diff --git a/CHANGELOG.md b/CHANGELOG.md
index d52293b30337d9f9295566322c1c7c68b6e46ec2..b32a530fe3277cef93ca8ba4ad1fc1deaff04d76 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -14,6 +14,7 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
 * Added thumbnailing support for some audio waveforms (MP3, WAV, OGG, and FLAC).
 * Added audio metadata (duration, etc) to the unstable `/info` endpoint. Aligns with [MSC2380](https://github.com/matrix-org/matrix-doc/pull/2380).
 * Added simple thumbnailing for MP4 videos.
+* Added an `asAttachment` query parameter to download requests per [MSC2702](https://github.com/matrix-org/matrix-doc/pull/2702).
 
 ### Fixed
 
diff --git a/api/custom/exports.go b/api/custom/exports.go
index cf954903209b473d3a8226e523529832d7a93979..6251a49ee912e2d7e0ba41d43ba952a3a1da7d42 100644
--- a/api/custom/exports.go
+++ b/api/custom/exports.go
@@ -260,6 +260,7 @@ func DownloadExportPart(r *http.Request, rctx rcontext.RequestContext, user api.
 		SizeBytes:   part.SizeBytes,
 		Data:        s,
 		Filename:    part.FileName,
+		TargetDisposition: "attachment",
 	}
 }
 
diff --git a/api/r0/download.go b/api/r0/download.go
index 0122238f7cb393bfd31757b4b04628218c727db1..fd06a8397635dc6d5f7e3bacd35532291a02da36 100644
--- a/api/r0/download.go
+++ b/api/r0/download.go
@@ -14,10 +14,11 @@ import (
 )
 
 type DownloadMediaResponse struct {
-	ContentType string
-	Filename    string
-	SizeBytes   int64
-	Data        io.ReadCloser
+	ContentType       string
+	Filename          string
+	SizeBytes         int64
+	Data              io.ReadCloser
+	TargetDisposition string
 }
 
 func DownloadMedia(r *http.Request, rctx rcontext.RequestContext, user api.UserInfo) interface{} {
@@ -28,6 +29,15 @@ func DownloadMedia(r *http.Request, rctx rcontext.RequestContext, user api.UserI
 	filename := params["filename"]
 	allowRemote := r.URL.Query().Get("allow_remote")
 
+	targetDisposition := r.URL.Query().Get("org.matrix.msc2702.asAttachment")
+	if targetDisposition == "true" {
+		targetDisposition = "attachment"
+	} else if targetDisposition == "false" {
+		targetDisposition = "inline"
+	} else {
+		targetDisposition = "infer"
+	}
+
 	downloadRemote := true
 	if allowRemote != "" {
 		parsedFlag, err := strconv.ParseBool(allowRemote)
@@ -62,9 +72,10 @@ func DownloadMedia(r *http.Request, rctx rcontext.RequestContext, user api.UserI
 	}
 
 	return &DownloadMediaResponse{
-		ContentType: streamedMedia.ContentType,
-		Filename:    filename,
-		SizeBytes:   streamedMedia.SizeBytes,
-		Data:        streamedMedia.Stream,
+		ContentType:       streamedMedia.ContentType,
+		Filename:          filename,
+		SizeBytes:         streamedMedia.SizeBytes,
+		Data:              streamedMedia.Stream,
+		TargetDisposition: targetDisposition,
 	}
 }
diff --git a/api/r0/thumbnail.go b/api/r0/thumbnail.go
index fa8ffcbc8691f67594556c24a49dda5343e3aebb..779cf635f62465ab305725365b66e9f3953c4126 100644
--- a/api/r0/thumbnail.go
+++ b/api/r0/thumbnail.go
@@ -79,7 +79,7 @@ func ThumbnailMedia(r *http.Request, rctx rcontext.RequestContext, user api.User
 		"requestedAnimated": animated,
 	})
 
-	if width <= 0 || height <=0 {
+	if width <= 0 || height <= 0 {
 		return api.BadRequest("Width and height must be greater than zero")
 	}
 
@@ -98,6 +98,6 @@ func ThumbnailMedia(r *http.Request, rctx rcontext.RequestContext, user api.User
 		ContentType: streamedThumbnail.Thumbnail.ContentType,
 		SizeBytes:   streamedThumbnail.Thumbnail.SizeBytes,
 		Data:        streamedThumbnail.Stream,
-		Filename:    "thumbnail",
+		Filename:    "thumbnail.png",
 	}
 }
diff --git a/api/unstable/blurhash_render.go b/api/unstable/blurhash_render.go
index 9c46c78c17bb6bb63094471ab6e5d720d0af77b3..c1ddeca73ed10f744810bb8262c00a773c16ae00 100644
--- a/api/unstable/blurhash_render.go
+++ b/api/unstable/blurhash_render.go
@@ -64,5 +64,6 @@ func RenderBlurhash(r *http.Request, rctx rcontext.RequestContext, user api.User
 		Filename:    "blurhash.png",
 		SizeBytes:   int64(buf.Len()),
 		Data:        util.BufferToStream(buf), // convert to stream to avoid console spam
+		TargetDisposition: "inline",
 	}
 }
diff --git a/api/unstable/ipfs_download.go b/api/unstable/ipfs_download.go
index 5c33122de4e03be1e0d8b601bcfc7ebb5c5bb35c..62461a29701064398d9d44f336b77b25efd11259 100644
--- a/api/unstable/ipfs_download.go
+++ b/api/unstable/ipfs_download.go
@@ -17,6 +17,15 @@ func IPFSDownload(r *http.Request, rctx rcontext.RequestContext, user api.UserIn
 	server := params["server"]
 	ipfsContentId := params["ipfsContentId"]
 
