mirror of
https://github.com/moparisthebest/xeps
synced 2024-11-28 12:12:22 -05:00
0.15rc1
This commit is contained in:
parent
4422e0245a
commit
be578b4522
222
xep-0220.xml
222
xep-0220.xml
@ -7,10 +7,11 @@
|
|||||||
<xep>
|
<xep>
|
||||||
<header>
|
<header>
|
||||||
<title>Server Dialback</title>
|
<title>Server Dialback</title>
|
||||||
<abstract>This specification defines the Server Dialback protocol, which is used between XMPP servers to provide identity verification. Server Dialback uses the Domain Name System (DNS) as the basis for verifying identity; the basic approach is that when a receiving server accepts a server-to-server connection from an initiating server, it does not process traffic over the connection until it has verified the initiating server's key with an authoritative server for the domain asserted by the initiating server. Additionally, the protocol is used to negotitate whether the receiving server is accepting stanzas for the target domain. Although Server Dialback does not provide strong authentication and it is subject to DNS poisoning attacks, it has effectively prevented address spoofing on the XMPP network since its development in the year 2000.</abstract>
|
<abstract>This specification defines the Server Dialback protocol, which is used between XMPP servers to provide identity verification. Server Dialback uses the Domain Name System (DNS) as the basis for verifying identity; the basic approach is that when a receiving server accepts a server-to-server connection from an initiating server, it does not process XMPP stanzas over the connection until it has verified the initiating server's identity. Additionally, the protocol is used to negotitate whether the receiving server is accepting stanzas for the target domain. Although Server Dialback does not provide strong authentication and is subject to DNS poisoning attacks, it has effectively prevented most address spoofing on the XMPP network since its development in the year 2000.</abstract>
|
||||||
&LEGALNOTICE;
|
&LEGALNOTICE;
|
||||||
<number>0220</number>
|
<number>0220</number>
|
||||||
<status>Proposed</status>
|
<status>Proposed</status>
|
||||||
|
<interim/>
|
||||||
<lastcall>2013-05-10</lastcall>
|
<lastcall>2013-05-10</lastcall>
|
||||||
<type>Standards Track</type>
|
<type>Standards Track</type>
|
||||||
<sig>Standards</sig>
|
<sig>Standards</sig>
|
||||||
@ -24,6 +25,12 @@
|
|||||||
&jer;
|
&jer;
|
||||||
&stpeter;
|
&stpeter;
|
||||||
&fippo;
|
&fippo;
|
||||||
|
<revision>
|
||||||
|
<version>0.15rc1</version>
|
||||||
|
<initials>psa/ph</initials>
|
||||||
|
<date>2012-08-26</date>
|
||||||
|
<remark><p>Addressed Last Call feedback and made editorial improvements.</p></remark>
|
||||||
|
</revision>
|
||||||
<revision>
|
<revision>
|
||||||
<version>0.14</version>
|
<version>0.14</version>
|
||||||
<initials>ph</initials>
|
<initials>ph</initials>
|
||||||
@ -162,14 +169,16 @@
|
|||||||
<section2 topic="Why Dialback?" anchor="intro-why">
|
<section2 topic="Why Dialback?" anchor="intro-why">
|
||||||
<p>When Jabber technologies were first developed in 1998, they were conceived of as a client-server system similar to email, wherein a client would connect to a server in order to communicate with other clients. Similarly, servers would connect with peer servers to provide inter-domain communication (often called "federation"). In a system that allows federation, it is important for a server to be able to determine the identity of a peer server. Therefore the Jabber developer community designed a protocol called "Server Dialback" for identity verification based on the Domain Name System (DNS), built support for that protocol into the jabberd 1.2 server (released in October 2000), and mandated support for that protocol on the emerging Jabber server network.</p>
|
<p>When Jabber technologies were first developed in 1998, they were conceived of as a client-server system similar to email, wherein a client would connect to a server in order to communicate with other clients. Similarly, servers would connect with peer servers to provide inter-domain communication (often called "federation"). In a system that allows federation, it is important for a server to be able to determine the identity of a peer server. Therefore the Jabber developer community designed a protocol called "Server Dialback" for identity verification based on the Domain Name System (DNS), built support for that protocol into the jabberd 1.2 server (released in October 2000), and mandated support for that protocol on the emerging Jabber server network.</p>
|
||||||
<p>The basic idea behind Server Dialback is that a receiving server does not accept XMPP traffic from a sending server until it has (a) "called back" the authoritative server for the domain asserted by the sending server and (b) verified that the sending server is truly authorized to generate XMPP traffic for that domain. The protocol also ensures that the receiving server is accepting stanzas for the target domain.</p>
|
<p>The basic idea behind Server Dialback is that a receiving server does not accept XMPP traffic from a sending server until it has (a) "called back" the authoritative server for the domain asserted by the sending server and (b) verified that the sending server is truly authorized to generate XMPP traffic for that domain. The protocol also ensures that the receiving server is accepting stanzas for the target domain.</p>
|
||||||
<p>When the early Jabber protocols were formalized by the XMPP Working Group of the &IETF; in 2002-2004, support for strong identity verification was added (see &rfc3920;). That support takes the form of Transport Layer Security (TLS) for encryption of server-to-server XML streams and the Simple Authentication and Security Layer (SASL) for authentication of such streams, typically using digital certificates issued by trusted root certification authorities (CAs). However, the Server Dialback protocol is still in wide use. In addition, the slow but steady deployment of the DNS security extensions (DNSSEC) &rfc4033; can provide a stronger basis for using Server Dialback.</p>
|
<p>When the early Jabber protocols were formalized by the XMPP Working Group of the &IETF; in 2002-2004, support for strong identity verification was added (see &rfc3920;, since updated by &rfc6120;). That support takes the form of Transport Layer Security (TLS) for encryption of server-to-server XML streams and the Simple Authentication and Security Layer (SASL) for authentication of such streams, typically using digital certificates issued by trusted root certification authorities (CAs). However, the Server Dialback protocol is still in wide use. In addition, the slow but steady deployment of the DNS security extensions (DNSSEC) &rfc4033; can provide a stronger basis for using Server Dialback.</p>
|
||||||
</section2>
|
</section2>
|
||||||
|
|
||||||
<section2 topic="What Dialback Accomplishes" anchor="intro-what">
|
<section2 topic="What Dialback Accomplishes" anchor="intro-what">
|
||||||
<p>Server Dialback is a method for identity verification: if the dialback negotiation succeeds, the receiving server for an XML stream can associate a pair of domain names with the stream; those two domain names are the sender domain asserted by the initiating server and the domain name at the receiving server that the initiating server has indicated it wishes to communicate with.</p>
|
<p>Server Dialback is a method for identity verification: if the dialback negotiation succeeds, the receiving server for an XML stream can associate a pair of domain names with the stream; those two domain names are the sender domain asserted by the initiating server and the domain name at the receiving server that the initiating server has indicated it wishes to communicate with.</p>
|
||||||
<p>The verification accomplished in Server Dialback depends on the Domain Name System (DNS) and the use of keys based on a shared secret known to all XMPP servers within a given administrative domain. It is a proof-of-possession protocol in the sense of &rfc4949; which asserts that the initiating server and the authoritative server are associated with each other. The relative strength or weakness of the verification depends in part on the strength or weakness of the process for resolving the domain names of the authoritative server; in particular, if DNSSEC is not used then Server Dialback results in weak identity verification, whereas if DNSSEC is used then Server Dialback can result in fairly strong identity verification.</p>
|
<p>Traditionally, the verification accomplished in Server Dialback has depended on the Domain Name System (DNS) and the use of keys based on a shared secret known to all XMPP servers within a given administrative domain. It is a proof-of-possession protocol in the sense of &rfc4949; which asserts that the initiating server and the authoritative server are associated with each other. The relative strength or weakness of the verification depends in part on the strength or weakness of the process for resolving the domain names of the authoritative server; in particular, if DNSSEC is not used then Server Dialback results in weak identity verification, whereas if DNSSEC is used then Server Dialback can result in fairly strong identity verification.</p>
|
||||||
<p>Since October 2000, the use of Server Dialback (even absent DNSSEC) has made it more difficult to spoof the hostnames of servers (and therefore the addresses of sent messages) on the XMPP network.</p>
|
<p>Since October 2000, the use of Server Dialback (even absent DNSSEC) has made it more difficult to spoof the hostnames of servers (and therefore the addresses of sent messages) on the XMPP network.</p>
|
||||||
<p>Server Dialback is unidirectional, and results in verification for one XML stream in one direction. Because traditionally Server-to-Server connections are used unidirectionally, Server Dialback needs to be completed in each direction in order to enable bidirectional communication between two domains (unless &xep0288; is used).</p>
|
<p>Server Dialback is unidirectional, and results in verification for one XML stream in one direction. Because traditionally Server-to-Server connections are used unidirectionally, Server Dialback needs to be completed in each direction in order to enable bidirectional communication between two domains (unless &xep0288; is used).</p>
|
||||||
|
<p>Furthermore, because a separate TCP connection is mandated for each domain pair, the use of server dialback results in significant scalability challenges for large XMPP service providers that host many domains (see &dna-framework; for a possible solution).</p>
|
||||||
|
<p>Finally, dialback signalling can be used without dialback keys if out-of-band methods are used to establish authorization. As one example, if TLS is used then the Receiving Server can attempt to verify the certificate presented by the Initiating Server, either according to the rules specified in &xep0178; and &rfc6125; or by checking that the key of the Initiating Server matches a key obtained via &posh;. This technique of using dialback signalling without dialback keys (sometimes called "dialback without dialing back") is not, however, described in this document.</p>
