mirror of
https://github.com/moparisthebest/xeps
synced 2024-11-25 10:42:19 -05:00
1b0b87c8fe
git-svn-id: file:///home/ksmith/gitmigration/svn/xmpp/trunk@3725 4b5297f7-1745-476d-ba37-a9c6900126ab
403 lines
21 KiB
XML
403 lines
21 KiB
XML
<?xml version='1.0' encoding='UTF-8'?>
|
|
<!DOCTYPE xep SYSTEM 'xep.dtd' [
|
|
<!ENTITY % ents SYSTEM 'xep.ent'>
|
|
%ents;
|
|
]>
|
|
<?xml-stylesheet type='text/xsl' href='xep.xsl'?>
|
|
<xep>
|
|
<header>
|
|
<title>Public Key Publishing</title>
|
|
<abstract>This specification defines a method by which an entity can publish its public keys over XMPP.</abstract>
|
|
&LEGALNOTICE;
|
|
<number>0189</number>
|
|
<status>Experimental</status>
|
|
<type>Standards Track</type>
|
|
<sig>Standards</sig>
|
|
<dependencies>
|
|
<spec>XMPP Core</spec>
|
|
<spec>XEP-0060</spec>
|
|
<spec>XEP-0163</spec>
|
|
</dependencies>
|
|
<supersedes>None</supersedes>
|
|
<supersededby>None</supersededby>
|
|
<shortname>NOT_YET_ASSIGNED</shortname>
|
|
&stpeter;
|
|
&dmeyer;
|
|
&ianpaterson;
|
|
<revision>
|
|
<version>0.11</version>
|
|
<date>2009-12-17</date>
|
|
<initials>psa</initials>
|
|
<remark><p>Added back example of sending public key in a message; defined presence extension to signal key generation in progress.</p></remark>
|
|
</revision>
|
|
<revision>
|
|
<version>0.10</version>
|
|
<date>2009-12-15</date>
|
|
<initials>psa</initials>
|
|
<remark><p>Major revision; split into three namespaces and three corresponding PEP nodes, one each for public keys, attestations, and revocations; iterated the version number for public keys to urn:xmpp:pubkey:1; added detailed data to each node payload; removed some use cases to simply the protocol.</p></remark>
|
|
</revision>
|
|
<revision>
|
|
<version>0.9</version>
|
|
<date>2009-03-08</date>
|
|
<initials>dm/psa</initials>
|
|
<remark><p>Required specification of an algorithm for elements with hashes; removed fingerprint in <keyinfo/>; added sign request; added guidelines for key management; improved examples; changed namespace from urn:xmpp:tmp:pubkey to urn:xmpp:pubkey:0.</p></remark>
|
|
</revision>
|
|
<revision>
|
|
<version>0.8</version>
|
|
<date>2008-09-08</date>
|
|
<initials>dm</initials>
|
|
<remark><p>Change KeyInfo element from W3C XML Signature to ASCII and add signature support</p></remark>
|
|
</revision>
|
|
<revision>
|
|
<version>0.7</version>
|
|
<date>2008-03-03</date>
|
|
<initials>psa</initials>
|
|
<remark><p>Changed temporary namespace per XEP-0053 procedures; corrected several small errors in the text and examples.</p></remark>
|
|
</revision>
|
|
<revision>
|
|
<version>0.6</version>
|
|
<date>2007-08-15</date>
|
|
<initials>psa</initials>
|
|
<remark><p>More clearly explained node creation and key publication workflows.</p></remark>
|
|
</revision>
|
|
<revision>
|
|
<version>0.5</version>
|
|
<date>2007-03-05</date>
|
|
<initials>ip</initials>
|
|
<remark><p>Merged node creation and first publish examples; recommended the value of each <KeyName/> element and id attribute is set to the key fingerprint; added fprint element and more examples</p></remark>
|
|
</revision>
|
|
<revision>
|
|
<version>0.4</version>
|
|
<date>2006-11-27</date>
|
|
<initials>ip</initials>
|
|
<remark><p>Added jid attribute and send use case; changed namespace</p></remark>
|
|
</revision>
|
|
<revision>
|
|
<version>0.3</version>
|
|
<date>2006-11-20</date>
|
|
<initials>ip</initials>
|
|
<remark><p>Specified that PEP nodes SHOULD be persistent</p></remark>
|
|
</revision>
|
|
<revision>
|
|
<version>0.2</version>
|
|
<date>2006-09-29</date>
|
|
<initials>ip</initials>
|
|
<remark><p>Replaced pubkey and key elements with the KeyInfo element defined in W3C XML Signature</p></remark>
|
|
</revision>
|
|
<revision>
|
|
<version>0.1</version>
|
|
<date>2006-07-18</date>
|
|
<initials>ip</initials>
|
|
<remark><p>Initial version.</p></remark>
|
|
</revision>
|
|
</header>
|
|
|
