From 11dcbd19f15320e205f7fd514de3eb253512980c Mon Sep 17 00:00:00 2001
From: Melvin Keskin
Date: Sat, 19 Dec 2020 12:16:43 +0100
Subject: [PATCH] XEP-0434: Release version 0.3.0
Clarify usage, use real namespace for examples and add missing section:
* Clarify usage of trust messages by protocols such as Automatic Trust Management (ATM)
* Use namespace 'urn:xmpp:atm:0' of Automatic Trust Management (ATM) as example for 'usage' attribute.
* Add section 'Security Considerations'
---
xep-0434.xml | 28 ++++++++++++++++++++++++----
1 file changed, 24 insertions(+), 4 deletions(-)
diff --git a/xep-0434.xml b/xep-0434.xml
index 26b9607b..fe6063f2 100644
--- a/xep-0434.xml
+++ b/xep-0434.xml
@@ -2,7 +2,7 @@
-
+
%ents;
@@ -36,6 +36,19 @@
melvo@olomono.de
melvo@olomono.de
+
+ 0.3.0
+ 2020-12-19
+ melvo
+
+ Clarify usage, use real namespace for examples and add missing section:
+
+ - Clarify usage of trust messages by protocols such as &xep0450;
+ - Use namespace 'urn:xmpp:atm:0' of &xep0450; as example for 'usage' attribute.
+ - Add section 'Security Considerations'
+
+
+
0.2.0
2020-11-05
@@ -124,6 +137,7 @@
Trust messages can be used in conjunction with an end-to-end encryption protocol such as &xep0373; or &xep0384; to automatically or semi-automatically establish secure channels protected against active attacks.
+ This protocol specifies how trust messages are transmitted and protocols such as &xep0450; specify how and for which purpose they are processed.
@@ -244,8 +258,8 @@
In the following example, two &xep0384; keys of Alice are indicated as trusted, one key of Bob is indicated as trusted and two other ones of Bob are indicated as untrusted.
- &ns;&ns-example-usage;&ns-omemo;
+ &ns;&ns-atm;&ns-omemo;
6850019d7ed0feb6d3823072498ceb4f616c6025586f8f666dc6b9c81ef7e0a4
221a4f8e228b72182b006e5ca527d3bddccf8d9e6feaf4ce96e1c451e8648020
@@ -310,7 +324,7 @@
-
+
6850019d7ed0feb6d3823072498ceb4f616c6025586f8f666dc6b9c81ef7e0a4
221a4f8e228b72182b006e5ca527d3bddccf8d9e6feaf4ce96e1c451e8648020
@@ -353,6 +367,12 @@
Keep in mind that a trust message SHOULD only be encrypted for endpoints with authenticated keys.
+
+
+ Protocols using trust messages SHOULD specify rules for processing them in order to create or sustain a secure communication.
+ Therefore, those protocols SHOULD state in which cases from which senders trust messages are used for making trust decisions and for which keys they are sent to whom.
+
+
This document requires no interaction with the Internet Assigned Numbers Authority (IANA).