Skip to content

Commit b174da3

Browse files
KrausMatthiasMatthias Kraus
andauthored
Notifications SHOULD use httpsig for sender authentification (#234)
Co-authored-by: Matthias Kraus <[email protected]>
1 parent 88745b0 commit b174da3

File tree

1 file changed

+8
-1
lines changed

1 file changed

+8
-1
lines changed

IETF-RFC.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -805,6 +805,13 @@ of trusted users, along with any related share. The recipient MAY
805805
reciprocally remove that provider from the list of trusted users, along
806806
with any related share.
807807

808+
Notifications from Sending Server to Receiving Server SHOULD use
809+
[httpsig](https://datatracker.ietf.org/doc/rfc9421) so the
810+
Receiving Server can authenticate the origin of the notification.
811+
Receiving Servers SHOULD decline notifications from Sending Servers
812+
without [httpsig](https://datatracker.ietf.org/doc/rfc9421) as it
813+
can't identify where the notification is coming from.
814+
808815

809816
### Receiving Party Notification
810817
If the Share Creation Notification is not discarded by the Receiving
@@ -876,7 +883,7 @@ if the Sending Party understood and processed the reshare request or not.
876883

877884
# Resharing
878885
The `"REQUEST_RESHARE"` and `"RESHARE_UNDO"` notification types MAY be
879-
used by theReceiving Server to persuade the Sending Server to share the
886+
used by the Receiving Server to persuade the Sending Server to share the
880887
same Resource with another Receiving Party.
881888
The details of the payload and side effects such a notification may
882889
have are out of scope of this version of this specification.

0 commit comments

Comments
 (0)