From 06d872451449627244105e98918dd09cdd944bdf Mon Sep 17 00:00:00 2001 From: Ian Paterson Date: Wed, 30 May 2007 14:11:34 +0000 Subject: [PATCH] 0.6 RC1 both isPKA and isPKB git-svn-id: file:///home/ksmith/gitmigration/svn/xmpp/trunk@870 4b5297f7-1745-476d-ba37-a9c6900126ab --- xep-0188.xml | 20 +++++++++++++------- 1 file changed, 13 insertions(+), 7 deletions(-) diff --git a/xep-0188.xml b/xep-0188.xml index 43d63c3e..ba289de3 100644 --- a/xep-0188.xml +++ b/xep-0188.xml @@ -67,6 +67,12 @@ None cryptoesession &ianpaterson; + + 0.6 + 2007-05-30 + ip +

SIGMA-R negotiates both isPKA and isPKB fields

+
0.5 2007-04-20 @@ -100,7 +106,7 @@ -

Note: The protocols developed according to the cryptographic design described in this document are described in &xep0116;, &xep0187; and &xep0200;. The information in those documents should be sufficient for implementors. This purely informative document is primarily for people interested in the design and analysis of those protocols.

+

Note: The protocols developed according to the cryptographic design described in this document are described in &xep0116;, &xep0217;, &xep0187; and &xep0200;. The information in those documents should be sufficient for implementors. This purely informative document is primarily for people interested in the design and analysis of those protocols.

As specified in &rfc3920;, XMPP is an XML streaming protocol that enables the near-real-time exchange of XML fragments between any two (or more) network endpoints. To date, the main application built on top of the core XML streaming layer is instant messaging (IM) and presence, the base extensions for which are specified in &rfc3921;. There are three first-level elements of XML streams (&MESSAGE;, &PRESENCE;, and &IQ;); each of these "XML stanza" types has different semantics, which can complicate the task of defining a generalized approach to end-to-end encryption for XMPP. In addition, XML stanzas can be extended (via properly-namespaced child elements) for a wide variety of functionality.

XMPP is a session-oriented communication technology: normally, a client authenticates with a server and maintains a long-lived connection that defines the client's XMPP session. Such stream-level sessions may be secured via channel encryption using Transport Level Security (&rfc2246;), as specified in Section 5 of RFC 3920. However, there is no guarantee that all hops will implement or enforce channel encryption (or that intermediate servers are trustworthy), which makes end-to-end encryption desirable.

This document specifies a method for encrypted sessions ("ESessions") that takes advantage of the inherent possibilities and strengths of session encryption as opposed to object encryption. The detailed requirements for encrypted sessions are defined in &xep0210;.

@@ -393,7 +399,7 @@ K = HASH(&dsupx; mod p)

The Short Authentication String technique enables protection against a Man in the Middle without the need to generate, distribute or authenticate any public keys. As long as a hash commitment is used at the start of the key exchange then only a short human-friendly string needs to be verified out-of-band (e.g. by recognizable voice communication).

Furthermore, if retained secrets associated with a client/user combination are employed consistently during key exchanges, then the Man in the Middle would need to be present for every session, including the first, and the out-of-band verification would only need to be performed once to verify the absence of a Man in the Middle for all sessions between the parties (past, present and future). This combination of techniques underpins the ZRTP key agreement protocol.

-

Public keys are optional in the diagram below. It describes the same SIGMA-R with SAS key exchange protocol as the SIGMA-R Overview. It provides much more detail including the use of retained secrets and other secrets. Note: These optional security enhancements are especially important when the protocol is being used without public keys.

+

Public keys are optional in the diagram below. It describes the same SIGMA-R with SAS key exchange protocol as the SIGMA-R Overview. It provides much more detail including the use of retained secrets and other secrets. The use of public keys is negotiated in the first two messages. Note: These optional security enhancements are especially important when the protocol is being used without public keys.

The diagram does not specify any ESession-specific details. The differences between it and the SIGMA-I Key Exchange are highlighted.

 ALICE                                        BOB 
@@ -404,7 +410,7 @@ e = &gsupx; mod p
 He = SHA256(e)
                                He, &isPKsubA;
                              ------------>
-                                   &NsubA; 
+                               &isPKsubB;, &NsubA; 
                                              &NsubB; = random()
                                              &CsubA; = random()
                                              &CBeCAx2n1; 
@@ -412,7 +418,7 @@ e = &gsupx; mod p
                                              d = &gsupy; mod p
                                d, &CsubA;, &NsubB;
                              <------------
-                                 &isPKsubB; 
+                              &isPKsubA;, &isPKsubB; 
 &CBeCAx2n1; 
 assert 1 < d < p-1
 K = HASH(&dsupx; mod p)
@@ -635,19 +641,19 @@ VERIFY(&signB;, &pubKeyB;, &macB;) 
     x = random()
     e = &gsupx; mod p
     He = SHA256(e) 
-&formA; = {&He1HeZ;, options, &NsubA;, &isPKsubA;}
+&formA; = {&He1HeZ;, options, &NsubA;}
 
                                  &formA;
                              ------------>
 
-                                           chosen = {p,g,HASH,CIPHER,SIGN,SASGEN...} = choose(options)
+                                           chosen = {p,g,HASH,CIPHER,SIGN,SASGEN,&isPKsubA;,&isPKsubB;...} = choose(options)
                                            He = choose(&He1HeZ;, p)
                                            &NsubB; = random()
                                            &CsubA; = random()
                                            &CBeCAx2n1; 
                                            y = random()
                                            d = &gsupy; mod p
-                                           &formB; = {&CsubA;, chosen, d, &NsubA;, &NsubB;, &isPKsubB;}
+                                           &formB; = {&CsubA;, chosen, d, &NsubA;, &NsubB;}
                                  &formB;
                              <------------
 assert chosen ∈ options