%ents; ]>
HTTP over XMPP transport This specification defines how XMPP can be used to transport HTTP communication over peer-to-peer networks. This XMPP Extension Protocol is copyright (c) 1999 - 2013 by the XMPP Standards Foundation (XSF). Permission is hereby granted, free of charge, to any person obtaining a copy of this specification (the "Specification"), to make use of the Specification without restriction, including without limitation the rights to implement the Specification in a software program, deploy the Specification in a network service, and copy, modify, merge, publish, translate, distribute, sublicense, or sell copies of the Specification, and to permit persons to whom the Specification is furnished to do so, subject to the condition that the foregoing copyright notice and this permission notice shall be included in all copies or substantial portions of the Specification. Unless separate permission is granted, modified works that are redistributed shall not contain misleading information regarding the authors, title, number, or publisher of the Specification, and shall not claim endorsement of the modified works by the authors, any organization or project to which the authors belong, or the XMPP Standards Foundation. ## NOTE WELL: This Specification is provided on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. In no event shall the XMPP Standards Foundation or the authors of this Specification be liable for any claim, damages, or other liability, whether in an action of contract, tort, or otherwise, arising from, out of, or in connection with the Specification or the implementation, deployment, or other use of the Specification. ## In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall the XMPP Standards Foundation or any author of this Specification be liable for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising out of the use or inability to use the Specification (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if the XMPP Standards Foundation or such author has been advised of the possibility of such damages. This XMPP Extension Protocol has been contributed in full conformance with the XSF's Intellectual Property Rights Policy (a copy of which may be found at <http://www.xmpp.org/extensions/ipr-policy.shtml> or obtained by writing to XSF, P.O. Box 1641, Denver, CO 80201 USA). xxxx ProtoXEP Standards Track Standards Council XMPP Core XEP-0001 XEP-0030 XEP-0137 XEP-0166 NOT_YET_ASSIGNED Peter Waher peter.waher@clayster.com peter.waher@jabber.org http://se.linkedin.com/pub/peter-waher/1a/71b/a29/ 0.0.1 2013-05-05 pw

First draft.

Many documents have been written about how to transport XMPP datagrams using HTTP. The motivation behind such solutions has often been to be able to use XMPP in scripting languages such as Java Script running in web browsers.

But very little has been written up to this point about the reverse: How to transport HTTP methods and HTTP responses over an XMPP-based peer-to-peer network. Here, the motivation is as follows: There are multitudes of applications and APIs written that are based on HTTP over TCP as the basic communication transport protocol. As these are moving closer and closer to the users, problems arise when the users want to protect their data and services using firewalls. Even though there are methods today to open up firewalls manually or automatically permit communication with such devices and applications, you still open up the application for everybody. This rises the need for more advanced security measures which is sometimes difficult to implement using HTTP.

The XMPP protocol however does not have the same problems as HTTP in these regards. It's a peer-to-peer protocol naturally allowing communication with applications and devices behind firewalls. It also includes advanced user authentication and authorization which makes it easier to make sure unauthorized access to private content is prevented.

Furthermore, with the advent of semantic web technologies and its use in web 3.0 and Internet of Things applications, such applications move even more rapidly into the privte spheres of the users, where security and privacy is of paramount importance, the need to use more secure transport protocols than HTTP over TCP is necessary.

There are many different types of HTTP-based communication that one would like to be able to transport over XMPP. A non-exhaustive list can include:

Instead of trying to figure out all possible things transportable over HTTP and make them transportable over XMPP, this document ignores the type of content transported, and instead focuses on encoding and decoding the original HTTP requests and responses, building an HTTP tunnel over an existing XMPP connection. It would enable existing applications to work seamlessly over XMPP if browsers and web services supported this extension (like displaying your home control application on your phone when you are at work), without the need to update the myriad of existing applications. It would also permit federated SPARQL queries in personal networks with the added benefit of being able to control who can talk to who (or what can talk to what) through established friendship relationships.

Previous extensions handling different aspects of XMPP working together with HTTP:

This document presupposes the server already has a web server (HTTP Server) implementation, and that it hosts content through it, content which can be both dynamic (i.e. generated) or static (for example files) in nature. Content, which it wants to publish to XMPP clients as well as HTTP clients. It also presupposes that the client is aware of HTTP semantics and MIME encoding.

The following table lists common terms and corresponding descriptions.

HTTP
Hyper Text Transfer Protocol. Version 1.1 of HTTP is described in RFC 2616: Hypertext Transfer Protocol -- HTTP/1.1 <http://tools.ietf.org/html/rfc2616> . The PATCH method is described in RFC 5789: PATCH Method for HTTP <http://tools.ietf.org/html/rfc5789>
HTTP Client
An HTTP Client is the initiator of an HTTP Request.
HTTP Method
HTTP Methods are: OPTIONS, GET, HEAD, POST, PUT, DELETE, TRACE and PATCH. The HTTP Method CONNECT is not supported by this specification.
HTTP Request
An HTTP Request consists of a Method, version information, headers and optional body.
HTTP Resource
A resouce on an HTTP Server identified by a path. Each path begins with a separator character (/).
HTTP Response
An HTTP Response consists of a status code, optional status message, headers and optional body.
HTTP Server
An HTTP Server responds to HTTP Client requests.
Web Server
Used synonymously with HTTP Server.

All HTTP communication is done usig the Request/Response paradigm. Each HTTP Request is made sending an iq-stanza containing a req element to the server. Each iq-stanza sent is of type get (not to be confused by the HTTP Method GET).

When the server responds, it does so by sending an iq-stanza response (type result) back to the client containing a resp element. Since responses are asynchronous, and since multiple requests may be active at the same time, responses may be returned in a different order than the in which the original requests were made.

Requests or responses containing data must also consider how this data should be encoded within the XML telegram. Normally in HTTP, content and headers are separated by a blank line, and the transfer of the content is made in the same stream. Specific HTTP headers are used to define how the content is transfered and encoded within the stream (Content-Type, Content-Length, Content-Encoding, Content-Transfer-Encoding). This approach is not possible if the response is to be inbedded in an XML telegram, since it can interfere with the encoding of the encompassing XML.

To solve this, this document specifies additional data transfer mechanisms that are compatible with the XMPP protocol. The normal HTTP-based content transfer headers will still be transported, but do not affect the content encoding used in the XMPP transport. The following content encoding methods are available:

Note: Content endoded using chunkedBase64 or streamBase64 encoding methods can be terminated, either by the receptor going off-line, or by sending a close command to the sender.

The following use cases show how different HTTP methods may work when transported over XMPP. To facilitate the readability in these examples, simple text or xml results are shown.

This section shows an example of an OPTIONS method call. OPTIONS is described in §9.2 in RFC 2616.

]]>

This section shows an example of a GET method call. GET is described in §9.3 in RFC 2616.

@base <http://example.org/> . @prefix rdf: <http://www.w3.org/1999/02/22-rdf-syntax-ns#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix foaf: <http://xmlns.com/foaf/0.1/> . @prefix rel: <http://www.perceive.net/schemas/relationship/> . <#green-goblin> rel:enemyOf <#spiderman> ; a foaf:Person ; # in the context of the Marvel universe foaf:name "Green Goblin" . <#spiderman> rel:enemyOf <#green-goblin> ; a foaf:Person ; foaf:name "Spiderman", "Человек-паук"@ru . ]]>

Note: The XMPP/HTTP bridge at the server only transmits headers literally as they are reported, as if it was normal HTTP over TCP that was used. In the HTTP over XMPP case, connections are not handled in the same way, and so the "Connection: Close" header has no meaning in this case. For more information about connection handling in the HTTP over XMPP case, see the section on Connection Handling.

Note 2: The above Turtle example was taken from http://www.w3.org/TR/turtle/#sec-intro.

This section shows an example of a HEAD method call. HEAD is described in §9.4 in RFC 2616.

]]>

This section shows an example of a POST method call. POST is described in §9.5 in RFC 2616.

PREFIX foaf: <http://xmlns.com/foaf/0.1/> SELECT ?name ?mbox ?hpage WHERE { ?x foaf:name ?name . OPTIONAL { ?x foaf:mbox ?mbox } . OPTIONAL { ?x foaf:homepage ?hpage } }
Alice <http://work.example.org/alice/> Bob <mailto:bob@work.example> ]]>

Note: The above SPARQL example was taken from http://www.w3.org/TR/sparql11-query/#MultipleOptionals in combination with http://www.w3.org/TR/sparql11-protocol/#select-longpost.

Note 2: If using xml encoding of data, care has to be taken to avoid including the version and encoding information (<?xml version="1.0"?>) at the top of the document, otherwise the resulting XML will be invalid.

This section shows an example of a PUT method call. PUT is described in §9.6 in RFC 2616.

<html><header/><body><p>Beautiful home page.</p></body></html>
]]>

This section shows an example of a DELETE method call. DELETE is described in §9.7 in RFC 2616.

You're not allowed to change the home page! ]]>

This section shows an example of a TRACE method call. TRACE is described in §9.8 in RFC 2616.

GET /rdf/ex1.turtle HTTP/1.1 Host: clayster.com ]]>

Note: The Trace command returns the request it received from the client by the server. Here, however, it is assumed that the request is made over HTTP/TCP, not HTTP/XMPP. Therefore, in this example, the XMPP layer has transformed the HTTP/XMPP request into an HTTP/TCP-looking request, which is returned as the response to the TRACE Method call. RFC 2616 is silent to the actual format of the TRACE response (MIME TYPE message/http), and TRACE is only used (if not disabled for security reasons) for debugging connections and routing via proxies. Therefore, a response returning the original XMPP request should also be accepted by the caller.

This section shows an example of a PATCH method call. PATCH is described in RFC 5789.

[description of changes]
]]>

Note: The example is taken from §2.1 RFC 5789.

In the following sub-sections, the different data encoding formats are discussed with corresponding examples to illustrate how they work. The interesting part of these examples is the data element and its contents.

Text responses is a simple way to return text responses (i.e. any MIME Type starting with text/). Since the text is embedded into XML, the characters <, > and & need to be escaped to &lt;, &gt; and &amp; respectively.

The following example shows how a TURTLE response, which is text-based, is returned using the text encoding:

@base <http://example.org/> . @prefix rdf: <http://www.w3.org/1999/02/22-rdf-syntax-ns#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix foaf: <http://xmlns.com/foaf/0.1/> . @prefix rel: <http://www.perceive.net/schemas/relationship/> . <#green-goblin> rel:enemyOf <#spiderman> ; a foaf:Person ; # in the context of the Marvel universe foaf:name "Green Goblin" . <#spiderman> rel:enemyOf <#green-goblin> ; a foaf:Person ; foaf:name "Spiderman", "Человек-паук"@ru . ]]>

XML is a conveniant way to return XML embedded in the XMPP response. This can be suitable for MIME Types of the form .*/(.*[+])?xml (using regular expression to match them), like text/xml, application/soap+xml or application/sparql-results+xml. Care has to be taken however, since not all XML constructs can be embedded as content to an XML element without invalidating it, like the xml version and encoding declaration (<?xml version="1.0"?> as an example).

If unsure how to handle XML responses using the xml encoding type, you can equally well use the text type, but encode the XML escape characters <, > and &, or use another encoding, like base64.

The advantage of xml instead of text or base64 encodings is when used in conjuncion with EXI compression. EXI compression has the ability to compress XML efficiently. Text will not be compressed, unless response exists in internal string tables. Base-64 encoded data will be compressed so that the 33% size gain induced by the encoding is recaptured.

Alice <http://work.example.org/alice/> Bob <mailto:bob@work.example> ]]>

Base-64 encoding is a simple way to encode content that is easilly embedded into XML. Apart from the advantage of being easy to encode, it has the disadvantage to increase the size of the content by 33% (unless EXI compression is used at the same time), since it requires 4 bytes to encode 3 bytes of data. Care has to be taken not to send too large items using this encoding.

The following example shows an image is returned using the base64 encoding:

iVBORw0KGgoAAAANSUhEUgAAASwAAAGQCAYAAAAUdV17AAAAAXNSR0 ... tVWJd+e+y1AAAAABJRU5ErkJggg== ]]>

In HTTP, Chunked Transfer Encoding is used when the sender does not know the size of the content being sent, and to avoid having its buffers overflow, sends the content in chunks with a definite size.

A similar method exists in the HTTP over XMPP transport: The chunkedBase64 allows the sender to transmit the content in chunks. Every chunk is base-64 encoded. The stream of chunks are identified by a streamId parameter, since chunks from different responses may be transmitted at the same time.

Another difference between normal chunked transport, and the chunkedBase64 encoding, is that the size of chunks does not have to be predetermined. Chunks are naturally delimited and embedded in the XML stanza. The last chunk in a response must have the last attribute set to true.

iVBORw0KGgoAAAANSUhEUgAAASwAAAGQCAYAA ... ... ... 2uPzi9u+tVWJd+e+y1AAAAABJRU5ErkJggg== ]]>

Note: Chunked encoding assumes the content to be finite. If content is infinite (i.e. for instance live streaming), the streamBase64 transfer encoding must be used instead. If the sender is unsure if the content is finit or inifinite, the streamBase64 must be used.

