-
Notifications
You must be signed in to change notification settings - Fork 391
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
MSC1921: Support cancelling 3pid validation sessions #1921
base: old_master
Are you sure you want to change the base?
Conversation
believed by the author that the additional security of ensuring the requester has permission to actually | ||
cancel the session is more worthwhile than trying to fail fast. | ||
|
||
Servers should also be aware of a potential resource exhaustion vector where an attacker requests a token and |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Definitely something that should happen during token creation, but I wouldn't rate limit cancelToken
especially harshly.
Fixes element-hq/element-web#6560 Would be better improved by matrix-org/matrix-spec-proposals#1921 or similar in the future.
Is this still needed? Can we not just start another validation session and let the previous one eventually expire? |
There's a whole introduction that explains why this is needed and why letting them expire naturally is insufficient. This is still needed. |
Rendered
As mentioned in the introduction, this was written in the context of working on element-hq/element-web#6560.