+	targetDisposition := r.URL.Query().Get("org.matrix.msc2702.asAttachment")
+	if targetDisposition == "true" {
+		targetDisposition = "attachment"
+	} else if targetDisposition == "false" {
+		targetDisposition = "inline"
+	} else {
+		targetDisposition = "infer"
+	}
+
 	rctx = rctx.LogWithFields(logrus.Fields{
 		"ipfsContentId": ipfsContentId,
 		"server":        server,
@@ -29,9 +38,10 @@ func IPFSDownload(r *http.Request, rctx rcontext.RequestContext, user api.UserIn
 	}
 
 	return &r0.DownloadMediaResponse{
-		ContentType: obj.ContentType,
-		Filename:    obj.FileName,
-		SizeBytes:   obj.SizeBytes,
-		Data:        obj.Data,
+		ContentType:       obj.ContentType,
+		Filename:          obj.FileName,
+		SizeBytes:         obj.SizeBytes,
+		Data:              obj.Data,
+		TargetDisposition: targetDisposition,
 	}
 }
diff --git a/api/webserver/route_handler.go b/api/webserver/route_handler.go
index eff475623839247e2b66f236aad69fcd47e2daf6..36b633b6537d6b07b1c013982139c9e56f490034 100644
--- a/api/webserver/route_handler.go
+++ b/api/webserver/route_handler.go
@@ -7,6 +7,7 @@ import (
 	"errors"
 	"fmt"
 	"io"
+	"mime"
 	"net"
 	"net/http"
 	"net/url"
@@ -171,13 +172,38 @@ func (h handler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
 		if result.SizeBytes > 0 {
 			w.Header().Set("Content-Length", fmt.Sprint(result.SizeBytes))
 		}
-		if result.Filename != "" {
-			if is.ASCII(result.Filename) {
-				w.Header().Set("Content-Disposition", "inline; filename="+url.QueryEscape(result.Filename))
+		disposition := result.TargetDisposition
+		if disposition == "" {
+			disposition = "inline"
+		} else if disposition == "infer" {
+			if result.ContentType == "" {
+				disposition = "attachment"
 			} else {
-				w.Header().Set("Content-Disposition", "inline; filename*=utf-8''"+url.QueryEscape(result.Filename))
+				if util.HasAnyPrefix(result.ContentType, []string{"image/", "audio/", "video/"}) {
+					disposition = "inline"
+				} else {
+					disposition = "attachment"
+				}
 			}
 		}
+		fname := result.Filename
+		if fname == "" {
+			exts, err := mime.ExtensionsByType(result.ContentType)
+			if err != nil {
+				exts = nil
+				contextLog.Warn("Unexpected error inferring file extension: " + err.Error())
+			}
+			ext := ""
+			if exts != nil && len(exts) > 0 {
+				ext = exts[0]
+			}
+			fname = "file" + ext
+		}
+		if is.ASCII(result.Filename) {
+			w.Header().Set("Content-Disposition", disposition+"; filename="+url.QueryEscape(fname))
+		} else {
+			w.Header().Set("Content-Disposition", disposition+"; filename*=utf-8''"+url.QueryEscape(fname))
+		}
 		defer result.Data.Close()
 		writeResponseData(w, result.Data, result.SizeBytes)
 		return // Prevent sending conflicting responses
diff --git a/dev/conduit-dev-docker-compose.yaml b/dev/conduit-dev-docker-compose.yaml
index d707ae67092b9e6aaf5c47ab5f54c7e6b889977f..c083cf5cd6f00678244c070233d5d4aca70528f1 100644
--- a/dev/conduit-dev-docker-compose.yaml
+++ b/dev/conduit-dev-docker-compose.yaml
@@ -13,8 +13,6 @@ services:
       ROCKET_PORT: 8004
       ROCKET_REGISTRATION_DISABLED: "false"
       ROCKET_ENCRYPTION_DISABLED: "false"
-    ports:
-      - "8004:8004"
     networks:
       - proxy
   nginx:
@@ -33,8 +31,6 @@ services:
     restart: unless-stopped
     volumes:
       - ./element-config.json:/app/config.json
-    ports:
-      - "8080:80"
     networks:
       - proxy
 networks:
diff --git a/util/strings.go b/util/strings.go
new file mode 100644
index 0000000000000000000000000000000000000000..9ecc3ead3e30ab8e31ec960b4cc02400dba03823
--- /dev/null
+++ b/util/strings.go
@@ -0,0 +1,14 @@
+package util
+
+import (
+	"strings"
+)
+
+func HasAnyPrefix(val string, prefixes []string) bool {
+	for _, p := range prefixes {
+		if strings.HasPrefix(val, p) {
+			return true
+		}
+	}
+	return false
+}