Often content being sent can be represented by a file, virtual or real, especially if the content actually represents a file and is not dynamically generated. In these instances, instead of embedding the contents in the response, since content can be potentially huge, a File Stream Initiation is returned instead, as defined in XEP 0137: Publishing Stream Initiation Requests. This is done using the sipub element.

]]>

Some web servers provide streaming content, i.e. content where packets are sent according to a timely fashion. Examples are video and audio streams like HLS (HTTP Live Streams), SHOUTcast, ICEcast, Motion JPeg, etc. In all these examples, content is infinite, and cannot be sent "all as quickly as possible". Instead, content is sent according to some kind of bitrate or frame rate for example.

Such content must use the streamBase64 encoding scheme, if used. The streamBase64 is similar to the chunkedBase64 encoding, except it is imlicitly understood that the stream can be indefinite and needs an explicit way to close the stream. Closing the stream is done by sending a close command to the sender of the stream. The close command can also be used to close a chunked stream, and senders of chunked data should support terminating the output if a close command on the stream is received.

Note: All streams (or chunked responses) are automatically closed if one of the parties goes off-line.

Note 2: A streamed response does not need to be indefinite. It can be finite. If it is finite, the last chunk must have the last attribute set to true.

Note 3: The close command can be sent using a message or iq stanza. Use iq stanzas if a response is desired. The response will be the same close command sent.

... ... ]]>

For demanding multi-media streams alternative methods to transport streaming rather than embedded into the XMPP stream may be required. Even though the streamBase64 method may be sufficient to stream a low-resolution web cam in the home, or listen to a microphone or a radio station, it is probably badly suited for high-resolution video streams with multiple video angles and audio channels. If such content is accessed and streamed, the server can negotiate a different way to stream the content using XEP 0166: Jingle.

]]>

Note: Example taken from XEP 166: Jingle.

Note2: Using Jingle in this way makes it possible for an intelligent server to return multiple streams the client can choose from, something that is not done in normal HTTP over TCP. The first candidate should however correspond to the same stream that would have been returned if the request had been made using normal HTTP over TCP.

The following section lists use cases based on type of application. It is used to illustrate what types of applications would benefit from implementing this extension.

HTTP began as a protocol for presenting text in browsers. So, browsers is a natural place to start to list use cases for this extensions. In general, content is identified using URL's, and in the browser a user enters the URL into Address Field of the browser, and the corresponding content is displayed in the display area. The content itself will probably contain links to other content, each such item identified by an absolute or relative URL.

A simplified way to describe an URL is to describe it as having three parts:

  • Scheme
  • Domain
  • Path

In the HTTP over TCP case, the scheme is http:// or https://, and the domain is the name or IP address of the web server with an optional port number. Some even allow for user credentials to be passed directly in the URL, something which is blocked in many browsers, for security reasons.

By creating a new scheme for HTTP over XMPP transport, and implementing support for it in web browsers, XML HTTP request objects and web servers, Web Applications previously requiring web hosting on the Internet will be able to be hosted privatly behind firewalls instead, by simply switching from the http:// scheme to an xmpp:// scheme. All relative URL's within the application, including URL's sent to the XHR object (Ajax) will automatically be directed to use the HTTP over XMPP transport instead.

So, this specification proposes a new transport for HTTP over XMPP, as follows:

Here, the JID to use in the URL, must not include a resource. Only user name, the @ character and the domain. The / separator between the JID and the Path is actually part of the Part.

It's beyond the scope of this specification to define how browsers handles its own XMPP account(s) and roster. This section only makes a suggestion to show how this can be handled. It is assumed in this discussion that the browser has a working XMPP connection with a server, and has its own JID. For simplicity, we will assume the browser has only one connection. Extension to multiple connection is canonical.

When resolving an URL using the xmpp scheme, the browser needs to extract the JID of the server hosting the resource. If that JID is already in the roster, the request can proceed as usual.

If not in the roster, the browser needs to send a friendship request. A non-exhaustive list of states could be made:

  • No response: This could be presented as a connection to the content server being made.
  • Request rejected: This could be handled in the same way as HTTP Error Forbidden.
  • Request accepted: Connection made, proceed with fetching content.
  • Timeout: If no friendship request response have been returned, the browser can choose to time out.

Since XMPP works both ways, the browser can receive friendship requests from the outside world. Any such requests should be displayed to the end user, if any, or rejected.

For more information, see Roster Handling in web clients and Roster Handling in web servers.

Today, most people who want to host their own web applications (HTML/HTTP based applications) need to host them on a server publicly available on the Internet. However, many applications of a private nature like a family blog, home automation system, etc., is not suited for public hosting, since it puts all private data at risk of being compromised, or access to home security functions (like home web cams) to get in the hands of people you don't want to have access to them.

To solve this, one can host the application on a server at home, perhaps a small cheap plug computer consuming as little as 1 or 2 Watts of electricity, using a web server supporting this extension. If the following design rules are followed, the application should be visible in any browser also supporting this extensions, as long as friendship exists between the browser and the web server:

  • Only relative URL's are used within references (images, audio, video, links, objekts, etc.). If absolute URL's are used (including scheme), the browser might get the first page correctly, but will be unable to get the content with the absolute URL, unless the URL has the same scheme as the principal page.

  • URL's to web forms must also be relative, for the same reason.

  • Any URL's sent to the XML HTTP Request Object directed to API's or resources hosted by the same application must also be relative, for the same reasons as above. The XHR Object supports relative URL's.

If the above rules are met, which they should under normal conditions as well, typing in the xmpp:// URL in the browser (for instance when you're at the office) should display the application (hosted for example at home behind a firewall) in the same way as when you use http:// (or https://) when you have access to the server (for instance when you're home), as long as friendship exists between the browser JID and the server JID.

Many applications use a Service Oriented Architecture (SOA) and use web services to communicate between clients and servers. These web services are mostly HTTP over TCP based, even though there are bindings which are not based on this. The most common APIs today (REST) are however all based on HTTP over TCP. Being HTTP over TCP requires the web server hosting the web services either to be public or directly accessible by the client. But as the services move closer to end users (for instance a Thermostat publishing a REST API for control in your home), problems arise when you try to access the web service outside of private network in which the API is available. As explained previously, the HTTP over XMPP solves this.

The following example shows a simple SOAP method call, taken from http://www.w3schools.com/soap/soap_example.asp:

IBM
34.5 ]]>

Note: Other components of SOAP, such as WSDL and disco-documents are just examples of content handled by simple GET requests.

This section shows an example of a REST method call. REST method calls are just simple GET, POST, PUT or DELETE HTTP calls with dynamically generated content.

]]>

The Semantic Web was originally developed as a way to link data between servers on the Web, and understand it. However, with the advents of technologies such as SPARQL, the Semantic Web has become a way to unify API's into a universal form of distributed API to all types of data possible. It also alows for a standardized way to perform grid computing, in the sense that queries can be federated and executed in a distributed fashion ("in the grid").

For these reasons, and others, semantic web technologies have been moving closer to Internet of Things, and also into the private spheres of its end users. Since the semantic web technologies are based on HTTP, they also suffer from the shortcomings of HTTP over TCP, when it comes to firewalls and user authentication and authorization. Allowing HTTP transport over XMPP greatly improves the reach of semantic technologies beyond "The Internet" while at the same time improving security and controllability of the information.

As the semantic web comes closed to Internet of Things and the world of XMPP, it can benefit from work done with relation to the Internet of Things, such as &xep0324;, which would give automatic control of who (or what) can communicate with whom (or what).

Turtle Turtle: Terse RDF Triple Language <http://www.w3.org/TR/turtle/> , is a simple way to represent semantic data. The following example shows Turtle-encoded semantic data being returned to the client as a response to a request.

@base <http://example.org/> . @prefix rdf: <http://www.w3.org/1999/02/22-rdf-syntax-ns#> . @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> . @prefix foaf: <http://xmlns.com/foaf/0.1/> . @prefix rel: <http://www.perceive.net/schemas/relationship/> . <#green-goblin> rel:enemyOf <#spiderman> ; a foaf:Person ; # in the context of the Marvel universe foaf:name "Green Goblin" . <#spiderman> rel:enemyOf <#green-goblin> ; a foaf:Person ; foaf:name "Spiderman", "Человек-паук"@ru . ]]>

Note: The above example was taken from http://www.w3.org/TR/turtle/#sec-intro.

RDF RDF: Resource Description Framework <http://www.w3.org/RDF/> , is a another way to represent semantic data, better suited than Turtle for M2M communication. Related technologies, such as the micro format RDFa RDFa: RDF through attributes <http://www.w3.org/TR/rdfa-syntax/> allows for embedding RDF into HTML pages or XML documents. The following example shows RDF-encoded semantic data being returned to the client as a response to a request.

Eric Miller Dr. ]]>

Note: The above example was taken from http://www.w3.org/TR/2004/REC-rdf-primer-20040210/#intro.

This section shows an example of a SPARQL query executed as a POST call.

PREFIX foaf: <http://xmlns.com/foaf/0.1/> SELECT ?name ?mbox ?hpage WHERE { ?x foaf:name ?name . OPTIONAL { ?x foaf:mbox ?mbox } . OPTIONAL { ?x foaf:homepage ?hpage } }
Alice <http://work.example.org/alice/> Bob <mailto:bob@work.example> ]]>

Note: The above SPARQL example was taken from http://www.w3.org/TR/sparql11-query/#MultipleOptionals in combination with http://www.w3.org/TR/sparql11-protocol/#select-longpost.

There are many types of streams and streaming protocols. Several of these are based on HTTP or variants simulating HTTP. Examples of such HTTP-based or pseudo-HTTP based streaming protocols can include HLS: HTTP Live Streaming <http://en.wikipedia.org/wiki/HTTP_Live_Streaming> used for multi-media streaming, SHOUTcast <http://en.wikipedia.org/wiki/SHOUTcast> used for internet radio and Motion JPeg <http://en.wikipedia.org/wiki/Motion_JPEG> common format for web cameras.

Common for all streaming data, is that they are indefinite, but at the same time rate-limited depending on quality, etc. Because of this, the web server is requried to use the streamsBase64 encoding or the Jingle encoding to transport the content to the client.

If an entity supports the protocol specified herein, it MUST advertise that fact by returning a feature of "urn:xmpp:http" in response to &xep0030; information requests.

]]> ... ... ]]>

In order for an application to determine whether an entity supports this protocol, where possible it SHOULD use the dynamic, presence-based profile of service discovery defined in &xep0115;. However, if an application has not received entity capabilities information from an entity, it SHOULD use explicit service discovery instead.

HTTP over TCP includes headers for connection handling. The basic sequence for an HTTP request might be:

  • Client connects to server
  • Clients sends request
  • Client received response
  • Client closes connection

However, in the HTTP over XMPP case, there are no connections between the client and the server. Both clients and servers have active connections to the XMPP Server, but these remain unchanged during the sequence of requests. Therefore, both clients and servers should ignore any HTTP over TCP connection settings, since they have no meaning in the HTTP over XMPP case. However, the corresponding headers should always be transported as is, to maintain the information.

It's beyond the scope of this document to define how HTTP clients or HTTP servers handle rosters internally. The following sections list suggestions on how these can be handled by different parties.

Since browsers are operated by end users, any friendship request received from the outside should be either shown to the user (if the browser also maintains an IM client), or automatically rejected.

On the other hand, when the browser wants to access an URL using the xmpp scheme, an automatic friendship request to the corresponding JID should be done, if not already in the roster. It is assumed thay by entering the URL, or using the URL of an application already displayed, is the same as giving permission to add that JID as a friend to the roster of the browser.

A web server should have different security settings available. The following subsections list possible settings for different scenarios. Note that these settings only reflect roster handling and cannot be set per resource. However, the server can maintain a set of JIDs with different settings and restrict access to parts of the conted hosted by the server per JID.

A public server should accept requests from anybody (reachable from the current JID). All friendship requests should be automatically accepted.

To avoid bloating the roster, friendship requests could be automatically unsubscribed once the HTTP session has ended.

All new friendship are shown (or queued) to an administrator for manual acception or rejection. Once accepted, the client can access the corresponding content. During the wait (which can be substantial), the client should display a message that the friendship request is sent and response is pending.

Automatic unsubscription of friendships should only be done on a much longer inactivity timeframe than the normal session timeout interval.

All new friendship requests are automatically rejected. Only already accepted friendships are allowed to make HTTP requests to the server.

All new friendship requests are delegated to a trusted third party, according to XEP 0324: Internet of Things - Provisioning. Friendship acceptance or rejection is then performed according to the response from the provisioning server(s).

Automatic friendship unsubscription can be made to avoid bloating the roster. However, the time interval for unsubscribing inactive users should be longer than the normal session timeout period, to avoid spamming any provisioning servers each time a client requests friendship.

The XMPP URL scheme, as described above, must be registered.

REQUIRED.

]]>