%ents; ]>
Extensible SASL Profile This document describes a replacement for the SASL profile documented in RFC 6120 which allows for greater extensibility. &LEGALNOTICE; 0388 Deferred Standards Track Standards XMPP Core sasl2 &dcridland; 0.3.0 2018-10-01 XEP Editor (jsc) Defer due to lack of activity. 0.2.1 2017-08-24 dwd
  • That's a lot of XML errors. Sorry.
  • Clarified whose additional-data this is.
  • <next> uses <initial-response>.
  • Added a bunch of example flows.
0.2.0 2017-08-14 dwd

Updated according to implementation experience:

  • Updated namespace
  • Continue "mechanisms" are not; changed these to "tasks".
  • Added stream features after Success.
  • Don't need complexity of "=" encoding; removed.
  • Fixed internal links.
  • Updated examples.
0.1.0 2017-03-16 XEP Editor (ssw)
  • Move to experimental.
0.0.1 2017-02-07 dwd
  • Initial Revision

While SASL provides an excellent framework that has served us well over the past 18 years, a number of shortcomings in the profile - the syntax binding to XMPP - that is in use.

This specification addresses a number of shortfalls:

The new SASL profile documented herein is primarily a syntactic change to allow extensibility, combined with removal of the (largely) redundant stream restart, and additional results beyond total success or abject failure.

Although initiating entities, in general, use SASL, and receiving entities offer it, the SASL specification and common parlance both use "Client " and "Server"; this specification uses Client and Server and assumes C2S links. This is not intended to preclude use of this SASL profile on S2S links. The term "SASL2" is used to mean the new SASL profile specified in this document; however the same RFC 4422 definition of SASL (and SASL profiles) applies.

Examples often use hypothetical SASL mechanisms and sub-extensions; this specification does not intend to make a position on any particular SASL mechanism, and the Mandatory To Implement mechanisms are unaffected.

Servers capable of SASL2 offer a stream feature of <mechanisms/>, qualified by the "urn:xmpp:sasl:1" namespace. This in turn contains one or more <mechanism/> elements in the same namespace, and potentially other elements (for example, the <hostname/> element defined within XEP-0233).

Note that SASL2 is impossible for clients to initiate without at least one mechanism being available, and therefore MUST NOT be offered.

The feature so advertised, and its child content, SHOULD be stable for the given stream to and from attributes and encryption state, and therefore MAY be cached by clients for later connections.

The Service Name used by XMPP is unchanged from RFC 6120.

In all cases, both Clients and Servers encode SASL exchanges using Base 64 encoding. This SHOULD NOT include any line wrapping or other whitespace. As the form <element/> is equivalent to <element></element>, these both indicate an empty string. Challenges and responses with no data do not occur in SASL, and so require no special handling. To indicate the absence of an initial response, or the absence of success data, the element is simply not included.

Clients, upon observing this stream feature, initiate the authentication by the use of the <authenticate/> top-level element, within the same namespace. The nature of this element is to inform the server about properties of the final stream state, as well as initiate authentication itself. To achieve the latter, it has a single mandatory attribute of "mechanism", with a string value of a mechanism name offered by the Server in the stream feature, and an optional child element of <initial-response/>, containing a base64-encoded SASL Initial Response.

On subsequent connections, if a Client has previously cache the stream feature, the Client MAY choose to send it before seeing the stream features - sending it "pipelined" with the Stream Open tag for example.

Tm9ib2R5IGV2ZXIgZGVjb2RlcyB0aGUgZXhhbXBsZXMu ]]>

In order to provide support for other desired stream states beyond authentication, additional child elements are used. For example, a hypothetical XEP-0198 session resumption element might be included, and/or Resource Binding requests.

SSBzaG91bGQgbWFrZSB0aGlzIGEgY29tcGV0aXRpb24= ]]>

Server Challenges MAY then be sent. Each Challenge MUST be responded to by a Client in a Client Response. These are not extensible, and contain the corresponding base64 encoded SASL data:

U28sIG5leHQgRk9TREVNIC0gMjAxOCwgdGhhdCBpcy4uLg== Li4uSSdsbCBidXkgYSBiZWVyIGZvciB0aGUgZmlyc3QgcGVyc29uIHdoby4uLg== ]]>

At any time while authentication is in progress, neither Client nor Server sends any element (including stanzas) or other data except the top-level elements defined herein. Clients MUST NOT send whitespace, and MUST send only <response/> elements as appropriate or an <abort/> element to immediately cause an error. Servers MUST disconnect Clients immediately if any other traffic is received. Servers are similarly REQUIRED to send no whitespace, and only the <response/> and completion elements from the section below.

Authentication may complete in one of three ways. It may complete successfully, in which case the client is authenticated. It may also fail, in which case the client is not authenticated and the stream and session state remain entirely unchanged.

Finally, it may have completed successfully, but further interaction is required - for example, a password change or second-factor authentication.

If the Client is now authenticated, the Server sends a <success/> element, which contains contains an <authorization-identity/> element containing the negotiated identity - this is a bare JID, unless resource binding has occurred, in which case it is a full JID.

It MAY contain an <additional-data> element, containing additional data from the exchange (task or SASL mechanism) that has just completed.

ip/AeIOfZXKBV+fW2smE0GUB3I//nnrrLCYkt0Vj juliet@montague.example/Balcony/a987dsh9a87sdh ]]>

Other extension elements MAY also be contained by the <success/> element.

