1
0
mirror of https://github.com/moparisthebest/xeps synced 2024-11-21 16:55:07 -05:00
git-svn-id: file:///home/ksmith/gitmigration/svn/xmpp/trunk@2428 4b5297f7-1745-476d-ba37-a9c6900126ab
This commit is contained in:
Peter Saint-Andre 2008-10-22 21:50:52 +00:00
parent e244b97f02
commit 91def8a4d0
3 changed files with 3 additions and 3 deletions

View File

@ -10,7 +10,7 @@
<abstract>This document recommends a number of practices that can help discourage denial of service attacks on XMPP-based networks.</abstract> <abstract>This document recommends a number of practices that can help discourage denial of service attacks on XMPP-based networks.</abstract>
&LEGALNOTICE; &LEGALNOTICE;
<number>0205</number> <number>0205</number>
<status>Experimental</status> <status>Proposed</status>
<type>Informational</type> <type>Informational</type>
<sig>Standards</sig> <sig>Standards</sig>
<dependencies> <dependencies>

View File

@ -10,7 +10,7 @@
<abstract>This specification defines the Server Dialback protocol, which is used between XMPP servers to provide identity verification. Server Dialback uses the Domain Name System (DNS) as the basis for verifying identity; the basic approach is that when a receiving server receives a server-to-server connection request from an originating server, it does not accept the request until it has verified a key with an authoritative server for the domain asserted by the originating server. Although Server Dialback does not provide strong authentication or trusted federation and although it is subject to DNS poisoning attacks, it has effectively prevented most instances of address spoofing on the XMPP network since its development in the year 2000.</abstract> <abstract>This specification defines the Server Dialback protocol, which is used between XMPP servers to provide identity verification. Server Dialback uses the Domain Name System (DNS) as the basis for verifying identity; the basic approach is that when a receiving server receives a server-to-server connection request from an originating server, it does not accept the request until it has verified a key with an authoritative server for the domain asserted by the originating server. Although Server Dialback does not provide strong authentication or trusted federation and although it is subject to DNS poisoning attacks, it has effectively prevented most instances of address spoofing on the XMPP network since its development in the year 2000.</abstract>
&LEGALNOTICE; &LEGALNOTICE;
<number>0220</number> <number>0220</number>
<status>Experimental</status> <status>Proposed</status>
<type>Standards Track</type> <type>Standards Track</type>
<sig>Standards</sig> <sig>Standards</sig>
<approver>Council</approver> <approver>Council</approver>

View File

@ -10,7 +10,7 @@
<abstract>This document defines an XMPP protocol extension for getting the attention of another user.</abstract> <abstract>This document defines an XMPP protocol extension for getting the attention of another user.</abstract>
&LEGALNOTICE; &LEGALNOTICE;
<number>0224</number> <number>0224</number>
<status>Experimental</status> <status>Proposed</status>
<type>Standards Track</type> <type>Standards Track</type>
<sig>Standards</sig> <sig>Standards</sig>
<approver>Council</approver> <approver>Council</approver>