|
||||||
</section2>
|
</section2>
|
||||||
|
|
||||||
<section2 topic="Terminology" anchor="intro-terms">
|
<section2 topic="Terminology" anchor="intro-terms">
|
||||||
@ -177,7 +186,7 @@
|
|||||||
<dl>
|
<dl>
|
||||||
<di><dt>Authoritative Server</dt><dd>The machine that is discovered by means of a DNS lookup for the Sender Domain; for simple deployments this will be the Initiating Server, but it could be a separate machine in the Initiating Server's network (where "network" is defined by knowledge of a shared secret for verification of dialback keys).</dd></di>
|
<di><dt>Authoritative Server</dt><dd>The machine that is discovered by means of a DNS lookup for the Sender Domain; for simple deployments this will be the Initiating Server, but it could be a separate machine in the Initiating Server's network (where "network" is defined by knowledge of a shared secret for verification of dialback keys).</dd></di>
|
||||||
<di><dt>Domain Pair</dt><dd>The combination of the Sender Domain and Target Domain.</dd></di>
|
<di><dt>Domain Pair</dt><dd>The combination of the Sender Domain and Target Domain.</dd></di>
|
||||||
<di><dt>Initiating Server</dt><dd>The machine that wants to send a message from an entity at the Sender Domain to an entity at the Target Domain (and thus the machine that is attempting to establish a domain name association between the Target Domain and the XML stream from the Initiating Server to the Receiving Server). Note well that in older documentation of the Server Dialback protocol, this was called the Originating Server.</dd></di>
|
<di><dt>Initiating Server</dt><dd>The machine that wants to send a message from an entity at the Sender Domain to an entity at the Target Domain (and thus the machine that is attempting to establish a domain name association between (a) the Target Domain and (b) the XML stream from the Initiating Server to the Receiving Server). Note well that in older documentation of the Server Dialback protocol, this was called the Originating Server.</dd></di>
|
||||||
<di><dt>Receiving Server</dt><dd>The machine to which the Initiating Server has opened a connection for the purpose of sending a message from the Sender Domain to the Target Domain (and thus the machine that is trying to verify that the Initiating Server represents the Sender Domain).</dd></di>
|
<di><dt>Receiving Server</dt><dd>The machine to which the Initiating Server has opened a connection for the purpose of sending a message from the Sender Domain to the Target Domain (and thus the machine that is trying to verify that the Initiating Server represents the Sender Domain).</dd></di>
|
||||||
<di><dt>Sender Domain</dt><dd>The domain name asserted by the Initiating Server as the domainpart of the XMPP 'from' address of stanzas that will flow over the XML stream from the Initiating Server to the Receiving Server.</dd></di>
|
<di><dt>Sender Domain</dt><dd>The domain name asserted by the Initiating Server as the domainpart of the XMPP 'from' address of stanzas that will flow over the XML stream from the Initiating Server to the Receiving Server.</dd></di>
|
||||||
<di><dt>Target Domain</dt><dd>The domain name specified by the Initiating Server as the domainpart of the XMPP 'to' address of stanzas that will flow over the XML stream from the Initiating Server to the Receiving Server.</dd></di>
|
<di><dt>Target Domain</dt><dd>The domain name specified by the Initiating Server as the domainpart of the XMPP 'to' address of stanzas that will flow over the XML stream from the Initiating Server to the Receiving Server.</dd></di>
|
||||||
@ -188,7 +197,7 @@
|
|||||||
<p>Server Dialback is used when a stanza that is to be sent from a Sender Domain must be routed to a Target Domain and there is not yet an established connection between the domains. The basic flow of events in Server Dialback consists of the following four steps:</p>
|
<p>Server Dialback is used when a stanza that is to be sent from a Sender Domain must be routed to a Target Domain and there is not yet an established connection between the domains. The basic flow of events in Server Dialback consists of the following four steps:</p>
|
||||||
<ol start='1'>
|
<ol start='1'>
|
||||||
<li><p>The Initiating Server generates a dialback key and sends that value over its XML stream with the Receiving Server. (If the Initiating Server does not yet have an XML stream to the Receiving Server, it will first need to perform a DNS lookup on the Target Domain and thus discover the Receiving Server, open a TCP connection to the discovered IP address and port, and establish an XML stream with the Receiving Server.)</p></li>
|
<li><p>The Initiating Server generates a dialback key and sends that value over its XML stream with the Receiving Server. (If the Initiating Server does not yet have an XML stream to the Receiving Server, it will first need to perform a DNS lookup on the Target Domain and thus discover the Receiving Server, open a TCP connection to the discovered IP address and port, and establish an XML stream with the Receiving Server.)</p></li>
|
||||||
<li><p>Instead of immediately accepting XML stanzas on the connection from the Initiating Server, the Receiving Server sends the same dialback key over its XML stream with the Authoritative Server for verification. (If the Receiving Server does not yet have an XML stream to the Authoritative Server, it will first need to perform a DNS lookup on the Sender Domain and thus discover the Authoritative Server, open a TCP connection to the discovered IP address and port, and establish an XML stream with the Authoritative Server).</p></li>
|
<li><p>Instead of immediately accepting XML stanzas on the connection from the Initiating Server, the Receiving Server sends the same dialback key over its XML stream with the Authoritative Server for verification. (If the Receiving Server does not yet have an XML stream to the Authoritative Server, it will first need to perform a DNS lookup on the Sender Domain and thus discover the Authoritative Server, open a TCP connection to the discovered IP address and port, and establish an XML stream with the Authoritative Server.)</p></li>
|
||||||
<li><p>The Authoritative Server informs the Receiving Server whether the key is valid or invalid.</p></li>
|
<li><p>The Authoritative Server informs the Receiving Server whether the key is valid or invalid.</p></li>
|
||||||
<li><p>The Receiving Server informs the Initiating Server whether its identity has been verified or not.</p></li>
|
<li><p>The Receiving Server informs the Initiating Server whether its identity has been verified or not.</p></li>
|
||||||
</ol>
|
</ol>
|
||||||
@ -234,24 +243,26 @@ Initiating Receiving
|
|||||||
<p>This section describes the protocol in detail.</p>
|
<p>This section describes the protocol in detail.</p>
|
||||||
<p>Assumptions used in the examples:</p>
|
<p>Assumptions used in the examples:</p>
|
||||||
<ul>
|
<ul>
|
||||||
<li>The server hosting "capulet.lit" is acting as the Initiating Server in sections 2.1.1 and 2.2.1 and as the Receiving Server in sections 2.1.2 and 2.2.2. A DNS SRV lookup on "capulet.lit" resolves to "orchard.capulet.lit".</li>
|
<li>The server hosting "capulet.example" is acting as the Initiating Server in sections 2.1.1 and 2.2.1 and as the Receiving Server in sections 2.1.2 and 2.2.2. A DNS SRV lookup on "capulet.example" resolves to "orchard.capulet.example".</li>
|
||||||
<li>The server hosting "montague.lit" is acting as Receiving Server in sections 2.1.1 and 2.2.2 and as Authoritative Server in sections 2.1.2 and 2.2.2. A DNS SRV lookup on "montague.lit" resolves to the machine "home.montague.lit"</li>
|
<li>The server hosting "montague.example" is acting as Receiving Server in sections 2.1.1 and 2.2.2 and as Authoritative Server in sections 2.1.2 and 2.2.2. A DNS SRV lookup on "montague.example" resolves to the machine "home.montague.example"</li>
|
||||||
<li>The stream ID of the response stream header sent from "capulet.lit" to "montague.lit" is "D60000229F".</li>
|
<li>The stream ID of the response stream header sent from "capulet.example" to "montague.example" is "D60000229F".</li>
|
||||||
<li>The stream ID of the response stream header sent from "montague.lit" to "capulet.lit" is "417GAF25".</li>
|
<li>The stream ID of the response stream header sent from "montague.example" to "capulet.example" is "417GAF25".</li>
|
||||||
<li>The shared secret within the "capulet.lit" domain is "s3cr3tf0rd14lb4ck".</li>
|
<li>The shared secret within the "capulet.example" domain is "s3cr3tf0rd14lb4ck".</li>
|
||||||
<li>The shared secret within the "montague.lit" domain is "d14lb4ck43v3r".</li>
|
<li>The shared secret within the "montague.example" domain is "d14lb4ck43v3r".</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
<p>Note: All XML elements qualified by the Server Dialback namespace MUST be prefixed with the namespace prefix for the 'jabber:server:dialback' namespace as advertised on the stream header originally sent by the entity sending the element. <note>RFC 3920 stipulated that "an implementation SHOULD generate only the 'db:' prefix for such elements and MAY accept only the 'db:' prefix." This restriction was included for the sake of backward compatibility with the jabberd 1.x codebase.</note></p>
|
||||||
<p>This section can be read in two ways:</p>
|
<p>This section can be read in two ways:</p>
|
||||||
<ol>
|
<ol>
|
||||||
<li><p>To understand the overall protocol flow of each dialback negotiation, read Section 2.1.1 and Section 2.2.1 (aspects of the dialback negotiation from capulet.lit as Initiating Server to montague.lit as Receiving Server), then Section 2.1.2 and 2.2.2 (aspects of the dialback negotiation from montague.lit as Initiating Server to capulet.lit as Receiving Server).</p></li>
|
<li><p>To understand the overall protocol flow of each dialback negotiation, read Section 2.1.1 and Section 2.2.1 (aspects of the dialback negotiation from capulet.example as Initiating Server to montague.example as Receiving Server), then Section 2.1.2 and 2.2.2 (aspects of the dialback negotiation from montague.example as Initiating Server to capulet.example as Receiving Server).</p></li>
|
||||||
<li><p>To implement the code for either an outbound connection or an inbound connection, read Section 2.1 (outbound) or Section 2.2 (outbound). Note that both parts can be implemented, tested, and used separately.</p></li>
|
<li><p>To implement the code for either an outbound connection or an inbound connection, read Section 2.1 (outbound) or Section 2.2 (inbound). Note that both parts can be implemented, tested, and used separately.</p></li>
|
||||||
</ol>
|
</ol>
|
||||||
<p>The following figure gives an overview of where each example is embedded in the process and illustrates the changing roles of each server.</p>
|
<p>The following figure gives an overview of where each example is embedded in the process and illustrates the changing roles of each server.</p>
|
||||||
<code><![CDATA[
|
<code><![CDATA[
|
||||||
orchard.capulet.lit home.montague.lit
|
orchard.capulet. home.montague.
|
||||||
|
example example
|
||||||
(as Initiating) (as Receiving
|
(as Initiating) (as Receiving
|
||||||
Server) Server)
|
Server) Server)
|
||||||
----------- ---------
|
---------------- -------------
|
||||||
| |
|
| |
|
||||||
| [if necessary, |
|
| [if necessary, |
|
||||||
| perform DNS |
|
| perform DNS |
|
||||||
@ -264,10 +275,10 @@ orchard.capulet.lit home.montague.lit
|
|||||||
| -----------------> |
|
| -----------------> |
|
||||||
| (ID D60000229F) |
|
| (ID D60000229F) |
|
||||||
| |
|
| |
|
||||||
| send | capulet.lit
|
| send | capulet.example
|
||||||
| dialback key | (as Authoritative
|
| dialback key | (as Authoritative
|
||||||
| -----(STEP 1)----> | Server)
|
| -----(STEP 1)----> | Server)
|
||||||
| Ex 1 / 9 | ------------
|
| Ex 1 / 9 | -----------------
|
||||||
| | [if necessary, |
|
| | [if necessary, |
|
||||||
| | perform DNS |
|
| | perform DNS |
|
||||||
| | lookup on |
|
| | lookup on |
|
||||||
@ -292,10 +303,12 @@ orchard.capulet.lit home.montague.lit
|
|||||||
| Ex 2,3,4/10,11,12 | |
|
| Ex 2,3,4/10,11,12 | |
|
||||||
| | |
|
| | |
|
||||||
| - stanzas flow -> | |
|
| - stanzas flow -> | |
|
||||||
| from capulet.lit | |
|
| from | |
|
||||||
| to montague.lit | |
|
| capulet.example | |
|
||||||
|
| to | |
|
||||||
|
| montague.example | |
|
||||||
| | |
|
| | |
|
||||||
| montague.lit capulet.lit
|
| montague.example capulet.example
|
||||||
| (as Initiating (as Receiving
|
| (as Initiating (as Receiving
|
||||||
| Server) Server)
|
| Server) Server)
|
||||||
| --------- ----------
|
| --------- ----------
|
||||||
@ -305,7 +318,7 @@ orchard.capulet.lit home.montague.lit
|
|||||||
| | open new stream] |
|
| | open new stream] |
|
||||||
| | -----------------> |
|
| | -----------------> |
|
||||||
| | (ID 417GAF25) |
|
| | (ID 417GAF25) |
|
||||||
| | | montague.lit
|
| | | montague.example
|
||||||
| | send | (as Authoritative
|
| | send | (as Authoritative
|
||||||
| | dialback key | Server)
|
| | dialback key | Server)
|
||||||
| | -----(STEP 1)----> | -----------
|
| | -----(STEP 1)----> | -----------
|
||||||
@ -330,10 +343,11 @@ orchard.capulet.lit home.montague.lit
|
|||||||
| | <----(STEP 4)----- | |
|
| | <----(STEP 4)----- | |
|
||||||
| | | |
|
| | | |
|
||||||
| | - stanzas flow -> | |
|
| | - stanzas flow -> | |
|
||||||
| | from montague.lit | |
|
| | from | |
|
||||||
| | to capulet.lit | |
|
| | montague.example | |
|
||||||
|
| | to | |
|
||||||
|
| | capulet.example | |
|
||||||
]]></code>
|
]]></code>
|
||||||
<p>Note: All XML elements qualified by the Server Dialback namespace MUST be prefixed with the namespace prefix for the 'jabber:server:dialback' namespace as advertised on the stream header originally sent by the entity sending the element. <note>RFC 3920 stipulated that "an implementation SHOULD generate only the 'db:' prefix for such elements and MAY accept only the 'db:' prefix." This restriction was included for the sake of backward compatibility with the jabberd 1.x codebase.</note></p>
|
|
||||||
|
|
||||||
<section2 topic="Outbound Connection">
|
<section2 topic="Outbound Connection">
|
||||||
<p>On an outbound connection there are two different tasks:</p>
|
<p>On an outbound connection there are two different tasks:</p>
|
||||||
@ -343,14 +357,14 @@ orchard.capulet.lit home.montague.lit
|
|||||||
</ol>
|
</ol>
|
||||||
|
|
||||||
<section3 topic="Initiating Server Generates Outbound Request for Authorization by Receiving Server">
|
<section3 topic="Initiating Server Generates Outbound Request for Authorization by Receiving Server">
|
||||||
<p>This subsection describes the interaction between the server hosting capulet.lit (acting as an Initiating Server) and the server hosting montague.lit (acting as a Receiving Server), from the outbound perspective of the Initiating Server.</p>
|
<p>This subsection describes the interaction between the server hosting capulet.example (acting as an Initiating Server) and the server hosting montague.example (acting as a Receiving Server), from the outbound perspective of the Initiating Server.</p>
|
||||||
<p>When the Initiating Server has stanzas to send from the Sender Domain to the Target Domain, does not have a verified connection, is currently not attempting to get a verified connection for this domain pair, it sends a new dialback key to the Receiving Server.</p>
|
<p>When the Initiating Server has stanzas to send from the Sender Domain to the Target Domain, does not have a verified connection, is currently not attempting to get a verified connection for this domain pair, it sends a new dialback key to the Receiving Server.</p>
|
||||||
<p>To do so, either it can reuse an existing XML stream or it needs to establish a new connection. To establish a new connection, the Initiating Server performs a DNS lookup on the Target Domain, thus finding the IP address and port for server-to-server communication at an authoritative machine for the Target Domain (which is assumed to be "home.montague.lit").</p>
|
<p>To do so, either it can reuse an existing XML stream or it needs to establish a new connection. To establish a new connection, the Initiating Server performs a DNS lookup on the Target Domain, thus finding the IP address and port for server-to-server communication at an authoritative machine for the Target Domain (here that is "home.montague.example").</p>
|
||||||
<p>After the XML stream is established from the Initiating Server to the Receiving Server, the Initiating Server sends a dialback key to the Receiving Server. This is done by creating a <db:result/> element whose XML character data is the dialback key; the element MUST possess a 'from' attribute whose value is the Sender Domain and MUST possess a 'to' attribute whose value is the Target Domain.</p>
|
<p>After the XML stream is established from the Initiating Server to the Receiving Server, the Initiating Server sends a dialback key to the Receiving Server. This is done by creating a <db:result/> element whose XML character data is the dialback key; the element MUST possess a 'from' attribute whose value is the Sender Domain and MUST possess a 'to' attribute whose value is the Target Domain.</p>
|
||||||
<example caption="Initiating Server Sends Dialback Key (Step 1)"><![CDATA[
|
<example caption="Initiating Server Sends Dialback Key (Step 1)"><![CDATA[
|
||||||
send: <db:result
|
send: <db:result
|
||||||
from='capulet.lit'
|
from='capulet.example'
|
||||||
to='montague.lit'>
|
to='montague.example'>
|
||||||
404fe54e60d0259b2b6d9a620e72990ab3e8fe2faca420653da71eb80597e5a4
|
404fe54e60d0259b2b6d9a620e72990ab3e8fe2faca420653da71eb80597e5a4
|
||||||
</db:result>
|
</db:result>
|
||||||
]]></example>
|
]]></example>
|
||||||
@ -358,37 +372,37 @@ send: <db:result
|
|||||||
<code>
|
<code>
|
||||||
key = HMAC-SHA256(
|
key = HMAC-SHA256(
|
||||||
SHA256('s3cr3tf0rd14lb4ck'),
|
SHA256('s3cr3tf0rd14lb4ck'),
|
||||||
{ 'montague.lit', ' ', 'capulet.lit', ' ', 'D60000229F' }
|
{ 'montague.example', ' ', 'capulet.example', ' ', 'D60000229F' }
|
||||||
)
|
)
|
||||||
= 404fe54e60d0259b2b6d9a620e72990ab3e8fe2faca420653da71eb80597e5a4
|
= 404fe54e60d0259b2b6d9a620e72990ab3e8fe2faca420653da71eb80597e5a4
|
||||||
</code>
|
</code>
|
||||||
<p>Note: The Receiving Server MAY use any method to determine the validity of the dialback key and the identity of the Initiating Server. The Initiating Server MUST NOT make any assumptions about how the Receiving Server verifies the key. This includes the assumption that the key is even verified by the Receiving Server through communication with the Authoritative Server.</p>
|
<p>Note: The Receiving Server MAY use any method to determine the validity of the dialback key and the identity of the Initiating Server. The Initiating Server MUST NOT make any assumptions about how the Receiving Server verifies the key, including even the assumption that the key is actively verified by the Receiving Server through communication with the Authoritative Server.</p>
|
||||||
<p>After sending the dialback key, the Initiating Server waits for the verification result from the Receiving Server. If the Initiating Server wishes to send any stanzas for this domain pair, it MUST queue them for sending after it has received authorization to send stanzas from the Receiving Server, and MUST NOT attempt to send stanzas until it has received such authorization.</p>
|
<p>After sending the dialback key, the Initiating Server waits for the verification result from the Receiving Server. If the Initiating Server wishes to send any stanzas for this domain pair, it MUST queue them for sending after it has received authorization to send stanzas from the Receiving Server, and MUST NOT attempt to send stanzas until it has received such authorization.</p>
|
||||||
<p>Note: While waiting for the verification result, the Initiating Server SHOULD continue to send stanzas for any domain pair that has already been verified on that connection. It MAY send out additional dialback keys for different domain pairs and issue dialback verification requests as described under Section 2.1.2. To avoid denial of service attacks (&rfc4732;) or deadlock situations, the Initiating Server MAY impose a timeout on dialback operations, i.e. it should consider dialback operations to be failed when there is no response after a certain amount of time.</p>
|
<p>Note: While waiting for the verification result, the Initiating Server SHOULD continue to send stanzas for any domain pair that has already been verified on that connection. It MAY send out additional dialback keys for different domain pairs and issue dialback verification requests as described under Section 2.1.2. To avoid denial of service attacks (&rfc4732;) or deadlock situations, the Initiating Server MAY impose a timeout on dialback operations, i.e. it ought to consider dialback operations as having failed when there is no response after a certain amount of time.</p>
|
||||||
<p>If the stream or the underlying TCP connection is closed by the Receiving Server while the Initiating Server is waiting for the verification result, the Initiating Server shall behave as it does when receiving a dialback error as described below.</p>
|
