diff --git a/xep-0115.xml b/xep-0115.xml index 5235c7a9..1f7348ca 100644 --- a/xep-0115.xml +++ b/xep-0115.xml @@ -34,6 +34,12 @@ jajcus@jajcus.net jajcus@jabber.bnet.pl + + 1.6.0 + 2022-03-08 + ssw +

Mention preimage attacks explicitly

+
1.5.2 2020-05-05 @@ -602,7 +608,7 @@ <warning; -

Adherence to the method defined in the Verification String section of this document for both generation and processing of the 'ver' attribute helps to guard against poisoning of entity capabilities information by malicious or improperly implemented entities.

+

Adherence to the method defined in the Verification String section of this document for processing of the 'ver' attribute is known to be vulnerable to certain cache poisoning attacks that can not be fixed in a backwards compatible manner [Security] Trivial preimage attack against the entity capabilities protocol..

If the value of the 'ver' attribute is a verification string as defined herein (i.e., if the 'ver' attribute is not generated according to the Legacy Format), inclusion of the 'hash' attribute is REQUIRED. Knowing explicitly that the value of the 'ver' attribute is a verification string enables the recipient to avoid spurious notification of invalid or poisoned hashes.