Commit graph

1047 commits

Author SHA1 Message Date
Travis Ralston 037894d6f7
Merge pull request #2244 from tulir/mass_redactions
MSC2244: Mass redactions
2019-11-12 08:56:38 -07:00
Hubert Chathi fc793557f8 make the default key event an object 2019-11-12 10:48:38 -05:00
Travis Ralston dcbdb94693
Add explanation 2019-11-08 09:03:49 -07:00
Hubert Chathi e8ce135a41 add clarification and examples 2019-11-07 19:01:30 -05:00
Hubert Chathi 5cc5908dd5
Update proposals/1946-secure_server-side_storage.md
Co-Authored-By: Matthew Hodgson <matthew@arasphere.net>
2019-11-07 18:45:29 -05:00
Brendan Abolivier 52cd69eb75
Split into two non-versioned endpoints 2019-11-07 15:45:58 +00:00
Tulir Asokan 30106aaaac Add section about backwards compatibility
Signed-off-by: Tulir Asokan <tulir@maunium.net>
2019-11-04 21:14:18 +02:00
Hubert Chathi a51805cfe7
Apply suggestions from code review
Co-Authored-By: Kitsune Ral <Kitsune-Ral@users.sf.net>
2019-11-01 23:10:14 -04:00
Hubert Chathi 3e42cf528b
Apply suggestions from code review
Co-Authored-By: David Baker <dbkr@users.noreply.github.com>
2019-11-01 15:38:14 -04:00
Aaron Raimist 14c32cc4bf Wrap lines 2019-10-30 16:20:17 -05:00
Aaron Raimist 6270983b7f MSC2334 - Change default room version to v5
Signed-off-by: Aaron Raimist <aaron@raim.ist>
2019-10-30 14:40:52 -05:00
Travis Ralston ce286dac02
Merge pull request #1538 from uhoreg/e2e_backup
MSC1219: storing megolm keys serverside
2019-10-29 11:54:44 -06:00
Hubert Chathi a6977f19c5
Update proposals/1219-storing-megolm-keys-serverside.md
Co-Authored-By: aditsachde <23707194+aditsachde@users.noreply.github.com>
2019-10-28 12:58:27 -04:00
Hubert Chathi 4fadace9c8
Update proposals/1946-secure_server-side_storage.md
Co-Authored-By: David Baker <dbkr@users.noreply.github.com>
2019-10-28 12:48:59 -04:00
Hubert Chathi 86eccc3bc8 change how we mark the default key, and make sure clients trust keys 2019-10-25 15:00:23 -04:00
Hubert Chathi b27f6985b2 more clarifications 2019-10-23 17:32:36 -04:00
Hubert Chathi 9dfca61ae7
Apply suggestions from code review
Co-Authored-By: David Baker <dbkr@users.noreply.github.com>
Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
Co-Authored-By: Erik Johnston <erikj@jki.re>
2019-10-23 16:13:17 -04:00
Brendan Abolivier 4517506d57
Incorporate review 2019-10-15 17:34:02 +02:00
Brendan Abolivier 6bd2876688
MSC number 2019-10-15 13:59:22 +02:00
Brendan Abolivier ba8880546d
Proposal for versions information on the identity server API 2019-10-15 13:54:52 +02:00
Travis Ralston 7236f1c741
Merge pull request #1983 from matrix-org/travis/msc/leave-reason
MSC1983: Supporting a reason for leaving rooms
2019-10-15 11:42:08 +02:00
Hubert Chathi 5799c433fe add HTTP status codes for errors and move key format to the right spot 2019-10-10 15:03:10 -04:00
Hubert Chathi 576177b579 make version optional in versions update 2019-10-09 17:52:53 -04:00
Andrew Morgan 6274a66ae5
Merge pull request #2176 from matrix-org/rav/proposals/update-redaction
MSC2176: Update the redaction rules
2019-10-07 10:22:32 +01:00
Travis Ralston f608c48f8a
Merge pull request #2290 from matrix-org/anoa/msc_separate_hs_api
MSC2290: Separate Endpoints for Threepid Binding
2019-10-06 09:47:59 -06:00
Matthew Hodgson eddce00390 MSC2313: Ban lists 2019-10-04 21:56:02 -04:00
Hubert Chathi 54e73e4729
Apply suggestions from code review
Co-Authored-By: Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
2019-10-04 10:41:28 -04:00
Andrew Morgan 46e7137252 Don't remove id_server and id_access_token 2019-09-26 17:51:51 +01:00
Andrew Morgan ec7e795112 reflow 2019-09-26 17:20:40 +01:00
Andrew Morgan 0332d531e9 Merge branch 'anoa/msc_separate_hs_api' of github.com:matrix-org/matrix-doc into anoa/msc_separate_hs_api 2019-09-26 17:16:49 +01:00
Andrew Morgan 1a51a24768 UIAA on /account/3pid/add 2019-09-26 17:16:44 +01:00
Andrew Morgan 219ebff6d3
typo fix
Co-Authored-By: Hubert Chathi <hubert@uhoreg.ca>
2019-09-26 10:37:10 +02:00
Andrew Morgan 9311e89941
Update proposals/2229-rebind-existing-3pid.md
Co-Authored-By: Hubert Chathi <hubert@uhoreg.ca>
2019-09-25 01:32:35 +02:00
Hubert Chathi 332b5605c1 simplify protocol by embedding Alice's key in Bob's QR code 2019-09-19 16:18:46 -04:00
Brendan Abolivier 6b0a8505ec
Propose case folding instead of lowercasing 2019-09-19 17:34:25 +01:00
Andrew Morgan 40420d9633
Update proposals/2290-separate-threepid-bind-hs.md
Co-Authored-By: Kitsune Ral <Kitsune-Ral@users.sf.net>
2019-09-19 11:50:16 +01:00
Hubert Chathi 10b6fd6c8e add more crypto magic, clarify things, add examples 2019-09-18 19:05:05 -04:00
Andrew Morgan bd64ffc442 Homeservers shouldn't proxy to user-provided identity servers anymore 2019-09-18 11:57:26 +01:00
Richard van der Hoff 5d6113db1e
Update the MSC template (#2296)
Tradeoffs->Alternatives, and kill the Conclusions section
2019-09-18 01:39:40 +01:00
Andrew Morgan 87d641c7c1 Describe what the IS and HS are doing in the examples 2019-09-17 17:20:57 +01:00
Andrew Morgan e50bb3df25 Mention that homeserver's should remember binds done through them 2019-09-17 17:04:40 +01:00
Andrew Morgan 53519f98d0 Pin a spec version when we link to it 2019-09-17 17:01:45 +01:00
Andrew Morgan 169174e00b Suggest the use of a unstable flag 2019-09-17 17:01:18 +01:00
Andrew Morgan 1e69a7f3f2 be assertive 2019-09-17 15:02:41 +01:00
Andrew Morgan 3eda9f7b28 Merge branch 'anoa/msc_separate_hs_api' of github.com:matrix-org/matrix-doc into anoa/msc_separate_hs_api 2019-09-17 12:13:01 +01:00
Andrew Morgan 0b67f34578 Address review comments 2019-09-17 12:10:32 +01:00
Andrew Morgan c57250b393
Apply suggestions from code review
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-09-17 11:48:50 +01:00
Andrew Morgan 2a55310754 Clarify why MSC2229 was made obselete 2019-09-17 11:43:56 +01:00
Andrew Morgan af2467606e parameter, not endpoint 2019-09-16 18:01:21 +01:00
Andrew Morgan 4bc005ac84 Remove threepid explanation 2019-09-16 16:27:16 +01:00
Andrew Morgan f06ba491fe Assign meaning to bind and add 2019-09-16 15:49:31 +01:00
