Skip to content

Commit e30a68a

Browse files
turt2liverichvdh
authored andcommitted
Remove what appears to be leftover notes
1 parent 24fedc2 commit e30a68a

File tree

1 file changed

+5
-13
lines changed

1 file changed

+5
-13
lines changed

proposals/2778-appservice-login.md

+5-13
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
Appservices within Matrix are increasingly attempting to support End-to-End Encryption. As such, they
44
need a way to generate devices for their users so that they can participate in E2E rooms. In order to
5-
do so, this proposal suggests implementing an appservice extension to the
5+
do so, this proposal suggests implementing an appservice extension to the
66
[`POST /login` endpoint](https://matrix.org/docs/spec/client_server/r0.6.0#post-matrix-client-r0-login).
77

88
Appservice users do not usually need to log in as they do not need their own access token, and do not
@@ -47,7 +47,7 @@ If one of the following conditions are true:
4747
- The access token does not correspond to an appservice
4848
- Or the user has not previously been registered
4949

50-
Then the servers MUST reject with HTTP 403, with an `errcode` of `"M_FORBIDDEN"`.
50+
Then the servers MUST reject with HTTP 403, with an `errcode` of `"M_FORBIDDEN"`.
5151

5252
If the access token DOES correspond to an appservice but the user is not inside its namespace,
5353
then the `errcode` must be `"M_EXCLUSIVE"`.
@@ -95,16 +95,8 @@ could store this information rather than calling `POST /login` at all. This does
9595
- If user tokens were lost or exposed, there is no way to programattically create new access tokens for these users.
9696
- Finally, if a user was registered externally and the appservice would like to masquerade as it, it would be unable to fetch
9797
an access token for that user.
98-
99-
While `POST /register` does work, it is impactical as the sole method of fetching an access token.
100-
10198

102-
Most appservices
103-
which do not implement encryption do not store this information as neither the device_id or access_token are needed f However critically
104-
this means that bridges will need to be designed to store the access_token and device_id from the point of creating the user,
105-
so older bridges would be unable to get an access token for existing users as `POST /register` would fail.
106-
It would difficult to log out these tokens if they got exposed additionally, as the AS would not be able to fetch a new access token.
107-
Furthermore, the ability to generate access tokens for real users who registered elsewhere would not be possible with this mechanism.
99+
While `POST /register` does work, it is impactical as the sole method of fetching an access token.
108100

109101
## Security considerations
110102

@@ -116,7 +108,7 @@ this is not a problem because:
116108
to assume that the server admin is aware. There is no defense mechanism to stop a malicious server admin from creating new
117109
devices for a given user's account as they could also do so by simply modifying the database.
118110

119-
- While an appservice *could* try to masquerade as a user maliciously without the server admin expecting it, it would still
111+
- While an appservice *could* try to masquerade as a user maliciously without the server admin expecting it, it would still
120112
be bound by the restrictions of the namespace. Server admins are expected to be aware of the implications of adding new
121113
appservices to their server so the burden of responsibility lies with the server admin.
122114

@@ -125,7 +117,7 @@ this is not a problem because:
125117
does make them unable to see encrypted messages, this is not designed to be a security mechanism.
126118

127119
In conclusion this MSC only automates the creation of new devices for users inside an AS namespace, which is something
128-
a server admin could already do. Appservices should always be treated with care and so with these facts in mind the MSC should
120+
a server admin could already do. Appservices should always be treated with care and so with these facts in mind the MSC should
129121
be considered secure.
130122

131123
## Unstable prefix

0 commit comments

Comments
 (0)