You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It ploughs straight in with "Key storage: Each key has an ID". When you first read this, you think it's talking about the keys that are stored in secret storage (eg, cross signing keys); it is actually talking about the master secret-storage key that is used to encrypt the secrets. This really needs clarifying.
The fact that, in practice, there is only one secret storage key that is used (the one referenced by m.secret_storage.default_key) at any given time could do with being made a lot more obvious.
Given that there is only one encryption system in use currently (m.secret_storage.v1.aes-hmac-sha2), the whole thing is unnecessarily confusing. The spec effectively mandates m.secret_storage.v1.aes-hmac-sha2 so let's stop saying "it depends on the algorithm" and dividing up the definitions into two parts. This is true both of "Key storage" and "Secret storage".
There are three different account-data payload definitions in this section (m.secret_storage.default_key, m.secret_storage.key.[key ID], org.example.some.secret), but they are all quite well hidden and do not use the standard, linkable, payload definition format. (See for example https://spec.matrix.org/v1.13/client-server-api/#midentity_server as an example of one that gets this right.)
Link to problem area:
https://spec.matrix.org/v1.13/client-server-api/#storage
Issue
m.secret_storage.default_key
) at any given time could do with being made a lot more obvious.m.secret_storage.v1.aes-hmac-sha2
), the whole thing is unnecessarily confusing. The spec effectively mandatesm.secret_storage.v1.aes-hmac-sha2
so let's stop saying "it depends on the algorithm" and dividing up the definitions into two parts. This is true both of "Key storage" and "Secret storage".m.secret_storage.default_key
,m.secret_storage.key.[key ID]
,org.example.some.secret
), but they are all quite well hidden and do not use the standard, linkable, payload definition format. (See for example https://spec.matrix.org/v1.13/client-server-api/#midentity_server as an example of one that gets this right.)The text was updated successfully, but these errors were encountered: