Skip to content

Commit 2bc07c4

Browse files
committed
add security consideration and alternatives
Signed-off-by: Timo K <[email protected]>
1 parent 8839b8d commit 2bc07c4

File tree

1 file changed

+20
-0
lines changed

1 file changed

+20
-0
lines changed

proposals/4140-expiring-events-with-keep-alive-endpoint.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -121,8 +121,28 @@ the `"will_expire":"running"` events for a specific event type but render the
121121

122122
## Alternatives
123123

124+
[MSC4018](https://github.com/matrix-org/matrix-spec-proposals/pull/4018) also
125+
proposes a way to make call memberships reliable. It uses the client sync loop as
126+
an indicator to determine if the event is expired. Instead of letting the SFU
127+
inform about the call termination or using the call app ping loop like we propose
128+
here.
129+
124130
## Security considerations
125131

132+
We are using unauthenticated endpoint to refresh the expirations. Since we use
133+
the token it is hard to guess a correct endpoint and randomly end `will_expire`
134+
events.
135+
136+
It is an intential decision to not provice an endpoint like
137+
`PUT /_matrix/client/v3/expiration/room/{roomId}/event/{eventId}`
138+
where any client with access to the room could also `end` or `refresh`
139+
the expiration. With the token the client sending the event has ownership
140+
over the expiration and only intentional delegation of that ownership
141+
(sharing the token) is possible.
142+
143+
On the other hand the token makes sure that the instance gets as little
144+
information about the matrix metadata of the associated `will_expire` event.
145+
126146
## Unstable prefix
127147

128148
## Dependencies

0 commit comments

Comments
 (0)