-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Specify recommended exchange message #112
Comments
We're not following that for Threema, we use a custom binary protocol to reduce the amount of data that needs to be encoded in the QR code. (The format will be documented on release, but may change in the future. There's a version field in the data for that.) I don't think we should standardize the format itself, just list the data that should be exchanged:
|
Ah, I didn't really read the suggestion properly the first time. You're proposing to change the websocket server path. That would be fine with me generally, although we won't use the full format (with hash) to transfer data through the QR code. Regarding group conversations, I'll continue the discussion in #83. |
Only listing the data that needs to be exchanged would be fine by me. However, I'd want to add the scheme above as an example. |
Feel free to create a proposal. As this is documentation only, it should not break compatibility. |
In order to reduce the amount of isle solutions, I want to specify a recommended way to exchange the server's URL, initiator's permanent public key and authentication token.
While doing that, I'm also thinking about changing the path slightly to be explicit in case we add #83 at some point.
This is what I have in mind:
where
<type>
can only be1to1
at the moment. An example:Implementations can then extract the initiator's permanent public key and the authentication token from the path. It MUST strip everything that follows
#
away and can then use the result to connect to the SaltyRTC server.Using
#
before the authentication token also will help in case an implementation forgets to strip it away. In this case, browsers will throwDOMException
(Chromium) orSyntaxError
(Firefox), so the token doesn't leak.Thoughts @dbrgn?
Edit: Added port.
The text was updated successfully, but these errors were encountered: