diff --git a/develop/MSC1711_certificates_FAQ.html b/develop/MSC1711_certificates_FAQ.html index 7538bb3f23..0982669d01 100644 --- a/develop/MSC1711_certificates_FAQ.html +++ b/develop/MSC1711_certificates_FAQ.html @@ -186,7 +186,7 @@

Historical Note

This document was originally written to guide server admins through the upgrade path towards Synapse 1.0. Specifically, -MSC1711 +MSC1711 required that all servers present valid TLS certificates on their federation API. Admins were encouraged to achieve compliance from version 0.99.0 (released in February 2019) ahead of version 1.0 (released June 2019) enforcing the @@ -421,7 +421,7 @@ coffin of the Perspectives project (which was already pretty dead). So, the Spec Core Team decided that a better approach would be to mandate valid TLS certificates for federation alongside the rest of the Web. More details can be found in -MSC1711.

+MSC1711.

This results in a breaking change, which is disruptive, but absolutely critical for the security model. However, the existence of Let's Encrypt as a trivial way to replace the old self-signed certificates with valid CA-signed ones helps diff --git a/develop/print.html b/develop/print.html index 1b32b73ca4..a96e78465f 100644 --- a/develop/print.html +++ b/develop/print.html @@ -2614,7 +2614,7 @@ in the local HS will automatically rejoin the room.

Historical Note

This document was originally written to guide server admins through the upgrade path towards Synapse 1.0. Specifically, -MSC1711 +MSC1711 required that all servers present valid TLS certificates on their federation API. Admins were encouraged to achieve compliance from version 0.99.0 (released in February 2019) ahead of version 1.0 (released June 2019) enforcing the @@ -2849,7 +2849,7 @@ coffin of the Perspectives project (which was already pretty dead). So, the Spec Core Team decided that a better approach would be to mandate valid TLS certificates for federation alongside the rest of the Web. More details can be found in -MSC1711.

+MSC1711.

This results in a breaking change, which is disruptive, but absolutely critical for the security model. However, the existence of Let's Encrypt as a trivial way to replace the old self-signed certificates with valid CA-signed ones helps @@ -9112,7 +9112,8 @@ def generate_mac(nonce, user, password, admin=False, user_type=None):

Registration Tokens

This API allows you to manage tokens which can be used to authenticate -registration requests, as proposed in MSC3231. +registration requests, as proposed in +MSC3231. To use it, you will need to enable the registration_requires_token config option, and authenticate by providing an access_token for a server admin: see Admin API. diff --git a/develop/usage/administration/admin_api/registration_tokens.html b/develop/usage/administration/admin_api/registration_tokens.html index d876dad81e..7f5fa2dfff 100644 --- a/develop/usage/administration/admin_api/registration_tokens.html +++ b/develop/usage/administration/admin_api/registration_tokens.html @@ -184,7 +184,8 @@

Registration Tokens

This API allows you to manage tokens which can be used to authenticate -registration requests, as proposed in MSC3231. +registration requests, as proposed in +MSC3231. To use it, you will need to enable the registration_requires_token config option, and authenticate by providing an access_token for a server admin: see Admin API.