From 4f1ba816d4b608503e5536da6754b5425ee8510d Mon Sep 17 00:00:00 2001 From: Sam Whited Date: Tue, 21 Apr 2020 11:08:39 -0400 Subject: [PATCH] Fix some references in Password Storage ProtoXEP --- xep-0438.xml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/xep-0438.xml b/xep-0438.xml index 8e05aca7..e0375060 100644 --- a/xep-0438.xml +++ b/xep-0438.xml @@ -5,7 +5,7 @@ RFC 2195 RFC 2195: IMAP/POP AUTHorize Extension for Simple Challenge/Response <http://tools.ietf.org/html/rfc2195>." > RFC 7677 RFC 7677: SCRAM-SHA-256 and SCRAM-SHA-256-PLUS Simple Authentication and Security Layer (SASL) Mechanisms <http://tools.ietf.org/html/rfc7677>." > RFC 8018 RFC 8018: PKCS #5: Password-Based Cryptography Specification Version 2.1 <http://tools.ietf.org/html/rfc8018>." > - RFC 8265 RFC 8265: PRECIS Framework: Preparation, Enforcement, and Comparison of Internationalized Strings in Application ProtocolePRECIS Framework: Preparation, Enforcement, and Comparison of Internationalized Strings in Application Protocolsration, Enforcement, and Comparison of Internationalized Strings Representing Usernames and Passwords <http://tools.ietf.org/html/rfc8265>." > + RFC 8265 RFC 8265: Preparation, Enforcement, and Comparison of Internationalized Strings Representing Usernames and Passwords <http://tools.ietf.org/html/rfc8265>." > Digital Identity Guidelines Digital Identity Guidelines, NIST Special Publication 800-63-3 <https://doi.org/10.6028/NIST.SP.800-63-3>." > Digital Identity Guidelines: Authentication and Lifecycle Management Digital Identity Guidelines: Authentication and Lifecycle Management, NIST Special Publication 800-63B <https://doi.org/10.6028/NIST.SP.800-63b>." > Recommendation for Password-Based Key Derivation, Part 1: Storage Applications Recommendation for Password-Based Key Derivation, Part 1: Storage Applications, NIST Special Publication 800-132 <https://doi.org/10.6028/NIST.SP.800-132>." > @@ -136,7 +136,7 @@

Clients maintain a list of preferred SASL mechanisms, generally ordered by - perceived strength to enable strong authentication (RFC 6120 §6.3.3 + perceived strength to enable strong authentication (&rfc6120; §6.3.3 Mechanism Preferences). To prevent downgrade attacks by a malicious actor that has successfully man in the middled a connection, or compromised a trusted server's