Andrew Morgan f36ed9a271 typos 2019-09-16 15:26:07 +01:00
Andrew Morgan 7b656e9013
Update proposals/2290-separate-threepid-bind-hs.md
Co-Authored-By: Matthew Hodgson <matthew@matrix.org>
2019-09-16 15:24:43 +01:00
Andrew Morgan 196f27efb2
Update proposals/2290-separate-threepid-bind-hs.md
Co-Authored-By: Matthew Hodgson <matthew@matrix.org>
2019-09-16 15:22:05 +01:00
Andrew Morgan 1fc1e3c6ce run on sentence 2019-09-16 14:49:30 +01:00
Andrew Morgan 5b259bfb52 Fix homeserver binding example 2019-09-16 14:47:38 +01:00
Andrew Morgan cb7c072edb Two new endpoints instead of one 2019-09-16 14:42:21 +01:00
Andrew Morgan 5193c319e7 Cleaner API endpoints 2019-09-13 11:49:31 +01:00
Andrew Morgan f5b10c689f cleanup 2019-09-12 15:55:50 +01:00
Andrew Morgan 7096092da9 init 2019-09-12 13:52:52 +01:00
Travis Ralston c00fe02fd1
Merge pull request #1802 from matrix-org/babolivier/standardised-federation-response-format
MSC1802: Remove the '200' value from some federation responses
2019-09-10 17:08:02 -06:00
Hubert Chathi 8123c4ef0f additional clarification 2019-09-09 22:57:29 -04:00
Hubert Chathi cf953c47fd clarifications, change "hash" to "etag" 2019-09-09 17:29:32 -04:00
Hubert Chathi 60f0ad5b24 lowercase 2019-09-07 16:05:46 -04:00
Hubert Chathi 7644085274 wording fixes and clarifications 2019-09-07 16:03:11 -04:00
Travis Ralston 6baeb6c218 Assign number 2019-09-05 20:25:31 -06:00
Travis Ralston 738fa6833e Proposal to make the identity server optional during discovery 2019-09-05 20:24:17 -06:00
Brendan Abolivier 48e8c55138 Merge branch 'master' into babolivier/standardised-federation-response-format 2019-09-05 14:54:48 +01:00
Brendan Abolivier 620e5dd74d Merge branch 'babolivier/standardised-federation-response-format' of github.com:matrix-org/matrix-doc into babolivier/standardised-federation-response-format 2019-09-05 14:54:44 +01:00
Brendan Abolivier cb2b71c0be
Remove /send + rename 2019-09-05 14:54:31 +01:00
Brendan Abolivier fc26230007
Update proposals/1802-standardised-federation-response-format.md
Co-Authored-By: Matthew Hodgson <matthew@matrix.org>
2019-09-05 14:41:53 +01:00
Travis Ralston 185c564a13 Spec client-server IS unbind API
As per [MSC2140](https://github.com/matrix-org/matrix-doc/pull/2140)

Note: this modifies the endpoint in MSC2140 to be more in line with the remainder of the proposal.
2019-09-04 16:38:15 -06:00
Travis Ralston 2d784d93ef Merge branch 'master' into travis/spec/is-auth 2019-09-04 16:35:50 -06:00
Travis Ralston 675cabc33d
Merge pull request #2263 from matrix-org/travis/msc/id-server-optional
MSC2263: Give homeservers the ability to handle their own 3PID registrations/password resets
2019-09-04 11:11:42 -06:00
Brendan Abolivier 520c76a1cb
Spell out that the proposal also concerns homeservers 2019-09-02 13:56:01 +01:00
Brendan Abolivier 997360995c
Wording
Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
2019-09-02 13:41:49 +01:00
Brendan Abolivier bddadfeb18
Typo
Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
2019-09-02 13:41:33 +01:00
Brendan Abolivier 552f71a9f9
Wording
Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
2019-09-02 13:41:23 +01:00
Brendan Abolivier 524ec52f73
Wording
Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
2019-09-02 13:41:07 +01:00
Tulir Asokan b2ce6f87bc Merge branch 'master' into mass_redactions 2019-08-31 21:15:36 +03:00
Tulir Asokan 7ba4564ac3 Remove soft fail auth rule option
Signed-off-by: Tulir Asokan <tulir@maunium.net>
2019-08-31 21:04:42 +03:00
Matthew Hodgson a805d2b779 oops, premature merge 2019-08-31 16:04:55 +01:00
Matthew Hodgson 6d71a41e22 Proposal for ignoring invites 2019-08-31 16:01:04 +01:00
Tulir Asokan e6f85cacff Specify that "existing auth rules" means room v5 2019-08-31 00:53:08 +03:00
Travis Ralston b36fe24f1b Let's not doubly remove things 2019-08-30 08:27:44 -06:00
Brendan Abolivier 60354f8cf9
MSC number 2019-08-30 14:47:02 +01:00
Brendan Abolivier d1efd488b7
Proposal for mandating lowercasing when processing e-mail address localparts 2019-08-30 14:43:17 +01:00
Travis Ralston f8780e2395 add note about edit 2019-08-30 04:44:39 -06:00
Travis Ralston 1a6eb9a413
Update proposals/2263-homeserver-pw-resets.md
Co-Authored-By: J. Ryan Stinnett <jryans@gmail.com>
2019-08-29 15:19:12 -06:00
Travis Ralston 6d5e90b1d6
Apply suggestions from code review
Co-Authored-By: Matthew Hodgson <matthew@matrix.org>
2019-08-29 14:51:32 -06:00
Travis Ralston 16bb3bd8b5 Add an unstable feature flag to MSC2140 for clients to detect support 2019-08-29 13:59:48 -06:00
Travis Ralston 4e43024039 Assign number 2019-08-29 13:54:53 -06:00
Travis Ralston 1d6501b6ec What if we allowed homeservers to deal with their own business? 2019-08-29 13:51:38 -06:00
Tulir Asokan c909a7c423 Move omitting redacted_because into proposal and add security consideration
Signed-off-by: Tulir Asokan <tulir@maunium.net>
2019-08-29 21:18:02 +03:00
Travis Ralston ef5d3b9f30 Correct token reference in MSC2140 2019-08-28 15:46:58 -06:00
Tulir Asokan 79a5663ec3 Fix typos, inline links and move image into tree
Signed-off-by: Tulir Asokan <tulir@maunium.net>
2019-08-28 23:07:34 +03:00
Tulir Asokan 238b78bbaf Add potential issue with redacted_because field
Signed-off-by: Tulir Asokan <tulir@maunium.net>
2019-08-28 23:07:34 +03:00
Tulir Asokan cd75d0f220 Fix authenticity/authorization terminology
Co-authored-by: Kitsune Ral <Kitsune-Ral@users.sf.net>
Signed-off-by: Tulir Asokan <tulir@maunium.net>
2019-08-28 23:07:12 +03:00
Tulir Asokan 984e0af7b2 Re-word auth rule section on handling each target separately
Co-authored-by: Jason Volk <jason@zemos.net>
Signed-off-by: Tulir Asokan <tulir@maunium.net>
Signed-off-by: Jason Volk <jason@zemos.net>
2019-08-28 22:58:59 +03:00
Hubert Chathi 03ae5614b0 remove unnecessary space 2019-08-27 17:56:52 -07:00
Hubert Chathi e1b0042e7b clarifications, minor fixes, formatting 2019-08-27 17:46:45 -07:00
Hubert Chathi 9aade7291a make it agree with what we actually did with key requests 2019-08-27 16:21:00 -07:00
Hubert Chathi cafe49d36d some clarifications 2019-08-27 16:13:18 -07:00
Travis Ralston 356350de91
Merge pull request #2140 from matrix-org/dbkr/tos_2
MSC2140: Terms of Service for ISes and IMs
2019-08-26 13:48:45 -06:00
Travis Ralston 7a36016cbb
Merge pull request #2230 from matrix-org/dbkr/is_in_account_data
MSC2230: Store Identity Server in Account Data
2019-08-26 08:21:04 -06:00
Travis Ralston 0265817c56
Merge pull request #1957 from matrix-org/travis/msc/integrations/discovery
MSC1957: Integration manager discovery
2019-08-25 19:25:46 -06:00
Hubert Chathi 4e2fe124d2 wording fixes/clarifications 2019-08-25 18:22:23 -07:00
Travis Ralston 4ad9bf7059
Merge pull request #1961 from matrix-org/travis/msc/integrations/auth
MSC1961: Integration manager authentication APIs
2019-08-23 14:24:09 -06:00
Tulir Asokan ec38013daa Proposal to allow multiple targets for one redaction event
Signed-off-by: Tulir Asokan <tulir@maunium.net>
2019-08-23 23:07:57 +03:00
Travis Ralston b0f873785d Proposal for room version 6 2019-08-21 18:03:17 -06:00
Travis Ralston b6f0e8e8ed Clarify that the query string is because they are widgets 2019-08-21 17:50:18 -06:00
Travis Ralston 8b85fda52c Add a link to the widget MSC to try and stem questions 2019-08-21 17:47:55 -06:00
David Baker 4ea8f645d6 is_token -> id_access_token and add invite to proxy list 2019-08-21 18:13:50 +01:00
Travis Ralston 8ca50eaf9f
Merge pull request #2010 from Sorunome/soru/spoilers
MSC2010: Add client-side spoilers
2019-08-21 08:34:24 -06:00
David Baker 8bd9d7caeb
Add full stop
Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
2019-08-21 15:12:45 +01:00
David Baker 69315417b5
Typo
Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
2019-08-21 15:12:25 +01:00
David Baker 4073d940da
Typo
Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
2019-08-21 15:11:10 +01:00
David Baker 1f8cfd5729 Update migration mechanism 2019-08-21 14:19:20 +01:00
Travis Ralston 53a2ffb12a
Merge pull request #2197 from reivilibre/rei/msc_filter_over_fed
MSC2197: Search Filtering in Federation /publicRooms
2019-08-20 15:35:29 -06:00
Travis Ralston 788796e1c6 Multiple clarifications 2019-08-20 09:20:07 -06:00
David Baker 9b2ca3cdfe
typoes / clarifications
Co-Authored-By: Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
2019-08-20 16:19:15 +01:00
Travis Ralston 9e073e9647
Speeeeeeling
Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
2019-08-19 10:42:30 -06:00
Andrew Morgan 997c5466a8
MSC2229: Allowing 3PID Owners to Rebind (#2229) 2019-08-19 13:35:02 +01:00
David Baker 6d0067320c clarify error proxying 2019-08-19 13:31:44 +01:00
David Baker 12377fbf50
/account/logout not /logout
Co-Authored-By: Hubert Chathi <hubert@uhoreg.ca>
2019-08-19 11:53:41 +01:00
David Baker e4bdc283fd
Apply suggestions from code review
Typos / spelling

Co-Authored-By: Hubert Chathi <hubert@uhoreg.ca>
2019-08-19 11:45:46 +01:00
Olivier Wilkinson (reivilibre) 76f9196ff3 Address @richvdh's comments 2019-08-19 07:44:37 +01:00
Travis Ralston 865d3da0f8 General clarity improvements 2019-08-16 19:59:32 -06:00
Travis Ralston 22c9692684 Disclose origin story better 2019-08-16 19:53:28 -06:00
Travis Ralston 475c64de8c Disclose origin story 2019-08-16 19:52:35 -06:00
Andrew Morgan 4059661c29
Update proposals/2229-rebind-existing-3pid.md
Co-Authored-By: Kitsune Ral <Kitsune-Ral@users.sf.net>
2019-08-14 11:38:53 +01:00
Olivier Wilkinson (reivilibre) 4219e272ec Drop the hard SHOULD
Adopts @turt2live's phrasing

Signed-off-by: Olivier Wilkinson (reivilibre) <olivier@librepush.net>
2019-08-14 11:06:45 +01:00
Olivier Wilkinson (reivilibre) 7e85b9d56a Acknowledge other potential error responses for fallback
Signed-off-by: Olivier Wilkinson (reivilibre) <olivier@librepush.net>
2019-08-14 11:03:55 +01:00
Olivier Wilkinson (reivilibre) 97f856d706 Domain name is potentially personally-identifying
Thanks to @turt2live

Signed-off-by: Olivier Wilkinson (reivilibre) <olivier@librepush.net>
2019-08-14 11:00:03 +01:00
David Baker b9b984ae60 clarify 2019-08-14 09:52:13 +01:00
David Baker 229cb67b01
Apply suggestions from code review
Use fewer formal MUST etc in proposal

Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-08-14 09:51:27 +01:00
Andrew Morgan 7758e0701c Remove homeserver warning 2019-08-13 18:22:06 +01:00
David Baker 2c8d112089 assign number 2019-08-13 18:03:43 +01:00
Andrew Morgan 2e2a74a235 Merge branch 'anoa/rebind_3pids' of github.com:matrix-org/matrix-doc into anoa/rebind_3pids 2019-08-13 17:17:11 +01:00
Andrew Morgan 2547cc443c backticks 2019-08-13 17:17:06 +01:00
Andrew Morgan 01fc54faae
Update proposals/2229-rebind-existing-3pid.md
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-08-13 17:15:48 +01:00
Andrew Morgan 5b1ea4ffcb
Update proposals/2229-rebind-existing-3pid.md
Co-Authored-By: J. Ryan Stinnett <jryans@gmail.com>
2019-08-13 17:13:48 +01:00
Andrew Morgan cb1e3b8373 Take into account the 1 is case 2019-08-13 13:29:35 +01:00
Andrew Morgan f313b49c26 Add bind def. 2019-08-13 11:40:34 +01:00
Andrew Morgan be77b5823c fix up 2019-08-13 11:24:37 +01:00
Andrew Morgan 6ed0ae36ba rename msc # 2019-08-13 11:12:04 +01:00
Andrew Morgan ed4d805d2f flesh out 2019-08-13 11:11:22 +01:00
David Baker 6330fff5a4 Draft for IS URL in account data 2019-08-12 18:13:58 +01:00
Andrew Morgan 783fd78a6f wip 2019-08-12 17:13:37 +01:00
Richard van der Hoff 353b6cd198 clarification 2019-08-12 13:12:18 +01:00
Hubert Chathi 7ed5367516 clarifications, fix formatting 2019-08-10 14:14:30 -07:00
Olivier Wilkinson (reivilibre) 60cbc4567b Addresses some of Andrew's comments
Signed-off-by: Olivier Wilkinson (reivilibre) <olivier@librepush.net>
2019-08-09 11:21:39 +01:00
Travis Ralston a171d5f6fd Check for a state_key on the tombstone push rule
This is an oversight from the proposal.
2019-08-08 09:29:52 -06:00
Travis Ralston 3087c76452
Merge pull request #2134 from matrix-org/hs/hash-identity
MSC2134: Identity Hash Lookups
2019-08-07 19:48:36 -06:00
Olivier Wilkinson (reivilibre) 493bb062af MSC2197: update with privacy perspective
Includes recommendations for client developers.

Signed-off-by: Olivier Wilkinson (reivilibre) <olivier@librepush.net>
2019-08-05 09:50:24 +01:00
Travis Ralston a71757f1ee
Merge pull request #2174 from matrix-org/rav/proposals/move_redacts_key
MSC2174: Move the `redacts` key to a sane place
2019-08-03 11:01:28 -06:00
Luca Becker 25e3602bbe
3rd draft of MSC2209 2019-08-03 09:15:32 +02:00
Andrew Morgan 3edf5e3c16 Make hashes real values 2019-08-02 11:25:28 +01:00
Luca Becker 42dbeee7d3 MSC2209: 2nd draft @uhoregs changes 2019-08-01 18:36:19 +02:00
Luca Becker ec37fe4427 first draft of MSC2209 2019-08-01 16:23:26 +02:00
Andrew Morgan 96e06b6f5f Add line, britishise 2019-08-01 15:04:38 +01:00
Andrew Morgan 3877724774 fix speeling 2019-08-01 15:01:05 +01:00
Andrew Morgan c401a4d47b punctuation 2019-08-01 14:53:41 +01:00
Andrew Morgan acf8d34474 Merge branch 'hs/hash-identity' of github.com:matrix-org/matrix-doc into hs/hash-identity 2019-08-01 14:51:42 +01:00
Andrew Morgan 3789d828fd Incorporate solution analysis from the context of attacks 2019-08-01 14:51:26 +01:00
Olivier Wilkinson (reivilibre) 36e43ee326 Rewrap lines in MSC2917 to 80 chars wide
Signed-off-by: Olivier Wilkinson (reivilibre) <olivier@librepush.net>
2019-08-01 09:28:30 +01:00
Hubert Chathi 80adbaff4c switch to MSC1946 for storing recovery key 2019-07-31 16:38:20 -04:00
Hubert Chathi 825757ffd8 add information about verifying backup by entering key 2019-07-31 16:37:54 -04:00
Hubert Chathi bd9efcdf53 add some information and an example 2019-07-31 16:22:24 -04:00
Hubert Chathi d47e13c6d9 this FIXME will be addressed in the key backup MSC 2019-07-31 16:20:55 -04:00
Hubert Chathi 395d40314b fix typos and make valid JSON 2019-07-31 16:20:39 -04:00
Andrew Morgan f989263872
MSC2181: Add an Error Code for Signaling a Deactivated User (#2181) 2019-07-31 13:14:02 +01:00
Richard van der Hoff 0c7c48bd12 MSC2175: Remove the creator field from m.room.create events (#2175)
Fixes #1193
2019-07-31 13:13:38 +01:00
Andrew Morgan 33d22c3320 hashes are not stream ciphers 2019-07-31 11:47:03 +01:00
Andrew Morgan 9913f5bc29 Slightly clarify pepper value 2019-07-31 11:16:58 +01:00
Andrew Morgan 57de107ea9 Move medium back behind the address 2019-07-31 11:07:22 +01:00
Richard van der Hoff f1f293678b
Apply suggestions from code review
Co-Authored-By: Travis Ralston <travpc@gmail.com>
Co-Authored-By: Kitsune Ral <Kitsune-Ral@users.sf.net>
2019-07-30 08:00:48 +01:00
Olivier Wilkinson (reivilibre) 4c22eb86b5 MSC for Search Filtering in Federation /publicRooms
Signed-off-by: Olivier Wilkinson (reivilibre) <olivier@librepush.net>
2019-07-29 16:30:25 +01:00
Andrew Morgan c8527b7af8 Merge branch 'hs/hash-identity' of github.com:matrix-org/matrix-doc into hs/hash-identity 2019-07-26 12:05:49 +01:00
Andrew Morgan 4d1f2ea4f4
Apply suggestions from code review
Co-Authored-By: Hubert Chathi <hubert@uhoreg.ca>
2019-07-26 12:05:41 +01:00
Andrew Morgan 6660768d85 Don't repeat fast hash bit 2019-07-26 12:04:17 +01:00
Andrew Morgan 027c2d7260 Merge branch 'hs/hash-identity' of github.com:matrix-org/matrix-doc into hs/hash-identity 2019-07-26 12:01:32 +01:00
Andrew Morgan a17c74f592 switch medium and address around, space between address and pepper 2019-07-26 12:00:53 +01:00
Andrew Morgan 5580a2a1a9
Update proposals/2134-identity-hash-lookup.md
Co-Authored-By: Hubert Chathi <hubert@uhoreg.ca>
2019-07-26 11:40:38 +01:00
Andrew Morgan ffbfde8a09
Update proposals/2134-identity-hash-lookup.md
Co-Authored-By: Hubert Chathi <hubert@uhoreg.ca>
2019-07-26 11:40:20 +01:00
Andrew Morgan 87a54e8d8d Merge branch 'hs/hash-identity' of github.com:matrix-org/matrix-doc into hs/hash-identity 2019-07-25 19:06:07 +01:00
Andrew Morgan 6119b9a50d *@hobnobbob.com is unlikely to be guessed 2019-07-25 19:05:49 +01:00
Andrew Morgan 20c72a3649
Update proposals/2134-identity-hash-lookup.md
Co-Authored-By: David Baker <dbkr@users.noreply.github.com>
2019-07-25 18:56:17 +01:00
Andrew Morgan 0ac70b268a Clarify peppering should not happen on none algo 2019-07-25 18:55:57 +01:00
Andrew Morgan da876bb340 missing word 2019-07-25 18:54:02 +01:00
Andrew Morgan c6dd5951a1 Clients can cache the hash details if they want to 2019-07-25 18:53:32 +01:00
Andrew Morgan 8f3e588708 pepper is not a secret val. Still needs to be around. 2019-07-24 15:27:48 +01:00
Andrew Morgan 3b8c57e06c Don't require servers/clients to support "none" 2019-07-23 16:43:55 +01:00
Andrew Morgan 3031df79cc Add example for none algo 2019-07-23 16:33:24 +01:00
Andrew Morgan 9fd6bd3184 Add details about why this proposal should exist 2019-07-23 15:25:41 +01:00
Andrew Morgan b26a9ed1fd Expand on why we can't trust dirty homeservers 2019-07-23 13:28:42 +01:00
Andrew Morgan 577021f12b resolve some comments 2019-07-23 11:48:01 +01:00
Richard van der Hoff 9e264fedc9 Updates
* preserve *all* of `create`
* don't preserve `notifications` or `algorithm`, and add some justifcation.
2019-07-22 16:47:49 +01:00
Andrew Morgan 887cd5e7d0 I really hope someone doesn't invest none-hash 2019-07-22 16:00:29 +01:00
Andrew Morgan 0444c8016b review comments 2019-07-22 15:33:49 +01:00
Richard van der Hoff 4503327450 Add some compatibility hacks. 2019-07-22 15:17:52 +01:00
Alexander "Ace" Olofsson 99bd46c9e7
Allow the use of the HTML <details> tag
Signed-off-by: Alexander Olofsson <ace@haxalot.com>
2019-07-16 22:00:24 +02:00
Richard van der Hoff d324cac847 preserve powerlevel 2019-07-16 19:32:34 +01:00
Richard van der Hoff b49a950245
Update proposals/2176-update-redaction-rules.md
fix typo

Co-Authored-By: Kitsune Ral <Kitsune-Ral@users.sf.net>
2019-07-16 19:26:02 +01:00
Sorunome 9ebcff5758
fix typo, add section on html details element 2019-07-16 17:11:07 +02:00
Andrew Morgan 36cb8ed894 none -> m.none 2019-07-16 10:44:02 +01:00
Sorunome 1f786ae6dc
commit image into repo, fix typo 2019-07-15 20:52:24 +02:00
David Baker d9269b084f Exclude pubkey endpoints from auth 2019-07-15 16:58:24 +01:00
David Baker a1de6ff634 Hopefully clarify some bits 2019-07-15 10:26:24 +01:00
Richard van der Hoff cd5549d483 Proposal to update the redaction algorithm 2019-07-14 22:50:46 +01:00
Richard van der Hoff b09d48a9f7 Spec link 2019-07-14 20:22:39 +01:00
