mirror of
https://github.com/moparisthebest/xeps
synced 2024-11-25 02:32:18 -05:00
Proposed
git-svn-id: file:///home/ksmith/gitmigration/svn/xmpp/trunk@2428 4b5297f7-1745-476d-ba37-a9c6900126ab
This commit is contained in:
parent
e244b97f02
commit
91def8a4d0
@ -10,7 +10,7 @@
|
|||||||
<abstract>This document recommends a number of practices that can help discourage denial of service attacks on XMPP-based networks.</abstract>
|
<abstract>This document recommends a number of practices that can help discourage denial of service attacks on XMPP-based networks.</abstract>
|
||||||
&LEGALNOTICE;
|
&LEGALNOTICE;
|
||||||
<number>0205</number>
|
<number>0205</number>
|
||||||
<status>Experimental</status>
|
<status>Proposed</status>
|
||||||
<type>Informational</type>
|
<type>Informational</type>
|
||||||
<sig>Standards</sig>
|
<sig>Standards</sig>
|
||||||
<dependencies>
|
<dependencies>
|
||||||
|
@ -10,7 +10,7 @@
|
|||||||
<abstract>This specification defines the Server Dialback protocol, which is used between XMPP servers to provide identity verification. Server Dialback uses the Domain Name System (DNS) as the basis for verifying identity; the basic approach is that when a receiving server receives a server-to-server connection request from an originating server, it does not accept the request until it has verified a key with an authoritative server for the domain asserted by the originating server. Although Server Dialback does not provide strong authentication or trusted federation and although it is subject to DNS poisoning attacks, it has effectively prevented most instances of address spoofing on the XMPP network since its development in the year 2000.</abstract>
|
<abstract>This specification defines the Server Dialback protocol, which is used between XMPP servers to provide identity verification. Server Dialback uses the Domain Name System (DNS) as the basis for verifying identity; the basic approach is that when a receiving server receives a server-to-server connection request from an originating server, it does not accept the request until it has verified a key with an authoritative server for the domain asserted by the originating server. Although Server Dialback does not provide strong authentication or trusted federation and although it is subject to DNS poisoning attacks, it has effectively prevented most instances of address spoofing on the XMPP network since its development in the year 2000.</abstract>
|
||||||
&LEGALNOTICE;
|
&LEGALNOTICE;
|
||||||
<number>0220</number>
|
<number>0220</number>
|
||||||
<status>Experimental</status>
|
<status>Proposed</status>
|
||||||
<type>Standards Track</type>
|
<type>Standards Track</type>
|
||||||
<sig>Standards</sig>
|
<sig>Standards</sig>
|
||||||
<approver>Council</approver>
|
<approver>Council</approver>
|
||||||
|
@ -10,7 +10,7 @@
|
|||||||
<abstract>This document defines an XMPP protocol extension for getting the attention of another user.</abstract>
|
<abstract>This document defines an XMPP protocol extension for getting the attention of another user.</abstract>
|
||||||
&LEGALNOTICE;
|
&LEGALNOTICE;
|
||||||
<number>0224</number>
|
<number>0224</number>
|
||||||
<status>Experimental</status>
|
<status>Proposed</status>
|
||||||
<type>Standards Track</type>
|
<type>Standards Track</type>
|
||||||
<sig>Standards</sig>
|
<sig>Standards</sig>
|
||||||
<approver>Council</approver>
|
<approver>Council</approver>
|
||||||
|
Loading…
Reference in New Issue
Block a user