1
0
mirror of https://github.com/moparisthebest/xeps synced 2024-11-26 19:22:15 -05:00

XEP-0450: Release version 0.3.2

Use 'distrusted' consistently
This commit is contained in:
Melvin Keskin 2021-06-27 13:20:17 +02:00
parent 27763c3d70
commit 17e384071e
No known key found for this signature in database
GPG Key ID: 04EFAD0F7A4D9724

View File

@ -37,6 +37,12 @@
<email>melvo@olomono.de</email> <email>melvo@olomono.de</email>
<jid>melvo@olomono.de</jid> <jid>melvo@olomono.de</jid>
</author> </author>
<revision>
<version>0.3.2</version>
<date>2021-06-27</date>
<initials>melvo</initials>
<remark>Use 'distrusted' consistently</remark>
</revision>
<revision> <revision>
<version>0.3.1</version> <version>0.3.1</version>
<date>2021-05-14</date> <date>2021-05-14</date>
@ -473,7 +479,7 @@
<section1 topic='Implementation Notes' anchor='implementation-notes'> <section1 topic='Implementation Notes' anchor='implementation-notes'>
<section2 topic='Storing Trust Message Information from Endpoints with Unauthenticated Keys' anchor='implementation-notes-storing-trust-message-information-unauthenticated-keys'> <section2 topic='Storing Trust Message Information from Endpoints with Unauthenticated Keys' anchor='implementation-notes-storing-trust-message-information-unauthenticated-keys'>
<p> <p>
A client MUST save the information of a trust message until the key of the endpoint that sent the trust message is authenticated, so that the key can then be authenticated or revoked. A client MUST save the information of a trust message until the key of the endpoint that sent the trust message is authenticated, so that the key can then be authenticated or distrusted.
Storing data of a trust message from an endpoint with an unauthenticated key is necessary because the receiving endpoint can only use that data after authenticating the sending endpoint's key and that data might not be received again. Storing data of a trust message from an endpoint with an unauthenticated key is necessary because the receiving endpoint can only use that data after authenticating the sending endpoint's key and that data might not be received again.
Afterwards the information of the trust message MAY be deleted. Afterwards the information of the trust message MAY be deleted.
</p> </p>
@ -486,7 +492,7 @@
</section2> </section2>
<section2 topic='Storing Trust Message Information for Unknown Keys' anchor='implementation-notes-storing-trust-message-information-unknown-keys'> <section2 topic='Storing Trust Message Information for Unknown Keys' anchor='implementation-notes-storing-trust-message-information-unknown-keys'>
<p> <p>
A client MUST save the information of a trust message until it has fetched the corresponding key so that the key can then be authenticated or revoked. A client MUST save the information of a trust message until it has fetched the corresponding key so that the key can then be authenticated or distrusted.
Afterwards the information of the trust message can be deleted. Afterwards the information of the trust message can be deleted.
</p> </p>
<p> <p>