Richard van der Hoff 78d46b2890 Proposal to move the redacts key to a sane place 2019-07-14 20:20:09 +01:00
David Baker 25a47afa32
unnecessary capital mk. 2
Co-Authored-By: J. Ryan Stinnett <jryans@gmail.com>
2019-07-12 11:55:40 +01:00
David Baker 6e061b1baf
unnecessary capital
Co-Authored-By: J. Ryan Stinnett <jryans@gmail.com>
2019-07-12 11:55:11 +01:00
David Baker f474b31f5f
typo
Co-Authored-By: J. Ryan Stinnett <jryans@gmail.com>
2019-07-12 11:54:45 +01:00
Andrew Morgan 3514437d24 Ability for client/server to decide on no hashing 2019-07-12 11:37:41 +01:00
David Baker 9bb6ad80d1 typo 2019-07-10 16:13:38 +01:00
Andrew Morgan ed67e26037 pepper must not be an empty string, append medium 2019-07-08 17:03:20 +01:00
Andrew Morgan 1963a24832 fix attacks paragraph 2019-07-08 13:27:38 +01:00
Andrew Morgan dd8a6549c9 Address review comments 2019-07-08 11:55:37 +01:00
David Baker 701d340da1 Remove exception for request/submitToken 2019-07-05 19:00:15 +01:00
David Baker bf8a1e5d5f Add way to get the HS to bind/unbind existing 3pids 2019-07-05 18:11:42 +01:00
Andrew Morgan 3702669424 update from comments 2019-07-05 15:59:29 +01:00
David Baker 30dcc28f9b try & clarify that HS signature isn't the only acceptable auth for unbind 2019-07-04 18:38:31 +01:00
Andrew Morgan f4a1e02884 simple method once more 2019-07-04 16:28:49 +01:00
Hubert Chathi 4d31ddc8c9 additions and clarifications
- indicate how to use MSC 1946 to store/share private keys
- add signing by devices to enable migrating from device verifications
- add information about signature upload failures and M_INVALID_SIGNATURE code
- add security consideration
2019-07-03 15:09:06 -04:00
Andrew Morgan 53bd384f2e Clarify salting 2019-07-03 09:59:38 +01:00
Hubert Chathi 3aaf181db2 rename some things and add clarification 2019-07-02 14:05:06 -04:00
David Baker 1a669348d8 http status code 2019-07-02 11:27:46 +01:00
David Baker d15c9df115
fullstop
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 11:25:26 +01:00
David Baker e28f7aad72
slash
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 11:25:12 +01:00
David Baker 4c72c37b80
slash
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 11:24:51 +01:00
David Baker 10858bf83b set account data after registration 2019-07-02 11:22:41 +01:00
David Baker 79dbad2914 remove acceptance token mention 2019-07-02 11:17:27 +01:00
David Baker ac6b9bdb7c s/deprecate/remove/ 2019-07-02 11:16:25 +01:00
David Baker 7f65364804
Typo
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 11:13:12 +01:00
David Baker 03e6ab0103 re-word double openid 2019-07-02 11:11:50 +01:00
David Baker d00dfb7822 exclude submittoken too 2019-07-02 11:04:06 +01:00
David Baker f02e4c2e9c
both registers are excluded from auth
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 11:00:39 +01:00
David Baker 5374030cc0 Drop application/x-form-www-urlencoded in v2 2019-07-02 10:59:08 +01:00
David Baker 2d11217d4e
Typo
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 10:56:32 +01:00
David Baker 8af35be13f
Typo
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-07-02 10:56:12 +01:00
Andrew Morgan 922a20ba26 small fixes 2019-07-01 16:30:07 +01:00
Andrew Morgan 6f81d3774b New hashing method 2019-07-01 16:23:28 +01:00
David Baker fe14d3c9f0 Spec terms response 2019-06-28 18:07:24 +01:00
David Baker 786d5bc281 rewrite UI auth tradeoffs 2019-06-28 10:25:24 +01:00
David Baker 45d630951c back to M_TERMS_NOT_SIGNED 2019-06-28 09:32:15 +01:00
David Baker 83bb3861ba line wrap 2019-06-28 09:31:53 +01:00
Travis Ralston 8897ea4bb1 Merge branch 'master' into travis/msc/integrations/discovery 2019-06-27 21:56:23 -06:00
Travis Ralston a2a7b7ff13 Merge branch 'master' into travis/msc/integrations/auth 2019-06-27 21:55:59 -06:00
Travis Ralston bfd8e52c23 Formatting 2019-06-27 20:45:23 -06:00
Travis Ralston d8283b9cdf Add option to use query string 2019-06-27 20:44:49 -06:00
Travis Ralston e80753e56c Add .well-known discovery 2019-06-27 18:24:42 -06:00
David Baker 4be283ccb3
Typing
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-06-27 17:31:15 +01:00
David Baker f95197b422 make the many-anded sentence a list 2019-06-27 17:30:36 +01:00
David Baker 10a6a59a12 Deprecate bind_email / bind_msisdn 2019-06-27 16:58:22 +01:00
David Baker b5326de1c4 Exclude requestToken endpoints from auth requirement 2019-06-27 16:34:46 +01:00
Sorunome 540aab82a1
accidentally formatted the wrong entry 2019-06-27 13:09:15 +02:00
Sorunome 6260871a21
spoiler fallback to uploaded media 2019-06-27 13:07:08 +02:00
David Baker 21b9eaf8de No custom HTTP headers
Use the obvious way: in the same place as the ID server address
2019-06-26 17:56:41 +01:00
David Baker 2694bb1090 Add really horrible custom HTTP header
for giving the IS token to the HS
2019-06-26 17:41:21 +01:00
David Baker 58cf083a6a backwards compat 2019-06-26 15:31:11 +01:00
David Baker 6273868323 Clarify v1 API deprecation 2019-06-26 15:29:24 +01:00
David Baker 4edf826c93 Capitalise on our identifiers 2019-06-26 15:29:23 +01:00
David Baker ba7047ce77
Clarify we must be accepting HS auth
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-06-26 14:51:11 +01:00
David Baker 1d75828c71 Clarify what to do if no (new) docs 2019-06-26 14:45:25 +01:00
David Baker af691b5a8a
Clarify this applies to 2134
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-06-26 14:37:06 +01:00
David Baker 57094276ce
Typing hard is
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-06-26 14:36:15 +01:00
Andrew Morgan 7549c5dd76 Merge branch 'hs/hash-identity' of github.com:matrix-org/matrix-doc into hs/hash-identity 2019-06-26 10:57:07 +01:00
Andrew Morgan 0fd4fe2542 Add algo/pepper to err resp 2019-06-26 10:55:44 +01:00
Andrew Morgan dfb37fcce1 update with feedback 2019-06-25 18:55:18 +01:00
Andrew Morgan df88b13ce1
Update proposals/2134-identity-hash-lookup.md
Co-Authored-By: Hubert Chathi <hubert@uhoreg.ca>
2019-06-25 18:15:02 +01:00
David Baker 9e0d8b9cb2 Use M_CONSENT_NOT_GIVEN
No idea where I got the other one from: we already have one in the
spec, so use it.
2019-06-25 17:17:39 +01:00
David Baker 0dae2d5812 GET terms must be unauthed.
Detail process for new auth (don't register until consent given).

Specifically mention the authentication header.
2019-06-25 15:52:55 +01:00
Sorunome 4f83cc1c24
moved client spoiler conversion to potential issues 2019-06-25 16:19:29 +02:00
David Baker 6f374dc981 Re-write for OpenID auth 2019-06-25 14:58:15 +01:00
David Baker 2c09580e27 line wrap 2019-06-25 11:14:35 +01:00
Andrew Morgan 96e43aaf45 Define what characters lookup_pepper can consist of 2019-06-25 10:37:45 +01:00
Andrew Morgan f951f312e1 Fix terrible wording 2019-06-25 10:30:29 +01:00
Andrew Morgan fae6883cc0 Update with review comments 2019-06-25 10:18:11 +01:00
Andrew Morgan 0a4c83ddb9 no plural. 3pid -> 3PID 2019-06-24 17:54:23 +01:00
Andrew Morgan 36a35a33cc Clarify how the spec defines hashing algs 2019-06-24 16:59:58 +01:00
Andrew Morgan ee10576d60 Update with feedback 2019-06-24 15:43:19 +01:00
David Baker abb407145a HS docs must be added too
also, unbind must not error when called by HSes and proxy terms token
2019-06-24 15:30:19 +01:00
David Baker 8ae47557c9 s/Third Party/Accepted/ 2019-06-24 15:22:19 +01:00
David Baker 2555801458 m.third_party_terms -> m.accepted_terms
as it will have the HS's terms too
2019-06-24 14:56:48 +01:00
David Baker 4ba9b2a599 perfix 2019-06-24 13:18:41 +01:00
David Baker a63e4420eb
Linkify
Co-Authored-By: Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
2019-06-24 13:17:58 +01:00
Andrew Morgan 02ac0f3b33 Give the user control! 2019-06-24 11:56:04 +01:00
Andrew Morgan acdb2b1b42 Merge branch 'hs/hash-identity' of github.com:matrix-org/matrix-doc into hs/hash-identity 2019-06-24 11:47:53 +01:00
Andrew Morgan e3ff80291f http err codes and hash wording fixes 2019-06-24 11:47:00 +01:00
Travis Ralston 21e93a123e Naming and capitalization 2019-06-21 11:36:16 -06:00
Andrew Morgan 53f025edfc Specify optional pepper rotation period 2019-06-21 15:42:11 +01:00
Andrew Morgan 2383a55720 404 for deprecated endpoint 2019-06-21 15:40:26 +01:00
Andrew Morgan c63edc7b97 Clean up wording around peppers and hashes 2019-06-21 14:12:50 +01:00
Andrew Morgan e3b2ad38b5 pepper -> lookup_pepper 2019-06-21 12:17:01 +01:00
Andrew Morgan 1fea604ba9 Don't define error message 2019-06-21 11:32:23 +01:00
David Baker 9ca3ccc81c Add requirments section for de-duping between services. 2019-06-21 09:35:26 +01:00
David Baker d4ca0c237a Specify ID grammar and add comma 2019-06-21 09:25:16 +01:00
David Baker 276e2b6843
Typo
Co-Authored-By: Travis Ralston <travpc@gmail.com>
2019-06-21 09:14:24 +01:00
David Baker cf48030d1f One more tradeoff 2019-06-20 17:48:21 +01:00
David Baker 32c7fc638d you have a number now 2019-06-20 17:44:28 +01:00
David Baker 23af87e9fc Proposal for IS & IM TOS API 2019-06-20 17:41:19 +01:00
Andrew Morgan 1343e19a6d Specify hash algorithm and fallback considerations 2019-06-20 14:36:47 +01:00
Andrew Morgan f28476f0f3 line wrap and fix wording 2019-06-19 16:29:24 +01:00
Andrew Morgan 3ee27d3818 salt->pepper. 1 pepper/is. add multi-hash idea 2019-06-19 15:14:30 +01:00
Andrew Morgan f41ed02c9e remove sec concerns 2019-06-18 17:22:30 +01:00
Andrew Morgan 6bb4a9e911 Add per-is salt consideration 2019-06-18 17:09:06 +01:00
Andrew Morgan 5049e552e7 Drop /api from the new endpoint 2019-06-18 17:05:46 +01:00
Andrew Morgan bc9b6c3659 Add salt to example and signal link 2019-06-18 17:03:49 +01:00
Andrew Morgan 063b9f60e0 Require a salt to defend against rainbow tables 2019-06-18 16:50:47 +01:00
Andrew Morgan d2b47a585d Allow for changing the hashing algo and add at-rest details 2019-06-18 16:37:02 +01:00
Will Hunt f8dbf2b360
Update proposals/2134-identity-hash-lookup.md
Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
2019-06-17 13:17:57 +01:00
Will Hunt 12431f1a4e Base64 potential issue 2019-06-15 13:29:59 +01:00
Will Hunt 8b92df74ab s/medium/address 2019-06-15 13:25:42 +01:00
Will Hunt a8c26d208b Wrap 2019-06-15 12:43:20 +01:00
Will Hunt 3eff76b00a MSC 2134 2019-06-15 12:37:40 +01:00
Sorunome 26349417ba
update spoiler render idea 2019-06-11 21:13:16 +02:00
Travis Ralston fc1d8f184d
Merge pull request #2078 from matrix-org/anoa/msc2078
MSC2078: Sending Third-Party Request Tokens via the Homeserver
2019-06-10 14:25:35 -06:00
Travis Ralston 65c3935419
Merge pull request #2076 from matrix-org/rav/proposal/enforce_key_validity_periods
MSC2076: Enforce key-validity periods when validating event signatures
2019-06-10 07:25:09 -06:00
Travis Ralston 19575eb4d4
Merge pull request #2077 from matrix-org/rav/proposal/room_v5
MSC2077: room v5
2019-06-10 07:24:41 -06:00
Matthew Hodgson 950415c72a
Merge branch 'master' into matthew/msc1779 2019-06-07 19:19:19 +01:00
Matthew Hodgson be568ba9ab link to the legalified version of MSC1779 2019-06-07 19:10:26 +01:00
Travis Ralston 9cf03325b9
Merge pull request #2046 from matrix-org/travis/1.0/msc1915-unbind
Spec 3PID unbind API
2019-06-07 07:33:33 -06:00
Andrew Morgan 45e271c0f7 be super explicit 2019-06-07 13:29:22 +01:00
Andrew Morgan 7f65704ebc Update wording and answer review comments 2019-06-07 12:45:11 +01:00
Andrew Morgan 3e23dde341 Be clear that any 3PID token request can now be done by the hs 2019-06-05 21:49:02 +01:00
Andrew Morgan 9000247008 Merge branch 'anoa/msc2078' of github.com:matrix-org/matrix-doc into anoa/msc2078
* 'anoa/msc2078' of github.com:matrix-org/matrix-doc:
  Update proposals/2078-homeserver-password-resets.md
2019-06-05 17:54:27 +01:00
Andrew Morgan d3f21e0360 Address review comments 2019-06-05 17:54:18 +01:00
Andrew Morgan e49518099d Be explicit with request/responses 2019-06-05 17:37:09 +01:00
Andrew Morgan 395acf8e06
Update proposals/2078-homeserver-password-resets.md
Co-Authored-By: Hubert Chathi <hubert@uhoreg.ca>
2019-06-05 15:58:14 +01:00
Andrew Morgan 6bb48723e8 The HS can send any URL 2019-06-05 15:43:57 +01:00
Andrew Morgan 6e0af5e64c If no submit_url, just send it to the IS as before 2019-06-05 15:07:06 +01:00
Andrew Morgan 4174b61279 submit_url only if the user has to enter the code somewhere 2019-06-05 14:50:40 +01:00
Andrew Morgan 8259ae292a Capitalise SMS 2019-06-05 14:39:36 +01:00
Andrew Morgan 7e18c5d5a8 Add new submit_url response field 2019-06-05 14:38:16 +01:00
Andrew Morgan 8cba7adcdf Clarify conditions for attack 2019-06-05 13:52:02 +01:00
Andrew Morgan 085c5667a4 wrap lines 2019-06-05 13:42:23 +01:00
Andrew Morgan 1956f1a916 Revert "Remove attacker bit"
This reverts commit c9711acbc5.
2019-06-05 12:59:58 +01:00
Andrew Morgan c9711acbc5 Remove attacker bit 2019-06-05 12:52:01 +01:00
Andrew Morgan 4e692735f5 Update some wording 2019-06-05 11:25:26 +01:00
Andrew Morgan cf932ad4f8 msc2078 - proposal for homeservers sending passwords reset requests 2019-06-05 11:20:28 +01:00
Richard van der Hoff 40b10f254b clarifications 2019-06-05 07:18:25 +01:00
Richard van der Hoff 3347a480eb fix typo 2019-06-05 00:07:05 +01:00
Richard van der Hoff d2ccd6b268 MSC2077: room v5 2019-06-04 23:53:42 +01:00
Richard van der Hoff 37b1e171fc MSC2076: Enforce key-validity periods when validating event signatures 2019-06-04 23:51:10 +01:00
Travis Ralston b92b147797
Merge pull request #1719 from uhoreg/olm_unwedging
MSC1719: olm session unwedging
2019-06-04 11:14:15 -06:00
Hubert Chathi fee2ebf682
fix typo
Co-Authored-By: Shamil K <me@noteness.in>
2019-06-02 16:09:47 -04:00
Travis Ralston dda7afa845
Merge pull request #1717 from uhoreg/e2e_verification
MSC1717: common definitions for key verification methods
2019-06-02 10:45:39 -06:00
Hubert Chathi da5ce919f2 add sharing secrets, and a bunch of cleanups 2019-05-31 12:16:59 -04:00
Hubert Chathi 6929579360 add some clarifications 2019-05-29 15:18:54 -04:00
Hubert Chathi ffb70a2fab
fix typo
Co-Authored-By: Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
2019-05-29 15:01:35 -04:00
Hubert Chathi 84f0d9d7e4 add clarification 2019-05-28 20:07:45 -04:00
Travis Ralston 0463084924 Spec 3PID unbind API
As per [MSC1915](https://github.com/matrix-org/matrix-doc/pull/1915)

Implementation proof: 
* https://github.com/matrix-org/synapse/pull/4982
* https://github.com/matrix-org/sydent/pull/160

The only alteration made which differs from the proposal is clarity on how to handle homeservers not knowing the `id_server`. All other differences are unintentional.
2019-05-28 15:05:41 -06:00
Travis Ralston f4ff8e5467 Clarify where the field appears 2019-05-27 12:20:26 -06:00
Travis Ralston df51acd7ae Proposal for adding a device_id to /account/whoami 2019-05-27 12:14:21 -06:00
Hubert Chathi ac08c84612
remove duplicate consideration
Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
2019-05-23 14:39:46 -04:00
Hubert Chathi dd74baa5d0 clarify wording 2019-05-22 12:54:01 -04:00
Hubert Chathi d39baba21b add a security note 2019-05-22 12:44:04 -04:00
Hubert Chathi 7705006260 1 hour seems to be fine 2019-05-22 12:43:43 -04:00
Sorunome 273af2a2e0
wrap long lines 2019-05-22 17:30:18 +02:00
Sorunome 6f3bcb56d3
add rendering idea 2019-05-22 15:35:32 +02:00
Sorunome ebb1351a9f
linebreak consistency 2019-05-22 15:22:22 +02:00
Sorunome d750115fdc
fix up some things 2019-05-22 15:20:30 +02:00
Sorunome 70d3fd809e
add spoiler msc 2019-05-22 14:46:31 +02:00
Hubert Chathi 7bad359b0d switch to the 3-key system, and some wording improvements 2019-05-21 13:57:55 -04:00
Matthew Hodgson 37871106c6 MSC2002: Proposal for adopting MSC1884 as v4 rooms (#2002) 2019-05-21 16:21:46 +01:00
Brendan Abolivier e71b3ac754 Add details to what an unrecognised request is 2019-05-01 16:53:29 +01:00
Travis Ralston 62748a026d
Rename 0000-leave-reasons.md to 1983-leave-reasons.md 2019-04-30 15:14:54 -06:00
Travis Ralston 97786da4ad
Create 0000-leave-reasons.md 2019-04-30 15:13:28 -06:00
Brendan Abolivier c1721cb6f7 Merge branch 'master' into babolivier/standardised-federation-response-format 2019-04-29 10:25:39 +01:00
Brendan Abolivier 661d69858e Add fallback 2019-04-29 10:24:46 +01:00
Richard van der Hoff 2ae122903f
Use the right name
Co-Authored-By: uhoreg <hubert@uhoreg.ca>
2019-04-25 20:49:58 -04:00
Andrew Morgan c230c2fd2f
Merge pull request #1967 from aqtusia/master
Replace /bind with /3pid/bind
2019-04-25 13:30:10 -07:00
Andrew Morgan 5792e5f4de
Merge pull request #1954 from matrix-org/neilj/Remove-prev_content-from-the-essential-keys-list2
MSC1954: Proposal to remove prev_content from the essential keys list
2019-04-21 02:00:18 -07:00
Neil Johnson 911fb94ea0
typos 2019-04-15 17:08:09 +01:00
aqtusia 2eb9708f7f
Replace /unbind with /3pid/unbind 2019-04-14 18:21:59 +02:00
Neil Johnson b41fbc86b6 add further potential issues and security concerns 2019-04-09 13:56:45 +01:00
Travis Ralston 0bab70c14e Assign MSC number 2019-04-08 21:37:35 -06:00
Travis Ralston d6d0f9780d Proposal for basic integration manager authentication APIs 2019-04-08 21:36:16 -06:00
Travis Ralston bd0211be12 Assign MSC number 2019-04-08 21:24:57 -06:00
Travis Ralston e8de1423b1 Proposal for OpenID information exchange with widgets 2019-04-08 21:22:55 -06:00
Travis Ralston b12e92440e
Merge pull request #1930 from matrix-org/travis/msc/tombstone-notif
MSC1930: Add a push rule for m.room.tombstone events
2019-04-08 11:25:52 -06:00
Travis Ralston cecf75c9a9
Merge pull request #1884 from matrix-org/rav/proposal/no_slash_in_event_id
MSC1884: Proposal to replace slashes in event IDs
2019-04-08 11:25:26 -06:00
J. Ryan Stinnett 13d63685d3
Spelling
Co-Authored-By: turt2live <travpc@gmail.com>
2019-04-08 07:05:38 -06:00
Travis Ralston 2dcda7d564 Add a mention that clients should re-query .well-known 2019-04-07 21:17:14 -06:00
Travis Ralston dffe19bb76 Rename file to match MSC number 2019-04-07 21:07:46 -06:00
Travis Ralston cc10444d4b Assign MSC number 2019-04-07 21:06:42 -06:00
Travis Ralston 29a9982447 Proposal for integration manager discovery 2019-04-07 21:05:59 -06:00
Travis Ralston 99cd064f26 Update original MSC as per proposal guidelines 2019-04-05 16:37:27 -06:00
Neil Johnson 743eeca27a MSC to remove prev_content from the essential keys list 2019-04-05 15:19:22 +01:00
Matthew Hodgson efcbf2f807
Merge branch 'master' into matthew/msc1779 2019-04-03 00:36:23 +01:00
Matthew Hodgson 88f533f0db incorporate further feedback 2019-04-01 10:27:30 +01:00
Matthew Hodgson 417f3a3e8b incorporate further feedback from vdh 2019-04-01 00:58:10 +01:00
Hubert Chathi 9dcf2d6a28
Update proposals/1884-replace-slashes-in-event_ids.md
Co-Authored-By: ara4n <matthew@arasphere.net>
2019-04-01 00:43:31 +01:00
Matthew Hodgson 207d6cf851 update MSC1884 to reflect new conclusions following discussion on the PR 2019-03-30 13:12:18 +00:00
Hubert Chathi 979827bad3 rename to match MSC number 2019-03-27 21:57:13 -04:00
Hubert Chathi 63c6d030fd draft of secure server-side storage 2019-03-27 21:48:12 -04:00
Hubert Chathi 4e95f8062a add examples for federation endpoints 2019-03-26 16:51:46 -04:00
Hubert Chathi 696e568fb2 add some clarifications 2019-03-26 15:10:14 -04:00
David Baker 410a5dbbff
Update proposals/1915-unbind-identity-server-param.md
Co-Authored-By: erikjohnston <erikj@jki.re>
2019-03-18 09:36:01 +00:00
Erik Johnston bd4fab7a15 Be more explicit identity server selection and errors 2019-03-18 09:28:46 +00:00
Travis Ralston 0e07a6d243 Proposal to have a push rule for m.room.tombstone events 2019-03-15 13:32:38 -06:00
Richard van der Hoff 1c4262e556
Apply suggestions from code review
Co-Authored-By: uhoreg <hubert@uhoreg.ca>
2019-03-15 13:40:44 -04:00
Richard van der Hoff 87824c1c96
Update proposals/1219-storing-megolm-keys-serverside.md
Co-Authored-By: uhoreg <hubert@uhoreg.ca>
2019-03-15 13:38:19 -04:00
Hubert Chathi 1749a91344 make MSC mentions into links 2019-03-13 23:41:43 -04:00
Hubert Chathi 4842a718d8 fill in some of the other sections 2019-03-13 23:39:00 -04:00
Hubert Chathi f9a00fc943 clarify that not understanding a verification method should not auto-cancel 2019-03-13 23:25:11 -04:00
Erik Johnston 60f1cf79de Update wording and add deactivate account API 2019-03-12 14:30:16 +00:00
David Baker 77110b46df
Update proposals/1915-unbind-identity-server-param.md
Co-Authored-By: erikjohnston <erikj@jki.re>
2019-03-08 12:14:08 +00:00
Erik Johnston ee6513d608 Add alternative sid/client_secret authentication 2019-03-07 16:52:58 +00:00
Erik Johnston f92925ed45 Add a 3PID unbind API 2019-03-06 11:32:28 +00:00
Richard van der Hoff 82258fc0fc Proposal for changing event ids. Again. 2019-02-13 23:11:14 +00:00
Hubert Chathi ca7aa8b0ba fill in more details, including federation bits 2019-02-12 20:12:17 -05:00
Erik Johnston 7eb8b5d7f3 Add proposal for invite error code 2019-02-08 14:36:12 +00:00
manuroe 0051c6a377 Key backup: Return {hash, count} for key upload requests
This is this tuple that allows the client to check if it has locally all keys of the backup
2019-02-07 23:32:29 -05:00
manuroe 7cde3193e5 Key backup: Explain hash better 2019-02-07 23:32:29 -05:00
manuroe 82ff866b58 Key backup: Add hash to represent stored keys
so that a matrix client A can check it is synchronised with the backup.
