-
-
Notifications
You must be signed in to change notification settings - Fork 97
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
support POST requests to preview_url
#953
Comments
Note that while the spec allows passing the access token in a GET query string, it strongly discourages from using this mechanism, instead passing the access token in an |
It's also worth noting that access tokens as they currently stand are planned to be phased out as part of a migration toOAuth2 (see matrix-org/matrix-spec-proposals#2964). In the meantime, I suggest filing bugs against any clients which put access tokens in query parameters.
I'm afraid I don't understand what either of these mean. |
@dkasak yes, i read understand this part. While its state of the art is to encrypt communications per default, authentication data should not appear in plain text in the logs. Yes in fact, it's possible to redact Events in Logfiles but in my opinion, the specification should allow only "secure" methods. @richvdh we found preview_urls in plain-text in our proxy and homeserver logs even if preview_url was disabled in our synapse server configuration. These are only some first thoughts how to deal with that:
|
I don't think this does much for privacy since HTTP servers can choose to log POST data too. Though I agree that typically configured HTTP servers are less likely to log POST data than URLs, so it would at least reduce accidental logging which is a welcome addition. Such a change would require going through the MSC process however and is unlikely to be a priority right now unless someone steps up to write a proposal.
Similarly to the above: sounds nice, but needs an MSC and then people have to implement it, so there are no guarantees.
It should be noted that at least Element Web/Desktop disable URL previews by default in encrypted rooms. A user has to explicitly turn it on for a particular room in order for URL preview requests to get sent. |
There are an awful lot of words here, but:
|
preview_url
Hello,
we reviewed our homeserver and reverse proxy logs and discovered the following issues that may effect integrity of matrix.
At first we figured out that the element client calls the endpoint
preview_url
with GET method for encrypted rooms even if the endpoint was disabled on synapse server. This happens every time a user sends a message that only contains a url.We reported that behavior as an issue under matrix-org/synapse#11591.
While discussing this @squahtx told that the the synapse homeserver replaces (redact) sensitive data like
access_token
andclients_access
within the logging string.In our opinion, redacting these events in homeserver isn't the solution. Sensitive data like access_token, client_access or urls shouldn't have to send with GET, because this will expose potential sensible data to the synapse server, the reverse proxy and every services that parse these logs.
First thoughts:
best regards
The text was updated successfully, but these errors were encountered: