Skip to content

Commit 84331fc

Browse files
committed
Re-arrange security impact of knocking.
1 parent 62e94c5 commit 84331fc

File tree

1 file changed

+11
-9
lines changed

1 file changed

+11
-9
lines changed

proposals/3173-expose-stripped-state-events.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ Any user who is able to join a room can access the stripped state events of that
6464
Potential ways that a user might be able to join include, but are not limited to,
6565
the following mechanisms:
6666

67-
* A room that has `join_rules` set to `public` or `knock`.<sup id="a1">[1](#f1)</sup>
67+
* A room that has `join_rules` set to `public` or `knock`.
6868
* A room that the user is in possession of an invite to (regardless of the `join_rules`).
6969

7070
Future MSCs might include additional mechanism for a user to join a room and
@@ -75,12 +75,12 @@ should consider this MSC, for example:
7575
Additionally, it is recommended, but not required, that homeserver implementations
7676
include the following as stripped state events:
7777

78-
* Create event (`m.room.create`)<sup id="a2">[2](#f2)</sup>
78+
* Create event (`m.room.create`)<sup id="a1">[2](#f1)</sup>
7979
* Join rules (`m.room.join_rules`)
8080
* Canonical alias (`m.room.canonical_alias`)
8181
* Room avatar (`m.room.avatar`)
8282
* Room name (`m.room.name`)
83-
* Encrypted status (`m.room.encryption`)<sup id="a3">[3](#f3)</sup>
83+
* Encrypted status (`m.room.encryption`)<sup id="a2">[3](#f2)</sup>
8484

8585
This also implies that the above information is available to any potential joiner
8686
in the API proposed in [MSC2946: Spaces summary](https://github.com/matrix-org/matrix-doc/pull/2946).
@@ -99,6 +99,11 @@ knocking.
9999

100100
## Security considerations
101101

102+
This would allow for invisibly accessing the stripped state of a room with `knock`
103+
join rules. This is already trivially accessible by knocking on the room, but
104+
currently users in the room would know that the knock occurred. This does not
105+
seem to be a major weakening of the security.
106+
102107
## Future extensions
103108

104109
Dedicated client-server and server-server APIs could be added to request the
@@ -111,10 +116,7 @@ N/A
111116

112117
## Footnotes
113118

114-
<a id="f1"/>[1]: The rationale for including `knock` is that the user can
115-
trivially get this state already by knocking on the room.[](#a1)
116-
117-
<a id="f2"/>[2]: As updated in [MSC1772](https://github.com/matrix-org/matrix-doc/pull/1772).[](#a2)
119+
<a id="f1"/>[1]: As updated in [MSC1772](https://github.com/matrix-org/matrix-doc/pull/1772).[](#a1)
118120

119-
<a id="f3"/>[3]: This is already sent from Synapse and generally seems useful for
120-
a user to know before joining a room.[](#a3)
121+
<a id="f2"/>[2]: This is already sent from Synapse and generally seems useful for
122+
a user to know before joining a room.[](#a2)

0 commit comments

Comments
 (0)