<p>If the stream or the underlying TCP connection is closed by the Receiving Server while the Initiating Server is waiting for the verification result, the Initiating Server shall behave as it does when receiving a dialback error as described below.</p>
|
||||||
<p>After the Receiving Server has verified the request, the Initiating Server receives the verification result in the form of a <db:result/> element with a the 'type' attribute whose value is "valid" or "invalid" (for the value of "error", see below). The Initiating Server MUST ensure that the 'from' and 'to' attributes in this response correlate to a request that was sent over the same XML stream (see Section 3.1).</p>
|
<p>After the Receiving Server has verified the request, the Initiating Server receives the verification result in the form of a <db:result/> element with a the 'type' attribute whose value is "valid" or "invalid" (for the value of "error", see below). The Initiating Server MUST ensure that the 'from' and 'to' attributes in this response correlate to a request that was sent over the same XML stream (see Section 3.1).</p>
|
||||||
<p>Thus the result is either valid...</p>
|
<p>Thus the result is either valid...</p>
|
||||||
<example caption="Initiating Server Receives Valid Verification Result from Receiving Server (Step 4)"><![CDATA[
|
<example caption="Initiating Server Receives Valid Verification Result from Receiving Server (Step 4)"><![CDATA[
|
||||||
recv: <db:result
|
recv: <db:result
|
||||||
from='montague.lit'
|
from='montague.example'
|
||||||
to='capulet.lit'
|
to='capulet.example'
|
||||||
type='valid'/>
|
type='valid'/>
|
||||||
]]></example>
|
]]></example>
|
||||||
<p>... or invalid ...</p>
|
<p>... or invalid ...</p>
|
||||||
<example caption="Initiating Server Receives Invalid Verification Result from Receiving Server (Step 4)"><![CDATA[
|
<example caption="Initiating Server Receives Invalid Verification Result from Receiving Server (Step 4)"><![CDATA[
|
||||||
recv: <db:result
|
recv: <db:result
|
||||||
from='montague.lit'
|
from='montague.example'
|
||||||
to='capulet.lit'
|
to='capulet.example'
|
||||||
type='invalid'/>
|
type='invalid'/>
|
||||||
]]></example>
|
]]></example>
|
||||||
<p>Note: There are no examples for Step 2 and Step 3 in this section of the document; see the examples under Sections 2.1.2 and 2.2.2.</p>
|
<p>Note: There are no examples for Step 2 and Step 3 in this section of the document; see the examples under Sections 2.1.2 and 2.2.2.</p>
|
||||||
<p>If the value of the 'type' attribute is "valid", then the connection between the domain pair is considered verified and the Initiating Server can send any outbound stanzas it has queued up for routing to the Receiving Server for the domain pair (i.e., from the Sender Domain to the Target Domain). Naturally, the Initiating Server can also enable or negotiate other stream features at this point, such as &xep0138; and &xep0198;.</p>
|
<p>If the value of the 'type' attribute is "valid", then the connection between the domain pair is considered verified and the Initiating Server can send any outbound stanzas it has queued up for routing to the Receiving Server for the domain pair (i.e., from the Sender Domain to the Target Domain). Naturally, the Initiating Server can also enable or negotiate other stream features at this point.</p>
|
||||||
<p>If the value of the 'type' attribute is "invalid", then the Receiving Server is reporting that Initiating Server's identity (as valid for the Sender Domain) was deemed bogus by the Authoritative Server. In this case, the Initiating Server MUST NOT attempt to send any outbound stanzas it has queued up for routing to the Receiving Server for the domain pair but instead MUST return such stanzas to the respective senders at the Sender Domain with an &internalserver; stanza error. Since the Receiving Server will most likely close the stream and the underlying TCP connection if that occurs (see Section 2.2.1), the Initiating Server SHOULD NOT attempt to send further stanzas for other domain pairs that have already been authorized.</p>
|
<p>If the value of the 'type' attribute is "invalid", then the Receiving Server is reporting that that Initiating Server's identity (as valid for the Sender Domain) was deemed bogus by the Authoritative Server. In this case, the Initiating Server MUST NOT attempt to send any outbound stanzas it has queued up for routing to the Receiving Server for the domain pair but instead MUST return such stanzas to the respective senders at the Sender Domain with an &internalserver; stanza error. Since the Receiving Server will most likely close the stream and the underlying TCP connection if that occurs (see Section 2.2.1), the Initiating Server SHOULD NOT attempt to send further stanzas for other domain pairs that have already been authorized.</p>
|
||||||
<p>If the value of the 'type' attribute is "error", this indicates a problem which is not related to the validity of the dialback key provided. The error conditions are explained in detail under <link url='#advertisement-errors'>Dialback with Error Handling</link>. Such an error is non-fatal for the XML stream, but the Initiating Server MUST return any queued stanzas to the respective senders at the Sender Domain with a &timeout; stanza error.</p>
|
<p>If the value of the 'type' attribute is "error", this indicates a problem which is not related to the validity of the dialback key provided. The error conditions are explained in detail under <link url='#advertisement-errors'>Dialback with Error Handling</link>. Such an error is non-fatal for the XML stream, but the Initiating Server MUST return any queued stanzas to the respective senders at the Sender Domain with a &timeout; stanza error.</p>
|
||||||
<example caption="Initiating Server Receives Dialback Error from Receiving Server (Step 4)"><![CDATA[
|
<example caption="Initiating Server Receives Dialback Error from Receiving Server (Step 4)"><![CDATA[
|
||||||
recv: <db:result
|
recv: <db:result
|
||||||
from='montague.lit'
|
from='montague.example'
|
||||||
to='capulet.lit'
|
to='capulet.example'
|
||||||
type='error'>
|
type='error'>
|
||||||
<error type='cancel'>
|
<error type='cancel'>
|
||||||
<item-not-found xmlns='urn:ietf:params:xml:ns:xmpp-stanzas'/>
|
<item-not-found xmlns='urn:ietf:params:xml:ns:xmpp-stanzas'/>
|
||||||
@ -398,15 +412,15 @@ recv: <db:result
|
|||||||
</section3>
|
</section3>
|
||||||
|
|
||||||
<section3 topic="Receiving Server Generates Outbound Request for Verification of Initiating Server by Authoritative Server">
|
<section3 topic="Receiving Server Generates Outbound Request for Verification of Initiating Server by Authoritative Server">
|
||||||
<p>This subsection describes the interaction between the server hosting capulet.lit (acting as a Receiving Server) and the server hosting montague.lit (acting as an Authoritative Server), from the outbound perspective of the Receiving Server.</p>
|
<p>This subsection describes the interaction between the server hosting capulet.example (acting as a Receiving Server) and the server hosting montague.example (acting as an Authoritative Server), from the outbound perspective of the Receiving Server.</p>
|
||||||
<p>To determine the validity of a dialback key received from the Initiating Server, the Receiving Server needs to establish communications with the Authoritative Server. To do so, it can reuse an existing XML stream or establish a new connection. To establish a new connection, the Receiving Server performs a DNS lookup on the Sender Domain, thus finding the IP address and port for server-to-server communication at an authoritative machine for the Sender Domain asserted by the Initiating Server (here the machine is "orchard.capulet.lit").</p>
|
<p>To determine the validity of a dialback key received from the Initiating Server, the Receiving Server needs to establish communications with the Authoritative Server. To do so, it can reuse an existing XML stream or establish a new connection. To establish a new connection, the Receiving Server performs a DNS lookup on the Sender Domain, thus finding the IP address and port for server-to-server communication at an authoritative machine for the Sender Domain asserted by the Initiating Server (here the machine is "orchard.capulet.example").</p>
|
||||||
<p>After the XML stream is established from the Receiving Server to the Authoritative Server, the Receiving Server sends a verification request. This is done by creating a <db:verify/> element whose XML character data is the dialback key received from the Initiating Server; the element MUST possess a 'from' attribute whose value is the Target Domain, MUST possess a 'to' attribute whose value is the Sender Domain as provided in the 'from' attribute of Step 1, and MUST possess an 'id' attribute whose value is the stream ID of the response stream header sent from the Receiving Server to the Initiating Server (here "417GAF25"). The combination of 'from', 'to', and 'id' attributes makes it possible for the Receiving Server to uniquely identify the TCP connection on which it received the original request in Step 1.</p>
|
<p>After the XML stream is established from the Receiving Server to the Authoritative Server, the Receiving Server sends a verification request. This is done by creating a <db:verify/> element whose XML character data is the dialback key received from the Initiating Server; the element MUST possess a 'from' attribute whose value is the Target Domain, MUST possess a 'to' attribute whose value is the Sender Domain as provided in the 'from' attribute of Step 1, and MUST possess an 'id' attribute whose value is the stream ID of the response stream header sent from the Receiving Server to the Initiating Server (here "417GAF25"). The combination of 'from', 'to', and 'id' attributes makes it possible for the Receiving Server to uniquely identify the TCP connection on which it received the original request in Step 1.</p>
|
||||||
<p>Note: An implementation MAY open a separate connection to the Authoritative Server for the sole purpose of doing key verification. Such an implementation SHOULD close the connection immediately after receiving the verification result. Not using TLS or any other stream features can reduce the number of round trips in that case.</p>
|
<p>Note: An implementation MAY open a separate connection to the Authoritative Server for the sole purpose of doing key verification. Such an implementation SHOULD close the connection immediately after receiving the verification result. Not using TLS or any other stream features can reduce the number of round trips in that case.</p>
|
||||||
<example caption="Receiving Server Sends Verification Request to Authoritative Server (Step 2)"><![CDATA[
|
<example caption="Receiving Server Sends Verification Request to Authoritative Server (Step 2)"><![CDATA[
|
||||||
send: <db:verify
|
send: <db:verify
|
||||||
from='capulet.lit'
|
from='capulet.example'
|
||||||
id='417GAF25'
|
id='417GAF25'
|
||||||
to='montague.lit'>
|
to='montague.example'>
|
||||||
d4afb251ac62eb6fc778dac7ad65c43fdee29c4930ba204d479191566ea99496
|
d4afb251ac62eb6fc778dac7ad65c43fdee29c4930ba204d479191566ea99496
|
||||||
</db:verify>
|
</db:verify>
|
||||||
]]></example>
|
]]></example>
|
||||||
@ -414,27 +428,25 @@ send: <db:verify
|
|||||||
<p>Here again, the result is either valid...</p>
|
<p>Here again, the result is either valid...</p>
|
||||||
<example caption="Receiving Server is Informed by Authoritative Server that Key is Valid (Step 3)"><![CDATA[
|
<example caption="Receiving Server is Informed by Authoritative Server that Key is Valid (Step 3)"><![CDATA[
|
||||||
recv: <db:verify
|
recv: <db:verify
|
||||||
from='montague.lit'
|
from='montague.example'
|
||||||
id='417GAF25'
|
id='417GAF25'
|
||||||
to='capulet.lit'
|
to='capulet.example'
|
||||||
type='valid'>
|
type='valid'/>
|
||||||
</db:verify>
|
|
||||||
]]></example>
|
]]></example>
|
||||||
<p>... or invalid ...</p>
|
<p>... or invalid ...</p>
|
||||||
<example caption="Receiving Server is Informed by Authoritative Server that Key is Invalid (Step 3)"><![CDATA[
|
<example caption="Receiving Server is Informed by Authoritative Server that Key is Invalid (Step 3)"><![CDATA[
|
||||||
recv: <db:verify
|
recv: <db:verify
|
||||||
from='montague.lit'
|
from='montague.example'
|
||||||
id='417GAF25'
|
id='417GAF25'
|
||||||
to='capulet.lit'
|
to='capulet.example'
|
||||||
type='invalid'>
|
type='invalid'/>
|
||||||
</db:verify>
|
|
||||||
]]></example>
|
]]></example>
|
||||||
<p>In addition to the values "valid" and "invalid", the 'type' attribute can also have a value of "error"; see <link url='#advertisement-errors'>Dialback with Error Handling</link> for a detailed explanation.</p>
|
<p>In addition to the values "valid" and "invalid", the 'type' attribute can also have a value of "error"; see <link url='#advertisement-errors'>Dialback with Error Handling</link> for a detailed explanation.</p>
|
||||||
<example caption="Receiving Server Receives Dialback Error from Authoritative Server (Step 3)"><![CDATA[
|
<example caption="Receiving Server Receives Dialback Error from Authoritative Server (Step 3)"><![CDATA[
|
||||||
recv: <db:verify
|
recv: <db:verify
|
||||||
from='montague.lit'
|
from='montague.example'
|
||||||
id='417GAF25'
|
id='417GAF25'
|
||||||
to='capulet.lit'
|
to='capulet.example'
|
||||||
type='error'>
|
type='error'>
|
||||||
<error type='cancel'>
|
<error type='cancel'>
|
||||||
<item-not-found xmlns='urn:ietf:params:xml:ns:xmpp-stanzas'/>
|
<item-not-found xmlns='urn:ietf:params:xml:ns:xmpp-stanzas'/>
|
||||||
@ -458,63 +470,62 @@ recv: <db:verify
|
|||||||
<p>Note that, unless <cite>XEP-0288</cite> is used, the 'type' should not be set on either <db:result/> or <db:verify/> elements received on an inbound connection.</p>
|
<p>Note that, unless <cite>XEP-0288</cite> is used, the 'type' should not be set on either <db:result/> or <db:verify/> elements received on an inbound connection.</p>
|
||||||
|
|
||||||
<section3 topic="Receiving Server Handles Inbound Authorization Request from Initiating Server">
|
<section3 topic="Receiving Server Handles Inbound Authorization Request from Initiating Server">
|
||||||
<p>This subsection describes the interaction between the server hosting capulet.lit (acting as an Initiating Server) and the server hosting montague.net (acting as a Receiving Server), from the inbound perspective of the Receiving Server (i.e., this section is the mirror image of Section 2.1.1).</p>
|
<p>This subsection describes the interaction between the server hosting capulet.example (acting as an Initiating Server) and the server hosting montague.net (acting as a Receiving Server), from the inbound perspective of the Receiving Server (i.e., this section is the mirror image of Section 2.1.1).</p>
|
||||||
<example caption="Receiving Server Receives Dialback Key from Initiating Server (Step 1)"><![CDATA[
|
<example caption="Receiving Server Receives Dialback Key from Initiating Server (Step 1)"><![CDATA[
|
||||||
recv: <db:result
|
recv: <db:result
|
||||||
from='capulet.lit'
|
from='capulet.example'
|
||||||
to='montague.lit'>
|
to='montague.example'>
|
||||||
404fe54e60d0259b2b6d9a620e72990ab3e8fe2faca420653da71eb80597e5a4
|
404fe54e60d0259b2b6d9a620e72990ab3e8fe2faca420653da71eb80597e5a4
|
||||||
</db:result>
|
</db:result>
|
||||||
]]></example>
|
]]></example>
|
||||||
<p>This key MUST be verified before the Initiating Server is authorized to send stanzas from the Sender Domain ("capulet.lit") to the Target Domain ("montague.lit"). Note that the verification process might fail prematurely, for example, if the Receiving Server's policy states that connections from the Initiating Server or the Sender Domain are not allowed.</p>
|
<p>Before the Receiving Server allows the Initiating Server to send stanzas from the Sender Domain (here "capulet.example") to the Target Domain (here "montague.example"), it MUST verify the identity of the Initiating Server. Depending on how the server dialback protocol is used, this can be done by verifying the dialback key or by using some out-of-band method as in the POSH prooftype for XMPP domain name associations. Note that the verification process might fail prematurely, for example, if the Receiving Server's policy states that connections from the Initiating Server or the Sender Domain are not allowed.</p>
|
||||||
<p>The traditional method for verifying that the Initiating Server is authorized to send stanzas from the Sender Domain is for the Receiving Server to "dial back" the Authoritative Server for the Sender Domain and ask it to validate the dialback key which is contained in the XML character data of the request. However, other methods can be used for verifying the identity of the Initiating Server. For example, if TLS is used the the Receiving Server can attempt to verify the certificate (typically according to the rules specified in &xep0178; and &rfc6125;) and then send a dialback result without performing the actual dial-back to the Authoritative Server. This technique is sometimes called "dialback without dial-back".</p>
|
|
||||||
<p>Note: The Receiving Server MUST continue to accept and process stanzas for already verified domain pairs, and MUST continue to process both <db:result/> and <db:verify/> elements.</p>
|
<p>Note: The Receiving Server MUST continue to accept and process stanzas for already verified domain pairs, and MUST continue to process both <db:result/> and <db:verify/> elements.</p>
|
||||||
<p>If the Target Domain as given in the 'to' attribute of the element is not a configured domain of the Receiving Server, this results in a dialback error. This error, which is explained further under <link url='#advertisement-errors'>Section 2.4.2</link>, is not a stream error and therefore MUST NOT result in closing of the stream as described in Section 4.4 of <cite>RFC 6120</cite>, since the stream might already be used to exchange XML stanzas for other domain pairs.</p>
|
<p>If the Target Domain as given in the 'to' attribute of the element is not a configured domain of the Receiving Server, this results in a dialback error. This error, which is explained further under <link url='#advertisement-errors'>Section 2.4.2</link>, is not a stream error and therefore MUST NOT result in closing of the stream as described in Section 4.4 of <cite>RFC 6120</cite>, since the stream might already be used to exchange XML stanzas for other domain pairs.</p>
|
||||||
<example caption="Receiving Server Sends Dialback Error to Initiating Server (Step 4)"><![CDATA[
|
<example caption="Receiving Server Sends Dialback Error to Initiating Server (Step 4)"><![CDATA[
|
||||||
send: <db:result
|
send: <db:result
|
||||||
from='montague.lit'
|
from='montague.example'
|
||||||
to='capulet.lit'
|
to='capulet.example'
|
||||||
type='error'>
|
type='error'>
|
||||||
<error type='cancel'>
|
<error type='cancel'>
|
||||||
<item-not-found xmlns='urn:ietf:params:xml:ns:xmpp-stanzas'/>
|
<item-not-found xmlns='urn:ietf:params:xml:ns:xmpp-stanzas'/>
|
||||||
</error>
|
</error>
|
||||||
</db:result>
|
</db:result>
|
||||||
]]></example>
|
]]></example>
|
||||||
<p>After the validity of the key has been established (for example, by the Authoritative Server), the domain pair is to be considered as verified and the Receiving Server MUST accept stanzas from the Initiating Server for the verified domain pair.</p>
|
<p>After the validity of the dialback request has been established (for example, by the Authoritative Server), the Receiving Server can safely accept stanzas from the Initiating Server for the verified domain pair.</p>
|
||||||
<p>In addition, the Receiving Server SHALL notify the Initiating Server of the result. This is done by creating a <db:result/> element which MUST possess a 'from' attribute whose value is the Target Domain, MUST possess a 'to' attribute whose value is the Sender Domain, and MUST possess a 'type' attribute whose value is either "valid" or "invalid" (or "error", as shown above).</p>
|
<p>In addition, the Receiving Server SHALL notify the Initiating Server of the result and thus signal its willingness to accept stanzas from the Initiating Server for the verified domain pair. This is done by creating a <db:result/> element which MUST possess a 'from' attribute whose value is the Target Domain, MUST possess a 'to' attribute whose value is the Sender Domain, and MUST possess a 'type' attribute whose value is either "valid" or "invalid" (or "error", as shown above).</p>
|
||||||
