From 3613848b1908f026abf8baf2257747844739c626 Mon Sep 17 00:00:00 2001 From: Peter Saint-Andre Date: Mon, 23 Jul 2012 14:13:20 -0600 Subject: [PATCH] 0.4 --- xep-0288.xml | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/xep-0288.xml b/xep-0288.xml index 4a9bac36..8ceb8d34 100755 --- a/xep-0288.xml +++ b/xep-0288.xml @@ -33,6 +33,12 @@ dave.cridland@isode.com dave.cridland@isode.com + + 0.4 + 2012-06-28 + ph +

Added security note about dealing with unexpected <db:result type='valid'/> elements

+
0.3 2012-03-07 @@ -96,7 +102,6 @@ http://www.ietf.org/mail-archive/web/xmpp/current/msg00664.html ]]> -

Note: Since there is no reply to the request, it is possible to pipeline it.

After enabling bidirectionality, the connecting server continues to authenticate via SASL or requests to send stanzas for a domain pair with Server Dialback. The receiving server MUST NOT send stanzas to the peer before it has authenticated via SASL, or the peer's identity has been verified via Server Dialback. Note that the receiving server MUST NOT attempt to verify a dialback key on the same connection where the corresponding request was issued.

Also note that the receiving server MUST only send stanzas for which it has been authenticated - in the case of TLS/SASL based authentication, this is the value of the stream's 'to' attribute, whereas in the case of Server Dialback this is the inverse of any domain pair that has been used in a dialback request.

Finally, once bidirectionality is enabled, the receiving server MAY initiate Server Dialback authentications for other domains it hosts to any domain authenticated to be hosted by the connecting server. In particular, it may initiate Target Piggybacking for any target domain that has successfully been used as a source domain by the connecting server. Note that this implies that a connecting server that uses bidi and dialback MUST support dialback error conditions as defined in XEP 0220Ideally, support for dialback errors would be signalled by a proper extension mechanism such as <stream:features/>. However, these are currently only sent from the receiving server to the connecting server and can therefore not be used for signalling support for dialback errors in the other direction..

@@ -205,8 +210,9 @@ C: ]]> -

This specification introduces no security considerations above and beyond those discussed in RFC 3920.

+

This specification introduces no security considerations above and beyond those discussed in RFC 6120 or XEP-0220. + Note that when using Server Dialback, a server must be very careful when receiving a <db:result/> of type 'valid' without having sent a corresponding request to add the domain pair given by the 'from' and 'to' attributes. In particular it MUST NOT route stanzas to the domain given in the elements 'from' attribute over this XML stream without further proof of the peers identity.