mirror of
https://github.com/moparisthebest/xeps
synced 2024-11-25 02:32:18 -05:00
Merge pull request #230 from Kev/eme
Inbox: Add Explicit Message Encryption XEP.
This commit is contained in:
commit
79f712ab3a
256
inbox/eme.xml
Normal file
256
inbox/eme.xml
Normal file
@ -0,0 +1,256 @@
|
|||||||
|
<?xml version='1.0' encoding='UTF-8'?>
|
||||||
|
<!DOCTYPE xep SYSTEM 'xep.dtd' [
|
||||||
|
<!ENTITY % ents SYSTEM 'xep.ent'>
|
||||||
|
%ents;
|
||||||
|
]>
|
||||||
|
<?xml-stylesheet type='text/xsl' href='xep.xsl'?>
|
||||||
|
<xep>
|
||||||
|
<header>
|
||||||
|
<title>Explicit Message Encryption</title>
|
||||||
|
<abstract>This specification provides a way to mark encrypted messages so the
|
||||||
|
recipient can discover how to decrypt it.</abstract>
|
||||||
|
&LEGALNOTICE;
|
||||||
|
<number>xxxx</number>
|
||||||
|
<status>ProtoXEP</status>
|
||||||
|
<type>Standards Track</type>
|
||||||
|
<sig>Standards</sig>
|
||||||
|
<approver>Council</approver>
|
||||||
|
<dependencies>
|
||||||
|
<spec>XMPP Core</spec>
|
||||||
|
<spec>XMPP IM</spec>
|
||||||
|
<spec>XEP-0030</spec>
|
||||||
|
</dependencies>
|
||||||
|
<supersedes/>
|
||||||
|
<supersededby/>
|
||||||
|
<shortname>EME</shortname>
|
||||||
|
<author>
|
||||||
|
<firstname>Emmanuel Gil</firstname>
|
||||||
|
<surname>Peyrot</surname>
|
||||||
|
<email>linkmauve@linkmauve.fr</email>
|
||||||
|
<jid>linkmauve@linkmauve.fr</jid>
|
||||||
|
</author>
|
||||||
|
<revision>
|
||||||
|
<version>0.0.1</version>
|
||||||
|
<date>2016-08-14</date>
|
||||||
|
<initials>egp</initials>
|
||||||
|
<remark><p>First draft.</p></remark>
|
||||||
|
</revision>
|
||||||
|
</header>
|
||||||
|
|
||||||
|
<section1 topic='Introduction' anchor='intro'>
|
||||||
|
<p>In the past few years we have seen a strong interest in end to end
|
||||||
|
encryption, with multiple competing mechanisms being defined on top of
|
||||||
|
XMPP (e.g., &xep0027;, &xep0364; or &xep0373;). This specification
|
||||||
|
addresses the lack of proper discoverability of most of these solutions by
|
||||||
|
adding a machine-readable explanation of how a specific message has been
|
||||||
|
encrypted.</p>
|
||||||
|
<p>In a federated network where no central entity can mandate a particular
|
||||||
|
encryption mechanism, it becomes important to allow end users to know that
|
||||||
|
a message could not be decrypted (e.g., due to a missing plugin), and to
|
||||||
|
never fail to display that a message has been received due to that.</p>
|
||||||
|
</section1>
|
||||||
|
|
||||||
|
<section1 topic='Requirements' anchor='reqs'>
|
||||||
|
<p>This document addresses the following requirements:</p>
|
||||||
|
<ol>
|
||||||
|
<li>Enable a client to mark a message as encrypted.</li>
|
||||||
|
<li>Enable a client to determine whether a message was encrypted, no matter
|
||||||
|
the encryption mechanism used.</li>
|
||||||
|
<li>Enable a client to offer the user a possibility to decrypt a received
|
||||||
|
message (depending on the encryption method).</li>
|
||||||
|
<li>Enable a client to offer the user a possibility to decrypt subsequently
|
||||||
|
received messages.</li>
|
||||||
|
</ol>
|
||||||
|
<p>This document DOES NOT address the non-message usecases, encrypted
|
||||||
|
presence and iq have very different requirements than those defined
|
||||||
|
here.</p>
|
||||||
|
</section1>
|
||||||
|
|
||||||
|
<section1 topic='Use Cases' anchor='usecases'>
|
||||||
|
<section2 topic='Basic Flow' anchor='flow'>
|
||||||
|
<p>Romeo, wanting to get Juliet’s attention but not wanting to reveal his
|
||||||
|
intentions to the montague.lit nor to the capulet.lit servers, sends an
|
||||||
|
encrypted message tagged as OTR, as follows:</p>
|
||||||
|
<example caption='Example of tagged message encrypted with OTR'><![CDATA[
|
||||||
|
<message to='juliet@capulet.lit/balcony'
|
||||||
|
from='romeo@montague.lit/orchard'
|
||||||
|
id='secret1'>
|
||||||
|
<body>?OTR?v23?...</body>
|
||||||
|
<encryption xmlns='urn:xmpp:eme:0'
|
||||||
|
name='OTR'
|
||||||
|
namespace='urn:xmpp:otr:0'/>
|
||||||
|
</message>
|
||||||
|
]]></example>
|
||||||
|
|
||||||
|
<p>Juliet’s client, noticing it does not have any OTR capability, will
|
||||||
|
display that the message was encrypted but that it is not able to decrypt
|
||||||
|
it instead of displaying the body, for example:</p>
|
||||||
|
<div class='example'>
|
||||||
|
<p>🔒 This message was encrypted with OTR and could not be decrypted.</p>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<p>Juliet may then communicate to Romeo that she was unable to receive his
|
||||||
|
message, through an error, or maybe out of band.</p>
|
||||||
|
<p>Romeo, standing firm in his belief that they should not communicate
|
||||||
|
without encryption in their world where anyone could be a malicious
|
||||||
|
listener, then discovers that one of Juliet’s clients support &xep0373; and
|
||||||
|
subsequently starts an encrypted session using that protocol.</p>
|
||||||
|
<example caption='Example of tagged message encrypted with OX'><![CDATA[
|
||||||
|
<message to='juliet@capulet.lit/balcony'
|
||||||
|
from='romeo@montague.lit/orchard'
|
||||||
|
id='secret2'>
|
||||||
|
<openpgp xmlns='urn:xmpp:openpgp:0'>
|
||||||
|
...
|
||||||
|
</openpgp>
|
||||||
|
<body>This message is encrypted with OpenPGP for XMPP.</body>
|
||||||
|
<encryption xmlns='urn:xmpp:eme:0'
|
||||||
|
name='OpenPGP for XMPP'
|
||||||
|
namespace='urn:xmpp:openpgp:0'/>
|
||||||
|
</message>
|
||||||
|
]]></example>
|
||||||
|
|
||||||
|
<p>Upon receiving this message, Juliet’s current client prompts her to enable
|
||||||
|
a plugin, or even do it on its own, possible representations include:</p>
|
||||||
|
<div class='example'>
|
||||||
|
<p>🔒 This message was encrypted with OpenPGP for XMPP, <link url="#">click
|
||||||
|
here</link> to enable this plugin.</p>
|
||||||
|
</div>
|
||||||
|
<div class='example'>
|
||||||
|
<p>🔒 This message was encrypted with OpenPGP for XMPP, downloading and
|
||||||
|
installing an appropriate plugin, your message will be displayed
|
||||||
|
shortly.</p>
|
||||||
|
</div>
|
||||||
|
</section2>
|
||||||
|
|
||||||
|
<section2 topic='Protocols Supported' anchor='protocols'>
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Name</th>
|
||||||
|
<th>Namespace</th>
|
||||||
|
<th>Specification</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>OTR</td>
|
||||||
|
<td>urn:xmpp:otr:0</td>
|
||||||
|
<td>&xep0364;</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Legacy OpenPGP</td>
|
||||||
|
<td>jabber:x:encrypted</td>
|
||||||
|
<td>&xep0027;</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>OpenPGP for XMPP</td>
|
||||||
|
<td>urn:xmpp:openpgp:0</td>
|
||||||
|
<td>&xep0373;</td>
|
||||||
|
</tr>
|
||||||
|
<!--<tr>
|
||||||
|
<td>OMEMO</td>
|
||||||
|
<td>urn:xmpp:omemo:0</td>
|
||||||
|
<td>https://conversations.im/xeps/multi-end.html</td>
|
||||||
|
</tr>-->
|
||||||
|
</table>
|
||||||
|
</section2>
|
||||||
|
|
||||||
|
<section2 topic='Determining Support' anchor='disco'>
|
||||||
|
<p>If an entity supports the Encrypted Message Extension protocol, it MUST
|
||||||
|
report that by including a &xep0030; feature of "urn:xmpp:eme:0" in
|
||||||
|
response to disco#info requests:</p>
|
||||||
|
<example caption='Client queries for entity features'><![CDATA[
|
||||||
|
<iq type='get'
|
||||||
|
id='disco1'
|
||||||
|
to='juliet@capulet.lit/balcony'
|
||||||
|
from='romeo@montague.lit/orchard'>
|
||||||
|
<query xmlns='http://jabber.org/protocol/disco#info'/>
|
||||||
|
</iq>
|
||||||
|
]]></example>
|
||||||
|
|
||||||
|
<example caption='Entity responds with features'><![CDATA[
|
||||||
|
<iq type='result'
|
||||||
|
id='disco1'
|
||||||
|
to='romeo@montague.lit/orchard'
|
||||||
|
from='juliet@capulet.lit/balcony'>
|
||||||
|
<query xmlns='http://jabber.org/protocol/disco#info'>
|
||||||
|
...
|
||||||
|
<feature var='urn:xmpp:eme:0'/>
|
||||||
|
...
|
||||||
|
</query>
|
||||||
|
</iq>
|
||||||
|
]]></example>
|
||||||
|
|
||||||
|
<p>Support can also be determined via &xep0115;, a.k.a. "caps".</p>
|
||||||
|
</section2>
|
||||||
|
</section1>
|
||||||
|
|
||||||
|
<section1 topic='Business Rules' anchor='rules'>
|
||||||
|
<p>Entities MUST report a failure to the user if they cannot decrypt an
|
||||||
|
incoming message for any reason, and MAY prompt the user to install or
|
||||||
|
enable a plugin to decrypt it.</p>
|
||||||
|
<p>Entities SHOULD include a non-encrypted body as possible, since older
|
||||||
|
clients not supporting this protocol might otherwise ignore messages sent
|
||||||
|
with an unknown encryption, making both the sender frustrated that their
|
||||||
|
message did not get an answer, and the recipient frustrated that they never
|
||||||
|
saw any message.</p>
|
||||||
|
<p>A sender entity MAY include the <encryption/> element even if the
|
||||||
|
recipient doesn’t advertise support for it in their disco, or isn’t
|
||||||
|
currently connected, since the recipient may be using multiple clients with
|
||||||
|
different capabilities.</p>
|
||||||
|
</section1>
|
||||||
|
|
||||||
|
<section1 topic='Internationalization Considerations' anchor='i18n'>
|
||||||
|
<p>When a message is marked with an encryption tag and can not be decrypted,
|
||||||
|
the body can safely be ignored and a localized message displayed
|
||||||
|
instead.</p>
|
||||||
|
</section1>
|
||||||
|
|
||||||
|
<section1 topic='Security Considerations' anchor='security'>
|
||||||
|
<p>A malicious entity could try to mimick the style of a client’s failure
|
||||||
|
message, maybe including a link to a compromised plugin, so a client should
|
||||||
|
not make those missing plugin messages look like normal messages.</p>
|
||||||
|
</section1>
|
||||||
|
|
||||||
|
<section1 topic='IANA Considerations' anchor='iana'>
|
||||||
|
<p>This document requires no interaction with the Internet Assigned Numbers
|
||||||
|
Authority (IANA).</p>
|
||||||
|
</section1>
|
||||||
|
|
||||||
|
<section1 topic='XMPP Registrar Considerations' anchor='registrar'>
|
||||||
|
<section2 topic='Protocol Namespaces' anchor='registrar-ns'>
|
||||||
|
<p>This specification defines the following XML namespace:</p>
|
||||||
|
<ul>
|
||||||
|
<li>'urn:xmpp:eme:0'</li>
|
||||||
|
</ul>
|
||||||
|
</section2>
|
||||||
|
</section1>
|
||||||
|
|
||||||
|
<section1 topic='XML Schema' anchor='schema'>
|
||||||
|
<code><![CDATA[
|
||||||
|
<?xml version='1.0' encoding='UTF-8'?>
|
||||||
|
|
||||||
|
<xs:schema attributeFormDefault="unqualified"
|
||||||
|
elementFormDefault="qualified"
|
||||||
|
targetNamespace="urn:xmpp:eme:0"
|
||||||
|
xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||||
|
|
||||||
|
<xs:annotation>
|
||||||
|
<xs:documentation>
|
||||||
|
The protocol documented by this schema is defined in
|
||||||
|
XEP-xxxx: http://xmpp.org/extensions/xep-xxxx.html
|
||||||
|
</xs:documentation>
|
||||||
|
</xs:annotation>
|
||||||
|
|
||||||
|
<xs:element name="encryption">
|
||||||
|
<xs:complexType>
|
||||||
|
<xs:attribute type="xs:string" use="required" name="name"/>
|
||||||
|
<xs:attribute type="xs:string" use="required" name="namespace"/>
|
||||||
|
</xs:complexType>
|
||||||
|
</xs:element>
|
||||||
|
|
||||||
|
</xs:schema>
|
||||||
|
]]></code>
|
||||||
|
</section1>
|
||||||
|
|
||||||
|
<section1 topic='Acknowledgements' anchor='ack'>
|
||||||
|
<p>Thanks to Mathieu Pasquet for his feedback.</p>
|
||||||
|
</section1>
|
||||||
|
</xep>
|
Loading…
Reference in New Issue
Block a user