<p>Therefore, here again the result is either valid (this is the same as Example 2)...</p>
|
<p>Therefore, here again the result is either valid (this is the same as Example 2)...</p>
|
||||||
<example caption="Receiving Server Sends Valid Verification Result to Initiating Server (Step 4)"><![CDATA[
|
<example caption="Receiving Server Sends Valid Verification Result to Initiating Server (Step 4)"><![CDATA[
|
||||||
send: <db:result
|
send: <db:result
|
||||||
from='montague.lit'
|
from='montague.example'
|
||||||
to='capulet.lit'
|
to='capulet.example'
|
||||||
type='valid'/>
|
type='valid'/>
|
||||||
]]></example>
|
]]></example>
|
||||||
<p>... or invalid (this is the same as Example 3)...</p>
|
<p>... or invalid (this is the same as Example 3)...</p>
|
||||||
<example caption="Receiving Server Sends Invalid Verification Result to Initiating Server (Step 4)"><![CDATA[
|
<example caption="Receiving Server Sends Invalid Verification Result to Initiating Server (Step 4)"><![CDATA[
|
||||||
send: <db:result
|
send: <db:result
|
||||||
from='montague.lit'
|
from='montague.example'
|
||||||
to='capulet.lit'
|
to='capulet.example'
|
||||||
type='invalid'/>
|
type='invalid'/>
|
||||||
]]></example>
|
]]></example>
|
||||||
<p>If the type is "invalid", the Initiating Server is attempting to spoof the Sender Domain. The Receiving Server MUST NOT accept stanzas from the Initiating Server for the Sender Domain, ought to log the attempt, and MUST close the XML stream.</p>
|
<p>If the type is "invalid", the Initiating Server is attempting to spoof the Sender Domain. The Receiving Server MUST NOT accept stanzas from the Initiating Server for the Sender Domain, ought to log the attempt, and MUST close the XML stream.</p>
|
||||||
</section3>
|
</section3>
|
||||||
|
|
||||||
<section3 topic="Authoritative Server Handles Inbound Verification Request from Receiving Server">
|
<section3 topic="Authoritative Server Handles Inbound Verification Request from Receiving Server">
|
||||||
<p>This subsection describes the interaction between the server hosting capulet.lit (acting as a Receiving Server) and the server hosting montague.lit (acting as an Authoritative Server), from the inbound perspective of the Authoritative Server (i.e., this section is the mirror image of Section 2.1.2).</p>
|
<p>This subsection describes the interaction between the server hosting capulet.example (acting as a Receiving Server) and the server hosting montague.example (acting as an Authoritative Server), from the inbound perspective of the Authoritative Server (i.e., this section is the mirror image of Section 2.1.2 and the following example is the same as Example 5).</p>
|
||||||
<example caption="Authoritative Server Receives Verification Request from Receiving Server (Step 2)"><![CDATA[
|
<example caption="Authoritative Server Receives Verification Request from Receiving Server (Step 2)"><![CDATA[
|
||||||
recv: <db:verify
|
recv: <db:verify
|
||||||
from='capulet.lit'
|
from='capulet.example'
|
||||||
id='417GAF25'
|
id='417GAF25'
|
||||||
to='montague.lit'>
|
to='montague.example'>
|
||||||
d4afb251ac62eb6fc778dac7ad65c43fdee29c4930ba204d479191566ea99496
|
d4afb251ac62eb6fc778dac7ad65c43fdee29c4930ba204d479191566ea99496
|
||||||
</db:verify>
|
</db:verify>
|
||||||
]]></example>
|
]]></example>
|
||||||
<p>If the Target Domain as given in the 'to' attribute of the element does not match a configured local domain according to the Authoritative Server, this results in a dialback error. This error, which is explained further under Section 2.4, is not a stream error and therefore MUST NOT result in closing of the stream (as described in Section 4.4 of <cite>RFC 6120</cite>), since the stream might already be used for sending XML stanzas for other domain pairs.</p>
|
<p>If the Target Domain as given in the 'to' attribute of the element does not match a configured local domain according to the Authoritative Server, this results in a dialback error. This error, which is explained further under Section 2.4, is not a stream error and therefore MUST NOT result in closing of the stream (as described in Section 4.4 of <cite>RFC 6120</cite>), since the stream might already be used for sending XML stanzas for other domain pairs. (The following example is the same as Example 8.)</p>
|
||||||
<example caption="Authoritative Server Sends Dialback Error to Receiving Server (Step 3)"><![CDATA[
|
<example caption="Authoritative Server Sends Dialback Error to Receiving Server (Step 3)"><![CDATA[
|
||||||
send: <db:verify
|
send: <db:verify
|
||||||
from='montague.lit'
|
from='montague.example'
|
||||||
id='417GAF25'
|
id='417GAF25'
|
||||||
to='capulet.lit'
|
to='capulet.example'
|
||||||
type='error'>
|
type='error'>
|
||||||
<error type='cancel'>
|
<error type='cancel'>
|
||||||
<item-not-found xmlns='urn:ietf:params:xml:ns:xmpp-stanzas'/>
|
<item-not-found xmlns='urn:ietf:params:xml:ns:xmpp-stanzas'/>
|
||||||
@ -525,25 +536,25 @@ send: <db:verify
|
|||||||
<code>
|
<code>
|
||||||
key = HMAC-SHA256(
|
key = HMAC-SHA256(
|
||||||
SHA256('d14lb4ck43v3r'),
|
SHA256('d14lb4ck43v3r'),
|
||||||
{ 'capulet.lit', ' ', 'montague.lit', ' ', '417GAF25' }
|
{ 'capulet.example', ' ', 'montague.example', ' ', '417GAF25' }
|
||||||
)
|
)
|
||||||
= d4afb251ac62eb6fc778dac7ad65c43fdee29c4930ba204d479191566ea99496
|
= d4afb251ac62eb6fc778dac7ad65c43fdee29c4930ba204d479191566ea99496
|
||||||
</code>
|
</code>
|
||||||
<p>The Authoritative Server then notifies the Receiving Server whether the key is valid. This is done by creating a <db:verify/> element which MUST possess 'from' and 'to' attributes whose values are swapped from the request, MUST possess an 'id' attribute whose value is copied from the 'id' value of the request, and MUST possess a 'type' attribute whose value is either "valid" or "invalid".</p>
|
<p>The Authoritative Server then notifies the Receiving Server whether the key is valid. This is done by creating a <db:verify/> element which MUST possess 'from' and 'to' attributes whose values are swapped from the request, MUST possess an 'id' attribute whose value is copied from the 'id' value of the request, and MUST possess a 'type' attribute whose value is either "valid" or "invalid".</p>
|
||||||
<p>Therefore, here again the result is either valid (this is the same as Example 7)...</p>
|
<p>Therefore, here again the result is either valid (this is the same as Example 6)...</p>
|
||||||
<example caption="Authoritative Server Informs Receiving Server that Key is Valid (Step 3)"><![CDATA[
|
<example caption="Authoritative Server Informs Receiving Server that Key is Valid (Step 3)"><![CDATA[
|
||||||
send: <db:verify
|
send: <db:verify
|
||||||
from='montague.lit'
|
from='montague.example'
|
||||||
id='417GAF25'
|
id='417GAF25'
|
||||||
to='capulet.lit'
|
to='capulet.example'
|
||||||
type='valid'/>
|
type='valid'/>
|
||||||
]]></example>
|
]]></example>
|
||||||
<p>... or invalid (this is the same as Example 8)...</p>
|
<p>... or invalid (this is the same as Example 7)...</p>
|
||||||
<example caption="Authoritative Server Informs Receiving Server that Key is Invalid (Step 3)"><![CDATA[
|
<example caption="Authoritative Server Informs Receiving Server that Key is Invalid (Step 3)"><![CDATA[
|
||||||
send: <db:verify
|
send: <db:verify
|
||||||
from='montague.lit'
|
from='montague.example'
|
||||||
id='417GAF25'
|
id='417GAF25'
|
||||||
to='capulet.lit'
|
to='capulet.example'
|
||||||
type='invalid'/>
|
type='invalid'/>
|
||||||
]]></example>
|
]]></example>
|
||||||
<p>There are several reasons why the key might be invalid (e.g., the Authoritative Server has a different secret key or the Authoritative Server doesn't know anything about the StreamID communicated in the <db:result/> element it received from the Receiving Server).</p>
|
<p>There are several reasons why the key might be invalid (e.g., the Authoritative Server has a different secret key or the Authoritative Server doesn't know anything about the StreamID communicated in the <db:result/> element it received from the Receiving Server).</p>
|
||||||
@ -551,7 +562,7 @@ send: <db:verify
|
|||||||
</section2>
|
</section2>
|
||||||
|
|
||||||
<section2 topic="Directionality" anchor='directionality'>
|
<section2 topic="Directionality" anchor='directionality'>
|
||||||
<p>The result of the protocol exchanges shown in the foregoing two sections is that the server hosting montague.lit has verified the identity of the server hosting capulet.lit and vice versa. Since XMPP Server-to-Server connections are unidirectional (unless <cite>XEP-0288</cite> is used), dialback needs to be completed in each direction before XML stanzas can be exchanged over the two TCP connections between the servers.</p>
|
<p>The result of the protocol exchanges shown in the foregoing two sections is that the server hosting montague.example has verified the identity of the server hosting capulet.example. Since XMPP Server-to-Server connections are unidirectional (unless <cite>XEP-0288</cite> is used), dialback needs to be completed in each direction before XML stanzas can be exchanged over the two TCP connections between the servers.</p>
|
||||||
</section2>
|
</section2>
|
||||||
|
|
||||||
<section2 topic="Advertisement" anchor='advertisement'>
|
<section2 topic="Advertisement" anchor='advertisement'>
|
||||||
@ -563,15 +574,15 @@ send: <db:verify
|
|||||||
xmlns='jabber:server'
|
xmlns='jabber:server'
|
||||||
xmlns:db='jabber:server:dialback'
|
xmlns:db='jabber:server:dialback'
|
||||||
xmlns:stream='http://etherx.jabber.org/streams'
|
xmlns:stream='http://etherx.jabber.org/streams'
|
||||||
from='montague.lit'
|
from='montague.example'
|
||||||
to='capulet.lit'>
|
to='capulet.example'>
|
||||||
]]></example>
|
]]></example>
|
||||||
<p>Note: Although in general advertising protocol support by means of an XML namespace declaration has been superseded by the use of stream features as originally defined in <cite>RFC 3920</cite>, the server dialback protocol predates the existence of stream features and therefore the namespace declaration method is still used in this instance.</p>
|
<p>Note: Although in general advertising protocol support by means of an XML namespace declaration has been superseded by the use of stream features as originally defined in <cite>RFC 3920</cite> and updated in <cite>RFC 6120</cite>, the server dialback protocol predates the existence of stream features and therefore the namespace declaration method is still used in this instance.</p>
|
||||||
<p>Note: It is conventional to use a namespace prefix of "db" for Server Dialback elements. Although the prefix is allowed to be other than "db" according to the XML namespaces specification (&w3xmlnamespaces;), some existing implementations and deployments might accept only the "db" prefix.</p>
|
<p>Note: It is conventional to use a namespace prefix of "db" for Server Dialback elements. Although the prefix is allowed to be other than "db" according to the XML namespaces specification (&w3xmlnamespaces;), some existing implementations and deployments might accept only the "db" prefix.</p>
|
||||||
</section3>
|
</section3>
|
||||||
|
|
||||||
<section3 topic="Dialback with Error Handling" anchor='advertisement-errors'>
|
<section3 topic="Dialback with Error Handling" anchor='advertisement-errors'>
|
||||||
<p>If a server supports graceful handling of dialback errors as described under Section 2.4, it MUST advertise that via a stream feature which is a <dialback/> element qualified by the 'urn:xmpp:features:dialback' namespace, including an empty <errors/> element.</p>
|
<p>If a server supports graceful handling of dialback errors as described in this document, it MUST advertise that via a stream feature which is a <dialback/> element qualified by the 'urn:xmpp:features:dialback' namespace, including an empty <errors/> element.</p>
|
||||||
<example caption="Stream Features With <errors/> Element"><![CDATA[
|
<example caption="Stream Features With <errors/> Element"><![CDATA[
|
||||||
<stream:features>
|
<stream:features>
|
||||||
<dialback xmlns='urn:xmpp:features:dialback'>
|
<dialback xmlns='urn:xmpp:features:dialback'>
|
||||||
@ -585,8 +596,8 @@ send: <db:verify
|
|||||||
|
|
||||||
<section2 topic="Dialback Error Conditions" anchor='errors'>
|
<section2 topic="Dialback Error Conditions" anchor='errors'>
|
||||||
<!-- credits: Matthias in http://mail.jabber.org/pipermail/standards/2007-June/015662.html -->
|
<!-- credits: Matthias in http://mail.jabber.org/pipermail/standards/2007-June/015662.html -->
|
||||||
<p><cite>RFC 3920</cite> introduced stream errors for any errors related to dialback. However, this turned out to be overly aggressive, particularly if the XML stream was used to multiplex stanzas for more than one domain pair (since closing the stream would result in throwing away accumulated dialback state for a potentially large number of domain pairs). Therefore this specification introduces a third value for the 'type' attribute: "error".</p>
|
<p><cite>RFC 3920</cite> introduced stream errors for any errors related to dialback. However, this turned out to be overly aggressive, particularly if the XML stream was used to multiplex stanzas for more than one domain pair (since closing the stream would result in throwing away accumulated dialback state for a potentially large number of domain pairs). Therefore this specification defines a third value for the 'type' attribute: "error".</p>
|
||||||
<p>This usage of the 'error' value for the 'type' attribute is not fully backward compatible with <cite>RFC 3920</cite>. However, the server that generates the error SHOULD still attempt to send the dialback error instead of terminating the stream, as the worst thing that can happen is that the remote server terminates the stream if it does not understand the error or if it eventually times out the connection. Dialback errors are to be considered non-fatal for the XML stream, but the Initiating Server MUST return queued stanzas to the respective senders with a &timeout; stanza error. If an error is encountered in Step 3 of the dialback negotiation, the Receiving Server MUST send a <remote-server-not-found/> error to the Initiating Server.</p>
|
<p>This usage of the 'error' value for the 'type' attribute is not fully backward compatible with <cite>RFC 3920</cite>. However, the server that generates the error SHOULD still attempt to send the dialback error instead of terminating the stream, as the worst thing that can happen is that the remote server terminates the stream if it does not understand the error or if it eventually times out the connection. Dialback errors are to be considered non-fatal for the XML stream, but the Initiating Server MUST return queued stanzas to the respective senders with a &timeout; stanza error. If an error is encountered in Step 3 of the dialback negotiation, the Receiving Server MUST send a <remote-server-not-found/> dialback error to the Initiating Server.</p>
|
||||||
<p>When the <db:verify/> or <db:result/> element is of type "error", the element MUST contain an <error/> element (implicitly qualified by the 'jabber:server' namespace), which MUST in turn contain an XML element qualified by the 'urn:ietf:params:xml:ns:xmpp-stanzas' namespace (i.e., a stanza error condition), in accordance with the following table.</p>
|
<p>When the <db:verify/> or <db:result/> element is of type "error", the element MUST contain an <error/> element (implicitly qualified by the 'jabber:server' namespace), which MUST in turn contain an XML element qualified by the 'urn:ietf:params:xml:ns:xmpp-stanzas' namespace (i.e., a stanza error condition), in accordance with the following table.</p>
|
||||||
<table caption='Dialback error conditions'>
|
<table caption='Dialback error conditions'>
|
||||||
<tr>
|
<tr>
|
||||||
@ -616,12 +627,12 @@ send: <db:verify
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>&policy;</td>
|
<td>&policy;</td>
|
||||||
<td>The Receiving Server enforces a policy which mandates usage of TLS before dialback and the Initiating Server sent the dialback request without using TLS.</td>
|
<td>The Receiving Server enforces a policy mandating usage of TLS before dialback and the Initiating Server sent the dialback request without using TLS.</td>
|
||||||
<td>Step 3 or 4</td>
|
<td>Step 3 or 4</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>¬authorized;</td>
|
<td>¬authorized;</td>
|
||||||
<td>The Receiving Server enforces a policy which requires a valid x509 certificate containing the identity of the Sender Domain for dialback requests and the Initiating Server did not provide a certificate with an identity that matches the Sender Domain.</td>
|
<td>The Receiving Server enforces a policy requiring either a valid PKIX certificate containing the identity of the Sender Domain or some other proof of authorization (e.g., via POSH), and the Initiating Server did not provide proof of authorization.</td>
|
||||||
<td>Step 3</td>
|
<td>Step 3</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
@ -643,30 +654,33 @@ send: <db:verify
|
|||||||
-->
|
-->
|
||||||
|
|
||||||
<section2 topic="Multiplexing" anchor='multiplex'>
|
<section2 topic="Multiplexing" anchor='multiplex'>
|
||||||
<p>A single XML stream between Initiating Server and Receiving Server can be used to multiplex stanzas for more than one domain pair. We call this usage "multiplexing" (historically it has also been known as "piggybacking"). One common motivation for multiplexing is virtual hosting, under which many domains are hosted on the same server. Another common motivation for such reuse is the existence of additional services associated with the Sender Domain but hosted at "subdomains" thereof. For example, both the "montague.lit" and the "capulet.lit" XMPP servers might host &xep0045; services at "chat.montague.lit" and "rooms.capulet.lit" respectively. Without multiplexing, many server-to-server connections would be necessary to exchange stanzas between those domains. With more domains, the number of connections might exceed the maximum number of connections allowed from a single IP address as explained in &xep0205;. Multiplexing reduces the number of connections to two.</p>
|
<p>A single XML stream between Initiating Server and Receiving Server can be used to multiplex stanzas for more than one domain pair. We call this usage "multiplexing" (historically it has also been known as "piggybacking").</p>
|
||||||
<p>Note: Because dialback operates on domain pairs, a total of eight dialback negotiations is necessary for a bidirectional exchange of stanzas between two sending domains and two target domains.</p>
|
<p>One common motivation for multiplexing is virtual hosting, under which many domains are hosted on the same server. This problem is described more fully in the Domain Name Associations specification, <cite>draft-ietf-xmpp-dna</cite>).</p>
|
||||||
|
<p>Another common motivation for such reuse is the existence of additional services associated with the Sender Domain but hosted at "subdomains" thereof. For example, both the "montague.example" and the "capulet.example" XMPP servers might host &xep0045; services at "chat.montague.example" and "rooms.capulet.example" respectively. Because dialback operates on domain pairs, a total of eight dialback negotiations would be necessary for a bidirectional exchange of stanzas between two sending domains and two target domains.</p>
|
||||||
|
<p>If multiplexing is not used, the number of server-to-server connections needed to exchange stanzas between virtual hosting providers or multi-service XMPP servers can increase signficantly. Indeed, when the number of hosted domains becomes especially large, the number of connections might exceed the maximum number of connections allowed from a single IP address as explained in &xep0205;.</p>
|
||||||
|
<p>If multiplexing is used, the number of connections can be limited to only two (or, at the operator's discretion, more than two for operational reasons).</p>
|
||||||
|
|
||||||
<section3 topic="Multiplexing Sender Domains" anchor="sendermultiplex">
|
<section3 topic="Multiplexing Sender Domains" anchor="sendermultiplex">
|
||||||
<p>In order to accept XML stanzas from rooms at "rooms.capulet.lit" intended for addresses at "montague.lit", the "montague.lit" domain will need to validate the "rooms.capulet.lit" domain (just as it already did for the "capulet.lit" domain). Thus the server hosting both capulet.lit and rooms.capulet.lit would now initiate a dialback negotiation with the server hosting montague.lit but specify the Sender Domain as "rooms.capulet.lit". Specifying different Sender Domains is called "sender multiplexing" and MAY be used without further negotation.</p>
