@@ -42,61 +42,13 @@ There are three editions of ESS:
4242
4343The Synapse documentation describes `options for installing Synapse standalone
4444<https://element-hq.github.io/synapse/latest/setup/installation.html> `_. See
45- below for more useful documenation links.
45+ below for more useful documentation links.
4646
4747- `Synapse configuration options <https://element-hq.github.io/synapse/latest/usage/configuration/config_documentation.html >`_
4848- `Synapse configuration for federation <https://element-hq.github.io/synapse/latest/federate.html >`_
4949- `Using a reverse proxy with Synapse <https://element-hq.github.io/synapse/latest/reverse_proxy.html >`_
5050- `Upgrading Synapse <https://element-hq.github.io/synapse/develop/upgrade.html >`_
5151
52- Platform dependencies
53- ---------------------
54-
55- Synapse uses a number of platform dependencies such as Python and PostgreSQL,
56- and aims to follow supported upstream versions. See the `deprecation policy
57- <https://element-hq.github.io/synapse/latest/deprecation_policy.html> `_ for more
58- details.
59-
60-
61- Security note
62- -------------
63-
64- Matrix serves raw, user-supplied data in some APIs — specifically the `content
65- repository endpoints `_.
66-
67- .. _content repository endpoints : https://matrix.org/docs/spec/client_server/latest.html#get-matrix-media-r0-download-servername-mediaid
68-
69- Whilst we make a reasonable effort to mitigate against XSS attacks (for
70- instance, by using `CSP `_), a Matrix homeserver should not be hosted on a
71- domain hosting other web applications. This especially applies to sharing
72- the domain with Matrix web clients and other sensitive applications like
73- webmail. See
74- https://developer.github.com/changes/2014-04-25-user-content-security for more
75- information.
76-
77- .. _CSP : https://github.com/matrix-org/synapse/pull/1021
78-
79- Ideally, the homeserver should not simply be on a different subdomain, but on
80- a completely different `registered domain `_ (also known as top-level site or
81- eTLD+1). This is because `some attacks `_ are still possible as long as the two
82- applications share the same registered domain.
83-
84- .. _registered domain : https://tools.ietf.org/html/draft-ietf-httpbis-rfc6265bis-03#section-2.3
85-
86- .. _some attacks : https://en.wikipedia.org/wiki/Session_fixation#Attacks_using_cross-subdomain_cookie
87-
88- To illustrate this with an example, if your Element Web or other sensitive web
89- application is hosted on ``A.example1.com ``, you should ideally host Synapse on
90- ``example2.com ``. Some amount of protection is offered by hosting on
91- ``B.example1.com `` instead, so this is also acceptable in some scenarios.
92- However, you should *not * host your Synapse on ``A.example1.com ``.
93-
94- Note that all of the above refers exclusively to the domain used in Synapse's
95- ``public_baseurl `` setting. In particular, it has no bearing on the domain
96- mentioned in MXIDs hosted on that server.
97-
98- Following this advice ensures that even if an XSS is found in Synapse, the
99- impact to other applications will be minimal.
10052
10153🎯 Troubleshooting and support
10254==============================
0 commit comments