Confirmed users
471
edits
| Line 220: | Line 220: | ||
For /certificate/sign, it is critical to enable payload verification by setting options.payload=true (on both client and server). Otherwise a man-in-the-middle could submit their own public key, get it signed, and then delete the user's data on the storage servers. | For /certificate/sign, it is critical to enable payload verification by setting options.payload=true (on both client and server). Otherwise a man-in-the-middle could submit their own public key, get it signed, and then delete the user's data on the storage servers. | ||
The following keyserver APIs require a HAWK-protected request that uses the sessionToken. In addition, some require that the account be in the "verified" state: | |||
* GET / | * GET /account/devices | ||
* POST /session/destroy | * POST /session/destroy | ||
* GET /recovery_email/status | |||
* POST /recovery_email/resend_code | |||
* POST /certificate/sign (requires "verified" account) | |||
* GET / | |||
* POST / | |||
* POST / | |||
= Resetting The Account = | = Resetting The Account = | ||