specify how to handle multiple olm sessions with the same device
This commit is contained in:
parent
5f06694b6f
commit
688c8ebcd3
1 changed files with 6 additions and 0 deletions
|
@ -391,6 +391,12 @@ this check, a client cannot be sure that the sender device owns the private
|
||||||
part of the ed25519 key it claims to have in the Olm payload.
|
part of the ed25519 key it claims to have in the Olm payload.
|
||||||
This is crucial when the ed25519 key corresponds to a verified device.
|
This is crucial when the ed25519 key corresponds to a verified device.
|
||||||
|
|
||||||
|
If a client has multiple sessions established with another device, it should
|
||||||
|
use the session from which it last received a message. A client may expire old
|
||||||
|
sessions by defining a maximum number of olm sessions that it will maintain for
|
||||||
|
each device, and expiring sessions on a Least Recently Used basis. The maximum
|
||||||
|
number of olm sessions maintained per device should be at least 4.
|
||||||
|
|
||||||
``m.megolm.v1.aes-sha2``
|
``m.megolm.v1.aes-sha2``
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue