Compare commits

..

No commits in common. "0c2f84bc1ab43b548350259bb11a1559e9bbc96b" and "ebc71218d28e50a28ff7c4bf9bedbad419e656aa" have entirely different histories.

2 changed files with 14 additions and 23 deletions

View file

@ -35,3 +35,14 @@ based on whether or not the reporting user is joined to any rooms that the
reported user is joined to. This is because users can be exposed to harmful
content without being joined to a room. For instance, through user
directories or invites.
Clients can infer whether a reported event, room or user exists based on the
404 responses of the reporting endpoints. Homeservers that wish to conceal
this information MAY return 200 responses regardless of the existence of the
reported subject.
Furthermore, it might be possible for clients to deduce whether a reported
event, room or user exists by timing the response. This is because only a
report for an existing subject will require the homeserver to do further
processing. To combat this, homeserver implementations MAY add a random
delay when generating a response.

View file

@ -45,9 +45,7 @@ paths:
properties:
reason:
type: string
description: The reason the room is being reported. May be blank.
required:
- reason
description: The reason the room is being reported.
required: true
security:
- accessTokenQuery: []
@ -90,11 +88,6 @@ paths:
Reports an event as inappropriate to the server, which may then notify
the appropriate people. The caller must be joined to the room to report
it.
Furthermore, it might be possible for clients to deduce whether a reported
event exists by timing the response. This is because only a report for an
existing event will require the homeserver to do further processing. To
combat this, homeservers MAY add a random delay when generating a response.
operationId: reportEvent
parameters:
- in: path
@ -176,15 +169,6 @@ paths:
that the reported user is joined to.
Clients may wish to [ignore](#ignoring-users) users after reporting them.
Clients could infer whether a reported user exists based on the 404 response.
Homeservers that wish to conceal this information MAY return 200 responses
regardless of the existence of the reported user.
Furthermore, it might be possible for clients to deduce whether a reported
user exists by timing the response. This is because only a report for an
existing user will require the homeserver to do further processing. To
combat this, homeservers MAY add a random delay when generating a response.
operationId: reportUser
parameters:
- in: path
@ -207,18 +191,14 @@ paths:
properties:
reason:
type: string
description: The reason the room is being reported. May be blank.
required:
- reason
description: The reason the room is being reported.
required: true
security:
- accessTokenQuery: []
- accessTokenBearer: []
responses:
"200":
description: |
The user has been reported successfully or the server chose
to not disclose whether the users exists.
description: The user has been reported successfully.
content:
application/json:
schema: