Node:Membership visibility, Next:, Previous:The User Area, Up:Top

Membership visibility

The details of the security model isn't properly documented. Much information can be extracted from various parts of the protocol specification, but there is no complete overview. In time, this chapter may become such an overview. For now, it only defines when a membership is visible.

The various requests that return information about a membership can be grouped into three categories:

The rules for membership visibility are given below. In the explanation, the variables C, P and V are used like this:

The following flags also influences how much V can see:

The following rules determines if a memberhip is visible to V. The first rule that matches is used.