%ents; ]>
Dialback Key Generation and Validation This document provides a recommended method for generating and validating the keys used in the XMPP server dialback protocol. &LEGALNOTICE; 0185 Proposed Informational Standards Council XMPP Core N/A Philipp Hancke fippo@goodadvice.pages.de fippo@goodadvice.pages.de &stpeter; 0.4 psa/ph 2007-02-09

Modified order of explanation to ease understanding; removed discussion of alternate algorithms, which is better left to a more in-depth security analysis.

0.3 ph 2006-11-01

Recommended hashing the secret to satisfy length requirement; hostnames and Stream ID should be separated by spaces to avoid ambiguity; updated example to match rfc3920bis.

0.2 ph 2006-05-10

Clarified and corrected roles of originating and receiving servers; updated recommendation and main example to use HMAC-SHA256 for key generation.

0.1 2006-04-11 psa

Initial version.

0.0.1 2006-03-30 ph

First draft.

&rfc3920; does not specify in detail a recommended algorithm for generating the keys used in the server dialback protocol. This document provides such a recommendation as an aid to implementors of XMPP servers. This document is not meant to supersede any text in RFC 3920; however, the recommendations in this document have been incorporated into &rfc3920bis;.

The process for generating and validating a dialback key SHOULD take into account the following four inputs:

In particular, the following algorithm is RECOMMENDED:

key = HMAC-SHA256 ( SHA256(Secret), { Receiving Server, ' ', Originating Server, ' ', Stream ID } )

Note the following:

  1. The resulting dialback key is a Keyed-Hash Message Authentication Code (see &nistfips198a;) generated using the SHA256 hashing algorithm (see &nistfips180-2;).
  2. The Secret is used as a "key" within the HMAC generation process; because HMAC recommends that the length of the HMAC key should be at least half the size of the hash function output, the Secret SHOULD be hashed via SHA256 prior to use in the in HMAC generation process.
  3. The Secret MUST either be set up in a configuration option for each host or process, or generated as a random string when starting the XMPP server. Creation of the Secret MUST NOT require communication between the Originating Server, the Authoritative Server, and optionally a third party (such as a database).
  4. The output of the SHA256 hashing algorithm MUST be provided in the hexadecimal representation; this helps to avoid encoding problems.
  5. The hostname of the Receiving Server, the hostname of the Originating Server, and the Stream ID SHOULD be concatenated with a Unicode space character (U+0020) as the delimiter; this helps to avoid ambiguity in concatenation. For example, the string "example.inform.example.org" could be construed as a concatenation of "example.info" and "rm.example.org" or of "example.in" and "form.example.org".

This document closely follows the description of the dialback protocol in RFC 3920 and rfc3920bis, but omits steps that are not important for the generation and validation of the dialback keys. For ease of comparison the numbering of the steps is the same as in section 8.3 of RFC 3920 and Appendix C.3 of rfc3920bis. Any line breaks in the examples are included for the purpose of readability only.

The following data values are used in the examples:

Originating Server example.org
Authoritative Server example.org
Receiving Server xmpp.example.com
Secret s3cr3tf0rd14lb4ck
Stream ID D60000229F

3. Receiving Server sends a stream header back to the Originating Server, including a unique ID for this interaction:

]]>

The Originating Server now generates a dialback key to be sent to the Receiving Server:

key = HMAC-SHA256( SHA256(secret), { Receiving server, ' ', Originating server, ' ', Stream ID} ) = HMAC-SHA256( SHA256('s3cr3tf0rd14lb4ck'), { 'xmpp.example.com', ' ', 'example.org', ' ', 'D60000229F' } ) = HMAC-SHA256( 'a7136eb1f46c9ef18c5e78c36ca257067c69b3d518285f0b18a96c33beae9acc', 'xmpp.example.com example.org D60000229F' ) = '37c69b1cf07a3f67c04a5ef5902fa5114f2c76fe4a2686482ba5b89323075643'

4. The Originating Server sends the generated dialback key to the Receiving Server:

37c69b1cf07a3f67c04a5ef5902fa5114f2c76fe4a2686482ba5b89323075643 ]]>

8. The Receiving Server sends the Authoritative Server a request for verification of the key:

37c69b1cf07a3f67c04a5ef5902fa5114f2c76fe4a2686482ba5b89323075643 ]]>

The Authoritative Server calculates the valid key for this verify request, using data supplied in the packet and the secret shared with the Originating Server.

key = HMAC-SHA256( SHA256(secret), { Receiving Server, ' ', Authoritative Server, ' ', Stream ID } ) = HMAC-SHA256( SHA256('s3cr3tf0rd14lb4ck'), { 'xmpp.example.com', ' ', 'example.org', ' ', 'D60000229F' } ) = HMAC-SHA256( 'a7136eb1f46c9ef18c5e78c36ca257067c69b3d518285f0b18a96c33beae9acc', 'xmpp.example.com example.org D60000229F' ) = '37c69b1cf07a3f67c04a5ef5902fa5114f2c76fe4a2686482ba5b89323075643'

9. The Authoritative Server compares this value to the key contained in the verification requests and informs the Originating Server of the result, in our example a success:

]]>

This document introduces no security considerations or concerns above and beyond those discussed in RFC 3920 and rfc3920bis.

This document requires no interaction with &IANA;.

This document requires no interaction with the ®ISTRAR;.

Thanks to Ian Paterson and Matthias Wimmer for their feedback.