If not, that means that another client B has pushed keys client A does not have locally. Client A should then propose to the end user to retrieve  keys from the backup.
2019-02-07 23:32:29 -05:00
manuroe ed945d6744 Key backup: Expose the number of keys stored in the backup
so that matrix clients can compare it with the number of keys they have locally.
2019-02-07 23:32:29 -05:00
Hubert Chathi e7f7926023 add algorithm and version to the example
since they're marked as required
2019-02-07 23:30:01 -05:00
manuroe d43b595b5e Key backup: Fix PR remarks on PUT /room_keys/version/{version} 2019-02-07 23:30:01 -05:00
manuroe 2099308d4c Key backup: add PUT /room_keys/version/{version} to allow matrix clients to add signatures to an existing backup 2019-02-07 23:30:01 -05:00
manuroe e02b345c62 Revert "Key backup: add PUT /room_keys/version/{version} to allow matrix clients to add signatures to an existing backup"
This reverts commit c9b38cbe53.
2019-02-06 11:45:11 +01:00
manuroe c9b38cbe53 Key backup: add PUT /room_keys/version/{version} to allow matrix clients to add signatures to an existing backup 2019-02-06 11:37:19 +01:00
Travis Ralston f5134b2d8b
Merge pull request #1819 from matrix-org/neilj/msc-remove-presence-lists
MSC:1819 Remove Presence Lists
2019-02-01 12:00:42 -07:00
Travis Ralston 1cf9086c26
Merge pull request #1831 from matrix-org/travis/msc/wk-before-srv
MSC1831: Change the order of .well-known and SRV discovery techniques
2019-02-01 11:52:59 -07:00
Travis Ralston 41e50d553e
Merge pull request #1830 from matrix-org/travis/spec/x509-wk
Specify .well-known s2s discovery and X.509 validation
2019-02-01 08:36:55 -07:00
Travis Ralston 6421582bf2 Clarifications and alter the error handling of .well-known
Note that MSC1831 changes the order, so the changes to MSC1708 might not make sense when combining all the proposals together. However, independently the change should make sense.
2019-02-01 08:18:12 -07:00
Travis Ralston 00de03bddb Merge remote-tracking branch 'origin/travis/msc/wk-before-srv' into travis/msc/wk-before-srv 2019-01-31 10:53:22 -07:00
Travis Ralston 2fe6b2cb5c Plagiarize from richvdh for a better explanation 2019-01-31 10:53:06 -07:00
Travis Ralston ab7876cbef
Update 1831-srv-after-wellknown.md 2019-01-31 09:55:58 -07:00
Travis Ralston 0e90cf6a0c Proposal to change the order of .well-known and SRV discovery techniques 2019-01-31 09:38:58 -07:00
Travis Ralston ccce6c196d Specify how capabilities work in the c2s API
Original proposals:
* https://github.com/matrix-org/matrix-doc/pull/1753
* https://github.com/matrix-org/matrix-doc/pull/1804

Implementation proof:
* https://github.com/matrix-org/synapse/pull/4472
* https://github.com/matrix-org/matrix-js-sdk/pull/830

There is one change to MSC1753 which is included in this commit. MSC1804 remains unchanged. In the original proposal, the change password capability being present was an indication that password changes were possible. It was found that this doesn't really communicate the state very well to clients in that lack of a capability (or a 404, etc) would mean that users would erroneously not be able to change their passwords. A simple boolean flag was added to assist clients in detecting this capability.
2019-01-30 19:43:55 -07:00
Travis Ralston 72a2871021
Merge pull request #1804 from matrix-org/travis/msc/room-version-client-advertising
MSC1804: Advertising capable room versions to clients
2019-01-30 17:06:24 -07:00
Erik Johnston 1c0742ed6a
MSC 1659 Proposal: Change Event IDs to Hashes (#1659) 2019-01-30 17:08:21 +00:00
Hubert Chathi ca0baa54df various fixes
- fix typo
- make property name plural since it may contain multiple items
- mention that users will appear in sync when they upload keys
2019-01-30 11:26:21 -05:00
Neil Johnson 2eae933ed6 hard wrap to 80 chars 2019-01-30 11:28:53 +00:00
Neil Johnson 4f13f5289e
Update 1819-remove-presence-lists.md
Add references to exactly what this proposal would remove
2019-01-30 11:20:38 +00:00
Richard van der Hoff 5151aa0aa7
Update proposals/1819-remove-presence-lists.md
Co-Authored-By: neilisfragile <neil@matrix.org>
2019-01-30 10:44:15 +00:00
Travis Ralston 2c3ba0b135
Merge pull request #1813 from matrix-org/erikj/make_membership_room_ver
MSC 1813 - Federation Make Membership Room Version
2019-01-29 10:17:48 -07:00
Richard van der Hoff de57d3950f
Relax the requirement for a content-type on .well-known (#1824)
The main reason for this is that Apache etc won't stick a content-type on by
default, because they don't know it's JSON, so requiring it seems like it will
require unnecessary hoop-humping for everyone who wants to use a .well-known.
2019-01-29 14:46:27 +00:00
Neil Johnson 9f517f33ce
Create 1819-remove-presence-lists.md 2019-01-28 17:59:17 +00:00
Travis Ralston 577edeb53b Say that !stable == unstable 2019-01-25 09:27:23 -07:00
Travis Ralston 052d68d83d
Merge pull request #1791 from matrix-org/travis/spec/rver-upgrades
Add room version upgrades
2019-01-23 19:04:24 -07:00
Travis Ralston 50eba23669 Update MSC to match how room versions work
As per 1773.
2019-01-22 18:24:04 -07:00
Erik Johnston 3ec3adbc24 Proposal for add room_version to make_* fed APIs 2019-01-22 10:55:27 +00:00
Travis Ralston f308871ed9
Merge pull request #1794 from matrix-org/erikj/fed_invite_v2
MSC 1794 - Federation v2 Invite API
2019-01-21 07:59:07 -07:00
Hubert Chathi 41c14c9e7d
uhoreg tweaks
Co-Authored-By: ara4n <matthew@arasphere.net>
2019-01-18 22:56:19 +00:00
Matthew Hodgson 20b9a33b12 clarify 100% threshold for new spec core team additions 2019-01-18 22:39:44 +00:00
Hubert Chathi f4fe318a85 update with user-signing and self-signing keys 2019-01-17 23:52:36 -05:00