From 4290e43d628fd9fd74ebd1473321c15cc93b4824 Mon Sep 17 00:00:00 2001 From: "Matthew A. Miller" Date: Wed, 6 Aug 2014 08:11:39 -0600 Subject: [PATCH] XEP-0220 v1.1 - correcting minor typos --- xep-0220.xml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xep-0220.xml b/xep-0220.xml index d1f79f0b..6a71f07f 100644 --- a/xep-0220.xml +++ b/xep-0220.xml @@ -7,7 +7,7 @@
Server Dialback - This specification defines the Server Dialback protocol, which is used between XMPP servers to provide identity verification. Server Dialback uses the Domain Name System (DNS) as the basis for verifying identity; the basic approach is that when a receiving server accepts a server-to-server connection from an initiating server, it does not process XMPP stanzas over the connection until it has verified the initiating server's identity. Additionally, the protocol is used to negotitate whether the receiving server is accepting stanzas for the target domain. Although Server Dialback does not provide strong authentication and is subject to DNS poisoning attacks, it has effectively prevented most address spoofing on the XMPP network since its development in the year 2000. + This specification defines the Server Dialback protocol, which is used between XMPP servers to provide identity verification. Server Dialback uses the Domain Name System (DNS) as the basis for verifying identity; the basic approach is that when a receiving server accepts a server-to-server connection from an initiating server, it does not process XMPP stanzas over the connection until it has verified the initiating server's identity. Additionally, the protocol is used to negotiate whether the receiving server is accepting stanzas for the target domain. Although Server Dialback does not provide strong authentication and is subject to DNS poisoning attacks, it has effectively prevented most address spoofing on the XMPP network since its development in the year 2000. &LEGALNOTICE; 0220 Draft