key_base64)
  483. verify_key = decode_verify_key_bytes(key_id, key_bytes)
  484. verify_key.expired = key_data["expired_ts"]
  485. verify_key.time_added = time_now_ms
  486. old_verify_keys[key_id] = verify_key
  487. results = {}
  488. server_name = response_json["server_name"]
  489. if only_from_server:
  490. if server_name != from_server:
  491. raise KeyLookupError(
  492. "Expected a response for server %r not %r" % (
  493. from_server, server_name
  494. )
  495. )
  496. for key_id in response_json["signatures"].get(server_name, {}):
  497. if key_id not in response_json["verify_keys"]:
  498. raise KeyLookupError(
  499. "Key response must include verification keys for all"
  500. " signatures"
  501. )
  502. if key_id in verify_keys:
  503. verify_signed_json(
  504. response_json,
  505. server_name,
  506. verify_keys[key_id]
  507. )
  508. signed_key_json = sign_json(
  509. response_json,
  510. self.config.server_name,
  511. self.config.signing_key[0],
  512. )
  513. signed_key_json_bytes = encode_canonical_json(signed_key_json)
  514. ts_valid_until_ms = signed_key_json[u"valid_until_ts"]
  515. updated_key_ids = set(requested_ids)
  516. updated_key_ids.update(verify_keys)
  517. updated_key_ids.update(old_verify_keys)
  518. response_keys.update(verify_keys)
  519. response_keys.update(old_verify_keys)
  520. yield logcontext.make_deferred_yieldable(defer.gatherResults(
  521. [
  522. run_in_background(
  523. self.store.store_server_keys_json,
  524. server_name=server_name,
  525. key_id=key_id,
  526. from_server=server_name,
  527. ts_now_ms=time_now_ms,
  528. ts_expires_ms=ts_valid_until_ms,
  529. key_json_bytes=signed_key_json_bytes,
  530. )
  531. for key_id in updated_key_ids
  532. ],
  533. consumeErrors=True,
  534. ).addErrback(unwrapFirstError))
  535. results[server_name] = response_keys
  536. defer.returnValue(results)
  537. def store_keys(self, server_name, from_server, verify_keys):
  538. """Store a collection of verify keys for a given server
  539. Args:
  540. server_name(str): The name of the server the keys are for.
  541. from_server(str): The server the keys were downloaded from.
  542. verify_keys(dict): A mapping of key_id to VerifyKey.
  543. Returns:
  544. A deferred that completes when the keys are stored.
  545. """
  546. # TODO(markjh): Store whether the keys have expired.
  547. return logcontext.make_deferred_yieldable(defer.gatherResults(
  548. [
  549. run_in_background(
  550. self.store.store_server_verify_key,
  551. server_name, server_name, key.time_added, key
  552. )
  553. for key_id, key in verify_keys.items()
  554. ],
  555. consumeErrors=True,
  556. ).addErrback(unwrapFirstError))
  557. @defer.inlineCallbacks
  558. def _handle_key_deferred(verify_request):
  559. """Waits for the key to become available, and then performs a verification
  560. Args:
  561. verify_request (VerifyKeyRequest):
  562. Returns:
  563. Deferred[None]
  564. Raises:
  565. SynapseError if there was a problem performing the verification
  566. """
  567. server_name = verify_request.server_name
  568. try:
  569. with PreserveLoggingContext():
  570. _, key_id, verify_key = yield verify_request.deferred
  571. except IOError as e:
  572. logger.warn(
  573. "Got IOError when downloading keys for %s: %s %s",
  574. server_name, type(e).__name__, str(e),
  575. )
  576. raise SynapseError(
  577. 502,
  578. "Error downloading keys for %s" % (server_name,),
  579. Codes.UNAUTHORIZED,
  580. )
  581. except Exception as e:
  582. logger.exception(
  583. "Got Exception when downloading keys for %s: %s %s",
  584. server_name, type(e).__name__, str(e),
  585. )
  586. raise SynapseError(
  587. 401,
  588. "No key for %s with id %s" % (server_name, verify_request.key_ids),
  589. Codes.UNAUTHORIZED,
  590. )
  591. json_object = verify_request.json_object
  592. logger.debug("Got key %s %s:%s for server %s, verifying" % (
  593. key_id, verify_key.alg, verify_key.version, server_name,
  594. ))
  595. try:
  596. verify_signed_json(json_object, server_name, verify_key)
  597. except SignatureVerifyException as e:
  598. logger.debug(
  599. "Error verifying signature for %s:%s:%s with key %s: %s",
  600. server_name, verify_key.alg, verify_key.version,
  601. encode_verify_key_base64(verify_key),
  602. str(e),
  603. )
  604. raise SynapseError(
  605. 401,
  606. "Invalid signature for server %s with key %s:%s: %s" % (
  607. server_name, verify_key.alg, verify_key.version, str(e),
  608. ),
  609. Codes.UNAUTHORIZED,
  610. )