SGFkIHlvdSBnb2luZywgdGhlcmUsIGRpZG4ndCBJPw== juliet@montague.example/Balcony/a987dsh9a87sdh ]]>

Any security layer negotiated SHALL take effect after the ">" octet of the closing tag (ie, immediately after "</success>"), if it has not already taken effect at a <continue> - see Continue below.

The <success> element is immediately followed by a <features> element containing the applicable stream features of the newly authenticated stream. Note that no stream restart occurs.

A <failure/> element is used by the server to terminate the authentication attempt. It MAY contain application-specific error codes, and MAY contain a textual error. It MUST contain one of the SASL error codes from RFC 6120 Section 6.5.

This is a terrible example. ]]>

A <continue/> element is used to indicate that while the SASL exchange was successful, it is insufficient to allow authentication at this time.

This can be used to indicate that the Client needs to perform a Second Factor Authentication ("2FA"), or is required to change password.

Such tasks are presented within a <tasks> element, which contains a sequence of <task> elements, each containing a name. These tasks are analogous to a SASL mechanism, but have a number of differences - they may never attempt to negotiate a new authorization identifier, nor a new security layer.

A client MAY choose any one of the offered tasks; if multiple are required a sequence of <continue> exchanges will occur until all mandatory tasks are complete.

The <continue element therefore always contains a <tasks/> element, as defined above. It MAY contain an <additional-data/> element, as the <success/> element does.

Finally, it MAY contain a <text/> element, which can contain human-readable data explaining the nature of the step required.

SSdtIGJvcmVkIG5vdy4= HOTP-EXAMPLE TOTP-EXAMPLE This account requires 2FA ]]>

After the final octet of the first <continue> element, any SASL security layer negotiated in the preceding exchange SHALL be immediately in effect.

Clients respond with a <next/> element, which has a single mandatory attribute of "task", containing the selected task name, and contains an OPTIONAL base64 encoded initial response contained in an <initial-response> element.

SSd2ZSBydW4gb3V0IG9mIGlkZWFzIGhlcmUu ]]>

This provides pointers and/or clarifications to the Overview in the order and manner defined in RFC 4422, section 4.

The service name SHALL be "xmpp", as defined by RFC 6120.

Servers list mechanisms during stream features (See Discovering Support).

Clients initiate using the <authenticate/> top level element (See Initiation.

See Challenges and Responses.

See Completing Authentication.

If a Client specifies an authorization string which is non-empty, the identifier is normalized by treating it as a JID, and performing normalization as described in RFC 7622.

In general, implementors are advised that a non-empty authorization string MAY be considered an error if the stream's from attribute (if present) does not match.

Clients MAY abort unilaterally by sending <abort/> as specified in Client Aborts.

Servers MAY abort unliterally by sending <failure/> with the <aborted/> error code as defined in Failure.

Security Layers take effect after the SASL mechanism itself (ie, the first negotiation) has completed successfully, after the final octet of the server's <success> or <continue>. See Success and Continue.

Option (a) is used - any SASL Security Layer is applied first to data being sent, and TLS applied last.

Although the <continue/> concept does use tasks analogous to multiple SASL sequences, only the first SASL mechanism used is considered an authentication, and only the first can negotiate a security layer.

In particular, once <success/> has been sent by the server, any further <authenticate/> element MUST result in a stream error.

This section provides a fictional example. It is important to note that many of the extensions used wihtin this section do not, in fact, exist and therefore are to be avoided.

Where no additional features that SASL2 makes available are used, the flow of information is identical to the original SASL profile. This example shows the new syntax and draws the reader's attention to the differences.

PLAIN SCRAM-SHA-1 AGFsaWNlQGV4YW1wbGUub3JnCjM0NQ== alice@example.org ]]>

Use of SASL2 in this simple scenario saves one round-trip (due to the lack of stream restart).

Again, this is an equivalent flow to a common SASL1 flow, although using the CRAM-MD5 mechanism which is (thankfully) rarely used in practise.

PLAIN CRAM-MD5 PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2UucmVzdG9uLm1jaS5uZXQ+ tim@example.org ]]>

Use of SASL2 in this simple scenario again simply saves one round-trip.

This moves into the deeply hypothetical. A binding extension is posited, alongside an unrealistic 2FA mechanism which somehow mutually authenticates because why not.

BLURDYBLOOP SW5pdGlhbCBSZXNwb25zZQ== this-one-please PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2UucmVzdG9uLm1jaS5uZXQ+ QWRkaXRpb25hbCBEYXRh UNREALISTIC-2FA VW5yZWFsaXN0aWMgMkZBIElS PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2UucmVzdG9uLm1jaS5uZXQ+ VW5yZWFsaXN0aWMgMkZBIG11dHVhbCBhdXRoIGRhdGE= alice@example.org/this-one-please ]]>

Although the unrealistic 2FA here uses 2 round-trips (real ones will probably use one), the embedding of resource binding as shown here means that a second RTT is saved by SASL2, and there's no net change. A more realistic example would see RTTs saved, and additional negotiations could be added to further reduce RTTs.

Relative to the SASL profile documented in RFC 6120, this introduces more data unprotected by any security layer negotiated by SASL itself.

While no actual exchanges are introduced that are unprotected, the nature of this exchange might allow for (for example) a resource binding extension to be introduced.

SASL security layers are sparingly used in the field, however, so this is thought to be a theoretical, rather than practical, concern.

This XEP requires no interaction with &IANA;.

None.

]]>

The author wishes to share any credit with many members of the community, including Lance Stout, Ralph Meijer, Phil Roberts and Florian Schmaus.