You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Note that this is the same example as [the `/state` endpoint](https://matrix.org/docs/spec/client_server/latest#get-matrix-client-r0-rooms-roomid-state),
173
+
but limited to what would be returned as stripped state.
174
+
175
+
##### Status code 403:
176
+
177
+
You are not a member of the room, a potential joiner, and the room is not publicly viewable.
178
+
106
179
## Potential issues
107
180
108
181
This is a generalization of current behavior and shouldn't introduce any new issues.
@@ -115,25 +188,29 @@ knocking.
115
188
116
189
## Security considerations
117
190
118
-
This would allow for invisibly accessing the stripped state of a room with `knock`
119
-
join rules. This is already trivially accessible by knocking on the room, but
120
-
currently users in the room would know that the knock occurred. This does not
121
-
seem to be a major weakening of the security.
191
+
This would allow for invisibly accessing the stripped state of a room with `public`
192
+
or `knock` join rules.
122
193
123
-
## Future extensions
194
+
In the case of a public room, if the room has `history_visibility` set to `world_readable`
195
+
then this is no change. Otherwise, it is trivial to access the state of the room
196
+
by joining, but currently users in the room would know that the join occurred.
197
+
Additionally, this information is already provided by the room directory (if
198
+
the room is listed there).
124
199
125
-
### Dedicated APIs
200
+
Similarly, in the case of knocking, a user is able to trivially access the
201
+
stripped state of the room by knocking, but users in the room would know that
202
+
the knock occurred.
126
203
127
-
Dedicated client-server and server-server APIs could be added to request the
128
-
stripped state events, but that is considered out-of-scope for the current
129
-
proposal.
204
+
This does not seem to be weakening the security expectations of either join rule.
205
+
206
+
## Future extensions
130
207
131
208
### Revisions to the room directory
132
209
133
210
A future MSC could include additional information from the stripped state events
134
211
in the [room directory](https://matrix.org/docs/spec/client_server/latest#get-matrix-client-r0-publicrooms).
135
-
This seems to mostly be the encryption information, but there may also be other
136
-
pieces of information to include.
212
+
The main missing piece seems to be the encryption information, but there may also
0 commit comments