1
0
mirror of https://github.com/moparisthebest/xeps synced 2024-12-22 23:58:51 -05:00
xeps/xep-0275.xml
Peter Saint-Andre 0627a761fd initial published version
git-svn-id: file:///home/ksmith/gitmigration/svn/xmpp/trunk@3864 4b5297f7-1745-476d-ba37-a9c6900126ab
2010-01-22 03:16:57 +00:00

261 lines
13 KiB
XML

<?xml version='1.0' encoding='UTF-8'?>
<!DOCTYPE xep SYSTEM 'xep.dtd' [
<!ENTITY % ents SYSTEM 'xep.ent'>
%ents;
]>
<?xml-stylesheet type='text/xsl' href='xep.xsl'?>
<xep>
<header>
<title>Entity Reputation</title>
<abstract>This specification defines an XMPP protocol extension for communicating the reputation of any entity on the network.</abstract>
&LEGALNOTICE;
<number>0275</number>
<status>Experimental</status>
<type>Standards Track</type>
<sig>Standards</sig>
<approver>Council</approver>
<dependencies>
<spec>XMPP Core</spec>
</dependencies>
<supersedes/>
<supersededby/>
<shortname>reputation</shortname>
&stpeter;
<revision>
<version>0.1</version>
<date>2010-01-21</date>
<initials>psa</initials>
<remark><p>Initial published version as accepted for publication by the XMPP Council; defined XML schema.</p></remark>
</revision>
<revision>
<version>0.0.1</version>
<date>2010-01-11</date>
<initials>psa</initials>
<remark><p>First draft.</p></remark>
</revision>
</header>
<section1 topic='Introduction' anchor='intro'>
<p>Reputation systems are used in many online communities to increase trust and to encourage communication, commerce, and other forms of interaction. The public XMPP network might benefit from instituting a reputation system for servers, for end users, or both. The benefits might include fast blacklisting of rogue servers and other bad actors, differential quality of service based on reputation, delayed entry to &xep0045; rooms for low-reputation users, integration with &xep0016;, and the like.</p>
</section1>
<section1 topic='Terminology' anchor='terminology'>
<p>The following terms identify the entities mentioned in this document:</p>
<ul>
<li>Relying Party -- the entity that queries a Vouching Party about the reputation score of a Subject</li>
<li>Subject -- the entity whose reputation is vouched for by a Vouching Party</li>
<li>Vouching Party -- an entity that maintains a reputation score about a Subject, such as a server vouching for an account, a server vouching for a chatroom at a chat service associated with the server, a third party vouching service, etc.</li>
</ul>
</section1>
<section1 topic='Approach' anchor='approach'>
<p>The approach taken here is that an XMPP entity (a "Subject") is innocent until proven guilty, so it starts out with a score of zero. Good behaviors will increase a Subject's score (up to a maximum of +127), whereas bad behaviors will decrease a Subject's score (potentially down to a minimum of -128). Any entity (a "Relying Party") can query another entity (a "Vouching Party") about the reputation score of a Subject. A Vouching Party might be a fellow IM user (e.g., a buddy in one's roster as defined in &xmppim;), the server to which a client connects, a fellow server to which a server connects (see &xep0267;), or a specialized reputation service (similar to a DNSBL on the email network). Changes in reputation scores can also be sent in real time to Relying Parties, either as part of &xep0268; or as separate notifications.</p>
<p>To determine reputation in an objective way, it is important to define the specific behaviors that are used as measurable dimensions of good or bad reputation. The following sections attempt to do so for XMPP servers and XMPP users, with some rough point values.</p>
<section2 topic='Server Reputation' anchor='approach-server'>
<p>On the theory that it is more important to reward positive behavior than to punish negative behavior, we first define a number of criteria for increasing the reputation score of an XMPP server (naturally this list of criteria is not meant to be exclusive).</p>
<table caption='Positive Server Behaviors'>
<tr>
<th>Criterion</th>
<th>Suggested Point Value</th>
</tr>
<tr>
<td>Presents a certificate issued by a recognized certification authority.</td>
<td>+15</td>
</tr>
<tr>
<td>Requires CAPTCHAs or other hurdles for account registration (see &xep0158;).</td>
<td>+5</td>
</tr>
<tr>
<td>Supports <cite>XEP-0268: Incident Reporting</cite>.</td>
<td>+5</td>
</tr>
<tr>
<td>Supports reputation scores for its users (i.e., this protocol).</td>
<td>+5</td>
</tr>
<tr>
<td>Requires use of Transport Layer Security (TLS) for client-to-server connections.</td>
<td>+5</td>
</tr>
<tr>
<td>Provides the _xmpp-client DNS SRV record.</td>
<td>+5</td>
</tr>
<tr>
<td>Provides the _xmpp-server DNS SRV record.</td>
<td>+5</td>
</tr>
<tr>
<td>Provides a website with accurate information and contact addresses.</td>
<td>+5</td>
</tr>
<tr>
<td>Service answers &xep0030; information requests sent to bare JIDs, including identification of admin accounts and anonymous users.</td>
<td>+5</td>
</tr>
<tr>
<td>Administrator answers email sent to mailto:xmpp@domain.tld (see &xmppcore;) and takes appropriate actions to solve reported issues.</td>
<td>+5</td>
</tr>
<tr>
<td>Time online (e.g., based on whois lookup or known deployment of an XMPP service).</td>
<td>+3 for each year</td>
</tr>
<tr>
<td>Admin factor (average of admins' reputation scores, divided by ten and rounded up).</td>
<td>Varies</td>
</tr>
</table>
<p>For example, a server that (1) meets all of the foregoing criteria, (2) has been online for 7 years, and (3) whose admins have an average score of 37 would have a reputation number of 15+5+5+5+5+5+5+5+5+5+4+21 = 85.</p>
<p>By constrast, a server that does not have a CA-issued cert, does not require CAPTCHAs for account registration, does not support incident reporting, does not support reputation scores, does not require TLS, does have SRV records (+10), has no website, does not answer service discovery requests about its users, has not verified the xmpp@domain.tld email address, has been online for 1 week, and whose administrators are unknown would have a reputation score of 10.</p>
</section2>
<section2 topic='Account Reputation' anchor='approach-account'>
<p>The reputation associated with an XMPP account (typically but not always a user) is harder to quantify and easier to fake than server reputation. The following are some possible criteria.</p>
<table caption='Positive Account Behaviors'>
<tr>
<th>Criterion</th>
<th>Suggested Point Value</th>
</tr>
<tr>
<td>Account has service discovery identity of account/admin</td>
<td>+15</td>
</tr>
<tr>
<td>Account has service discovery identity of account/registered</td>
<td>+5</td>
</tr>
<tr>
<td>Age of account</td>
<td>+5 for each year</td>
</tr>
<tr>
<td>Verified email address</td>
<td>+5</td>
</tr>
<tr>
<td>Verified website</td>
<td>+5</td>
</tr>
<tr>
<td>Password strength</td>
<td>Measured on a scale from 0 (e.g., "password") to 5</td>
</tr>
<tr>
<td>Reputation of buddies known to server</td>
<td>Divide average reputation by 10</td>
</tr>
<tr>
<td>User has PGP key, X.509 certificate, or other public key</td>
<td>+10</td>
</tr>
<tr>
<td>User has passed a CAPTCHA test (e.g., during account provisioning)</td>
<td>+5</td>
</tr>
<tr>
<td>Chatroom ownership / administration</td>
<td>For each room owned, divide room's reputation by 10; for each room administered, divide room's reputation by 20 (e.g., +6 and +3 for a room with a reputation of 60).</td>
</tr>
<tr>
<td>Chatroom banning</td>
<td>For each room in which the user is banned (XEP-0045 "outcast"), divide the room's reputation by 10 and decrement the user's score by the result (e.g., -6 for a room with a reputation of 60).</td>
</tr>
<tr>
<td>Rate limiting</td>
<td>For each rate limiting incident, -5.</td>
</tr>
<tr>
<td>Incident reports</td>
<td>For each validated incident report, -10.</td>
</tr>
</table>
<p>For example, an account that is an admin of a server (+15), has been online for 5 years (+25), has a verified email address (+5) and website (+5), has a strong password (+5), has a "buddy reputation average" of 40 (+4), uses a public key (+10), has passed a CAPTCHA test (+5), owns 3 chatrooms with an average reputation of 30 (+9), and has not been banned from any chatrooms, rate limited, or been the subject of any incident reports would have a reputation number of 83.</p>
<p>By contrast, an account that is registered (+5), was just created, has no verified email address or website, has a strong password (+5), has a "buddy reputation average" of 10 (+1), does not use a public key, has not passed a CAPTCHA test, owns or administers no chatrooms, has been banned from 3 chatrooms with an average reputation of 30 (-9), has been rate limited twice (-10), and has been the subject of 2 incident reports (-20) would have a reputation number of -28.</p>
</section2>
<section2 topic='Other Entities' anchor='approach-other'>
<p>Any entity can have a reputation score: servers, end-user accounts, chatrooms, chatroom servers, publish-subscribe servers, vouching services, etc. Criteria for entities other than servers and accounts are yet to be described.</p>
</section2>
</section1>
<section1 topic='Protocol' anchor='protocol'>
<p>In order to query a Vouching Party about the reputation of a Subject, a Relying Party sends an IQ stanza of type "get" containing a &lt;score/&gt; element qualified by the 'urn:xmpp:reputation:0' namespace &VNOTE;.</p>
<example caption='Score request'><![CDATA[
<iq from='juliet@capulet.lit/chamber'
to='shakespeare.lit'
id='bn4c297j'
type='get'>
<score xmlns='urn:xmpp:reputation:0' jid='romeo@montague.lit'/>
</iq>
]]></example>
<p>The Vouching Party would then return an error or a score.</p>
<example caption='Score response'><![CDATA[
<iq from='shakespeare.lit'
to='juliet@capulet.lit/chamber'
id='bn4c297j'
type='result'>
<score xmlns='urn:xmpp:reputation:0'
jid='romeo@montague.lit'
num='65'/>
</iq>
]]></example>
<p>Any XMPP error might be appropriate (e.g., &forbidden; if the Relying Party is not trusted at all by the Vouching Party).</p>
</section1>
<section1 topic='Determining Support' anchor='support'>
<p>To advertise its support for reputation scores, when replying to &xep0030; information requests an entity MUST return a feature for 'urn:xmpp:reputation:0'.</p>
<p>In order for an application to determine whether an entity supports this protocol, where possible it SHOULD use the dynamic, presence-based profile of service discovery defined in &xep0115;. However, if an application has not received entity capabilities information from an entity, it SHOULD use explicit service discovery instead.</p>
</section1>
<section1 topic='Security Considerations' anchor='security'>
<p>Any entity can keep a reputation score for any other entity. Although some entities might be considered more knowledgeable than others, that judgment is up to the entity that makes a request for a reputation score and is not a feature of the network itself.</p>
</section1>
<section1 topic='IANA Considerations' anchor='iana'>
<p>This document requires no interaction with &IANA;.</p>
</section1>
<section1 topic='XMPP Registrar Considerations' anchor='registrar'>
<section2 topic='Protocol Namespaces' anchor='registrar-ns'>
<p>This specification defines the following XML namespace:</p>
<ul>
<li>urn:xmpp:reputation:0</li>
</ul>
<p>Upon advancement of this specification from a status of Experimental to a status of Draft, the &REGISTRAR; shall add the foregoing namespace to the registry located at &NAMESPACES;, as described in Section 4 of &xep0053;.</p>
</section2>
<section2 topic='Protocol Versioning' anchor='registrar-versioning'>
&NSVER;
</section2>
</section1>
<section1 topic='XML Schema' anchor='schema'>
<code><![CDATA[
<?xml version='1.0' encoding='UTF-8'?>
<xs:schema
xmlns:xs='http://www.w3.org/2001/XMLSchema'
targetNamespace='urn:xmpp:reputation:0'
xmlns='urn:xmpp:reputation:0'
elementFormDefault='qualified'>
<xs:element name='score'>
<xs:complexType>
<xs:simpleContent>
<xs:extension base='xs:string'>
<xs:attribute name='jid' type='xs:string' use='required'/>
<xs:attribute name='num' type='xs:byte' use='optional'/>
</xs:extension>
</xs:simpleContent>
</xs:complexType>
</xs:element>
</xs:schema>
]]></code>
</section1>
<section1 topic='Acknowledgements' anchor='ack'>
<p>Thanks to Dan Brickley, Kevin Smith, Mike Taylor, and Matthew Wild for their feedback.</p>
</section1>
</xep>