%ents; ]>
Encapsulated Digital Signatures in XMPP This document provides a technical specification for Encapsulated Digital Signatures in the Extensible Messaging and Presence Protocol (XMPP). &LEGALNOTICE; 0290 Deferred Standards Track Standards Council XMPP Core XEP-0001 N/A &kdz; 0.2 2011-01-28 kdz

Merge manifest and schema-desc objects.

0.1 2011-01-26 psa

Initial published version.

0.0.1 2010-11-29 kdz

Proto-XEP draft.

This document is one of two proposals for digital signatures in XMPP. It is expected that only one of these proposals be progressed beyond Experimental on the Standards Track.

This document provides a technical specification for Encapsulated Digital Signatures in Extensible Messaging and Presence Protocol (&xmpp;).

XMPP Digital Signatures may be used to provide signer authentication, data integrity, non-repudiation, and other security services.

This extension is intended to be highly flexible, supporting a wide range of applications. The extension not only supports signing by the originator, but by other entities which handle XMPP stanzas. Multiple entities may independently sign a stanza.

A signed manifest approach is used to allow selective signing (only select elements may be included in the manifest) and to allow flexibility in handling verification errors.

This extension is intended to support optimistic signing.

This document offers an encapsulated signature approach based upon &w3xmlsig; (XMLDSIG). Implementations of this extension not required to fully implement the XML DSIG specification, they may implement only the minimal subset necessary to support this extension.

It is noted that a number of object-level XMPP digital signature extensions have been specified over the years. These include &rfc3923; (XMPP E2E), &xep0116; (XMPP PGP), and &xep0285;. The limited applicability of encapsulating signature approaches in XMPP is discussed in &xep0274;.

The process that a sending agent follows for securing stanzas is very similar regardless of the form of stanza (i.e., <iq/>, <message/>, or <presence/>).

The signer begins with the cleartext version of the <message/> stanza "S":

8996aef0-061d-012d-347a-549a200771aa Wherefore art thou, Romeo? ]]>

This is modified prior to signing as follows:

8996aef0-061d-012d-347a-549a200771aa Wherefore art thou, Romeo? ]]>

The signer builds a stanza description object containing a signer element, the stanza element, and a timestamp element. The signer element value is the bare JID of the signing entity. When the signing entity is a service entity, the JID may only contain service domain. The stanza-desc element is the stanza prepared above with each of its child elements replaced by an reference element. The reference element references the child element via a "urn:xmpp:dsig:ref:0" URI with an anchor of the value of child element's d:id. The value of the reference element is the digest value produced by the digest method after the specified transforms are applied.

juliet@capulet.net ... ... 2010-11-11T13:33:00.123Z ]]>

The signer then builds a SignedInfo element.

... ]]>

And then produces a Signature element:

... juliet@capulet.net ... ... 2010-11-11T13:33:00.123Z ]]>

The signer than computes the SignatureValue element, processing the Signature element as a detached signature, and replaces the empty Signature element with it. Finally, the signer inserts the Signature element into stanza and forwards the stanza as it normally would.

8996aef0-061d-012d-347a-549a200771aa Wherefore art thou, Romeo? ... ... juliet@capulet.net ... ... 2010-11-11T13:33:00.123Z ]]>

For referenced elements of a stanza, the referenced element is normalized (omitting comments), as detailed in &w3canon;, as a document subset of a document containing a stream element containing the appropriate jabber:client stanza element containing the stanza with the referenced elements. Note that jabber:client stanzas are used when constructing this document even when a server is signing a stanza to be sent to another server.

For the stanza in Example 2, the input document would be:

8996aef0-061d-012d-347a-549a200771aa Wherefore art thou, Romeo? ]]>

The canonical form of element referenced by urn:xmpp:dsig:ref:0#xxx-1 would be:

8996aef0-061d-012d-347a-549a200771aa]]>

The URI 'uri:xmpp:dsig:ref:0#xxxx" refers to the child element of the stanza which contains the 'uri:xmpp:dsig:0' 'id' attribute with the value "xxxx".

Timestamps are included to help prevent replay attacks. All timestamps MUST conform to &rfc3339; and be presented as UTC with no offset, always including the seconds and fractions of a second to three digits (resulting in a datetime 24 characters in length). Absent a local adjustment to the sending agent's perceived time or the underlying clock time, the sending agent MUST ensure that the timestamps it sends to the receiver increase monotonically (if necessary by incrementing the seconds fraction in the timestamp if the clock returns the same time for multiple requests). The following rules apply to the receiving application:

The foregoing timestamp checks assume that the recipient is online when the message is received. However, if the recipient is offline then the server will probably store the message for delivery when the recipient is next online (offline storage does not apply to <iq/> or <presence/> stanzas, only <message/> stanzas). As described in &xep0160;, when sending an offline message to the recipient, the server SHOULD include delayed delivery data as specified in &xep0203; so that the recipient knows that this is an offline message and also knows the original time of receipt at the server. In this case, the recipient SHOULD verify that the timestamp received in the encrypted message is within five minutes of the time stamped by the recipient's server in the <delay/> element.

All implementations MUST support the following algorithms. Implementations MAY support other algorithms as well.

To participate in end-to-end signing using the methods defined in this document, a client needs to possess an X.509 certificate. It is expected that many clients will generate their own (self-signed) certificates rather than obtain a certificate issued by a certification authority (CA). In any case the certificate MUST include an XMPP address that is represented using the ASN.1 Object Identifier "id-on-xmppAddr" as specified in Section 5.1.1 of RFC 3920bis.

TBD.

A URN sub-namespace of signed content for the Extensible Messaging and Presence Protocol (XMPP) is defined as follows.

URI:
urn:xmpp:dsig
Specification:
ProtoXEP
Description:
This is an XML namespace name of signed content for the Extensible Messaging and Presence Protocol as defined by ProtoXEP.
Registrant Contact:
XSF