|
<p>In order to accept XML stanzas from rooms at "rooms.capulet.example" intended for addresses at "montague.example", the "montague.example" domain will need to validate the "rooms.capulet.example" domain (just as it already did for the "capulet.example" domain). Thus the server hosting both capulet.example and rooms.capulet.example would now initiate a dialback negotiation with the server hosting montague.example but specify the Sender Domain as "rooms.capulet.example". Specifying different Sender Domains is called "sender multiplexing" and MAY be used without further negotation.</p>
|
||||||
</section3>
|
</section3>
|
||||||
|
|
||||||
<section3 topic="Multiplexing Target Domains" anchor="targetmultiplex">
|
<section3 topic="Multiplexing Target Domains" anchor="targetmultiplex">
|
||||||
<p>Likewise, to send stanzas to rooms at "chat.montague.lit" from addresses at "capulet.lit", the server hosting both capulet.lit and rooms.capulet.lit would initiate dialback negotiation with the server hosting chat.montague.lit (probably on the same connection that is already used to send stanzas from "capulet.lit" to "montague.lit"), specifying the Target Domain as "chat.montague.lit". Specifying different target domains is called "target multiplexing".</p>
|
<p>Likewise, to send stanzas to rooms at "chat.montague.example" from addresses at "capulet.example", the server hosting both capulet.example and rooms.capulet.example would initiate dialback negotiation with the server hosting chat.montague.example (probably on the same connection that is already used to send stanzas from "capulet.example" to "montague.example"), specifying the Target Domain as "chat.montague.example". Specifying different target domains is called "target multiplexing".</p>
|
||||||
<p>The Initiating Server SHOULD NOT use target multiplexing unless the Receiving Server has signalled support for dialback error handling via <stream:features/> as described under <link url='#advertisement-errors'>Dialback with Error Handling</link>. The Initiating Server MAY then attempt to multiplex a new Sender Domain on the stream to the Receiving Server that is already used for another Sender Domain if the hostname and port resolution results in the same IP address and port combination. For example:</p>
|
<p>The Initiating Server SHOULD NOT use target multiplexing unless the Receiving Server has signalled support for dialback error handling via <stream:features/> as described under <link url='#advertisement-errors'>Dialback with Error Handling</link>. The Initiating Server MAY then attempt to multiplex a new Sender Domain on the stream to the Receiving Server that is already used for another Sender Domain if the hostname and port resolution results in the same IP address and port combination. For example:</p>
|
||||||
<example caption="DNS SRV Record for the montague.lit Zone"><![CDATA[
|
<example caption="DNS SRV Record for the montague.example Zone"><![CDATA[
|
||||||
_xmpp-server._tcp.montague.lit. 86400 IN SRV 10 0 5269 home.montague.lit
|
_xmpp-server._tcp.montague.example. 86400 IN SRV 10 0 5269 home.montague.example
|
||||||
_xmpp-server._tcp.chat.montague.lit. 86400 IN SRV 10 0 5269 home.montague.lit
|
_xmpp-server._tcp.chat.montague.example. 86400 IN SRV 10 0 5269 home.montague.example
|
||||||
home.montague.lit. 86400 IN A 10.44.0.4
|
home.montague.example. 86400 IN A 10.44.0.4
|
||||||
]]></example>
|
]]></example>
|
||||||
<p>Because DNS SRV lookups for both "montague.lit" and "chat.montague.lit" point to the same target ("home.montague.lit") and port (5269), or eventually resolve to the same IP address (10.44.0.4) and port (5269), "capulet.lit" MAY initiate a dialback negotation from "capulet.lit" to "chat.montague.lit" over the same XML stream that is already used to send stanzas from "capulet.lit" to "montague.lit".</p>
|
<p>Because DNS SRV lookups for both "montague.example" and "chat.montague.example" point to the same target ("home.montague.example") and port (5269), or eventually resolve to the same IP address (10.44.0.4) and port (5269), "capulet.example" MAY initiate a dialback negotation from "capulet.example" to "chat.montague.example" over the same XML stream that is already used to send stanzas from "capulet.example" to "montague.example".</p>
|
||||||
<p>&xep0288; extends those rules since any domain that has been used as a source domain can be used as a target domain without further negotiation.</p>
|
<p>&xep0288; extends those rules since any domain that has been used as a source domain can be used as a target domain without further negotiation.</p>
|
||||||
</section3>
|
</section3>
|
||||||
</section2>
|
</section2>
|
||||||
</section1>
|
</section1>
|
||||||
|
|
||||||
<section1 topic='Security Considerations' anchor='security'>
|
<section1 topic='Security Considerations' anchor='security'>
|
||||||
<p>Server Dialback helps protect against domain spoofing, thus making it difficult to spoof the origin of XML stanzas. Absent the use of DNS security (DNSSEC, &rfc4033;), Server Dialback does not provide a mechanism for authenticating a stream, as is done via TLS and SASL, and results in weak verification of server identities only. Furthermore, if DNSSEC is not used then it is susceptible to DNS poisoning attacks.</p>
|
<p>Server Dialback helps protect against domain spoofing, thus making it difficult to spoof the origin of XML stanzas. Absent the use of DNS security (DNSSEC, <cite>RFC 4033</cite>), Server Dialback does not provide a mechanism for authenticating a stream, as is done via TLS and SASL, and results in weak verification of server identities only. Furthermore, if DNSSEC is not used then it is susceptible to DNS poisoning attacks.</p>
|
||||||
<p>If DNSSEC is used, Server Dialback provides stream authentication only (i.e., a strong association between a domain name and an XML stream). However, Server Dialback by itself does not provide confidentiality, data integrity, or stream encryption. Some existing implementations are known to support dialback over TLS. Server Dialback is typically carried out the same way as without TLS, but gains from the use of channel encryption.</p>
|
<p>If DNSSEC is used, Server Dialback provides stream authentication only (i.e., a strong association between a domain name and an XML stream). However, Server Dialback by itself does not provide confidentiality, data integrity, or stream encryption. Some existing implementations are known to support dialback over TLS. In this case, Server Dialback is typically carried out the same way as without TLS, but gains from the use of channel encryption.</p>
|
||||||
<section2 topic='Unsolicited Dialback' anchor='security-unsolicited'>
|
<section2 topic='Unsolicited Dialback' anchor='security-unsolicited'>
|
||||||
<p>In mid-2012, several implementations turned out to be vulnerable to a number of attacks against the protocol described in this document. These attacks were based on sending verify (STEP 3) or result (STEP 4) responses without an associated request, in an unexpected direction and/or on an unexpected XML stream. Failure to reject those 'unsolicited' responses lets an attacker either spoof stanzas with an arbitrary sender domain or enables him to impersonate any target domain.</p>
|
<p>In mid-2012, several implementations turned out to be vulnerable to a number of attacks against the protocol described in this document. These attacks were based on sending verify (STEP 3) or result (STEP 4) responses without an associated request, in an unexpected direction and/or on an unexpected XML stream. Failure to reject those 'unsolicited' responses lets an attacker either spoof stanzas with an arbitrary sender domain or enables him to impersonate any target domain.</p>
|
||||||
</section2>
|
</section2>
|
||||||
@ -695,10 +709,6 @@ home.montague.lit. 86400 IN A 10.44.0.4
|
|||||||
</section2>
|
</section2>
|
||||||
</section1>
|
</section1>
|
||||||
|
|
||||||
<section1 topic='Acknowledgments' anchor='ack'>
|
|
||||||
<p>Thanks to Richard Barnes, Dave Cridland, Jack Erwin, Joe Hildebrand, Justin Karneges, Nina Kirchner, Carlo von Loesch, Ralph Meijer, Chris Newton, Rob Norris, Tory Patnoe, Dave Richards, Matthew Wild, and Matthias Wimmer for their comments.</p>
|
|
||||||
</section1>
|
|
||||||
|
|
||||||
<section1 topic='XML Schema' anchor='schema'>
|
<section1 topic='XML Schema' anchor='schema'>
|
||||||
<section2 topic="Dialback" anchor="schema-dialback">
|
<section2 topic="Dialback" anchor="schema-dialback">
|
||||||
<p>Note Well: the 'error' value for the 'type' attribute and the <error/> child element were added since RFC 3920.</p>
|
<p>Note Well: the 'error' value for the 'type' attribute and the <error/> child element were added since RFC 3920.</p>
|
||||||
@ -740,6 +750,7 @@ home.montague.lit. 86400 IN A 10.44.0.4
|
|||||||
</xs:all>
|
</xs:all>
|
||||||
<xs:attribute name='from' type='xs:string' use='required'/>
|
<xs:attribute name='from' type='xs:string' use='required'/>
|
||||||
<xs:attribute name='to' type='xs:string' use='required'/>
|
<xs:attribute name='to' type='xs:string' use='required'/>
|
||||||
|
<xs:attribute name='id' type='xs:NMTOKEN' use='required'/>
|
||||||
<xs:attribute name='type' use='optional'>
|
<xs:attribute name='type' use='optional'>
|
||||||
<xs:simpleType>
|
<xs:simpleType>
|
||||||
<xs:restriction base='xs:NCName'>
|
<xs:restriction base='xs:NCName'>
|
||||||
@ -783,4 +794,9 @@ home.montague.lit. 86400 IN A 10.44.0.4
|
|||||||
]]></code>
|
]]></code>
|
||||||
</section2>
|
</section2>
|
||||||
</section1>
|
</section1>
|
||||||
|
|
||||||
|
<section1 topic='Acknowledgments' anchor='ack'>
|
||||||
|
<p>Thanks to Richard Barnes, Dave Cridland, Jack Erwin, Joe Hildebrand, Justin Karneges, Nina Kirchner, Carlo von Loesch, Ralph Meijer, Chris Newton, Rob Norris, Tory Patnoe, Dave Richards, Matthew Wild, and Matthias Wimmer for their comments.</p>
|
||||||
|
</section1>
|
||||||
|
|
||||||
</xep>
|
</xep>
|
||||||
|
Loading…
Reference in New Issue
Block a user