|
<section1 topic='Introduction' anchor='intro'>
|
|
<p>End-to-end encryption between XMPP clients and mutual authentication between a client and a server are desirable goals for the XMPP network. To enable these features, typically an XMPP user will need to possess a public key (or multiple keys), along with an associated private key that is not made public. The goal of this document is to provide simple methods for the exchange of public keys among XMPP users -- specifically, data formats that enable an XMPP entity to complete the following use cases:</p>
|
|
<ul>
|
|
<li>Publish its current public keys.</li>
|
|
<li>Revoke keys that are no longer in use.</li>
|
|
<li>Publish signed copies of its public keys (called attestations).</li>
|
|
<li>Discover and retrieve public keys published by other entities.</li>
|
|
</ul>
|
|
</section1>
|
|
|
|
<section1 topic='Approach' anchor='approach'>
|
|
<p>This document assumes that each user will have a privately-generated key. A user <strong>might</strong> have more than one key (e.g., different keys for different clients) and the user's key <strong>might</strong> be signed by other entities, such as a certification authority (CA) or another user. However, the simplest case is a single key per user.</p>
|
|
<p>The data formats defined here are deliberately kept very simple, with the key itself represented as ASCII output (of the kind supported by most cryptographic libraries) and any metadata represented using a few straightforward XML elements and attributes. This document does not use the 'http://www.w3.org/2000/09/xmldsig#' namespace as specified in &w3xmlsig;; although that format is quite powerful, it introduces unnecessary levels of complexity for this use case.</p>
|
|
<p>We define three payload elements:</p>
|
|
<ol>
|
|
<li>The <pubkey/> element (qualified by the 'urn:xmpp:pubkey:1' namespace) specifies a single public key for a user.</li>
|
|
<li>The <revoke/> element (qualified by the 'urn:xmpp:revoke:1' namespace) specifies old keys that a user once used but has now revoked.</li>
|
|
<li>The <attest/> element (qualified by the 'urn:xmpp:attest:1' namespace) specifies one or more signed copies of a user's public key.</li>
|
|
</ol>
|
|
<p>An entity MAY support only public key publishing (the 'urn:xmpp:pubkey:1' namespace) and not support revocations and attestations.</p>
|
|
</section1>
|
|
|
|
<section1 topic='Public Keys' anchor='keys'>
|
|
<p>A single public key is contained in a <pubkey/> element qualified by the 'urn:xmpp:pubkey:1' namespace &VNOTE;, for which the defined child elements are as follows:</p>
|
|
<table caption='Children of the <pubkey/> Element'>
|
|
<tr>
|
|
<th>Element</th>
|
|
<th>Description</th>
|
|
</tr>
|
|
<tr>
|
|
<td><begin/></td>
|
|
<td>The UTC DateTime before which the key shall not be considered valid, formatted according to &xep0082;.</td>
|
|
</tr>
|
|
<tr>
|
|
<td><end/></td>
|
|
<td>The UTC DateTime after which the key shall not be considered valid, formatted according to <cite>XEP-0082</cite>.</td>
|
|
</tr>
|
|
<tr>
|
|
<td><jid/></td>
|
|
<td>The XMPP address associated with this key.</td>
|
|
</tr>
|
|
<tr>
|
|
<td><key/></td>
|
|
<td>The ASCII output representation of an RSA public key generated in accordance with &rfc3447;.</td>
|
|
</tr>
|
|
<tr>
|
|
<td><print/></td>
|
|
<td>The SHA-256 fingerprint for this key.</td>
|
|
</tr>
|
|
<tr>
|
|
<td><uri/></td>
|
|
<td>A URI at which the key can be retrieved outside the XMPP network; this element is OPTIONAL.</td>
|
|
</tr>
|
|
</table>
|
|
<p>An example follows.</p>
|
|
<example caption='A public key'><![CDATA[
|
|
<pubkey xmlns='urn:xmpp:pubkey:1'>
|
|
<begin>2009-12-11T20:12:37</begin>
|
|
<end>2010-12-11T23:59:59</end>
|
|
<jid>peter@jabber.org</jid>
|
|
<key>
|
|
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA25/Y7oonF3+pRjZCk0cQ
|
|
lQFiUFvyMeUOnn01NLfqfBeT4xjahsxaYFPd+V8jIHtpO3nbkpfrBh5aLPCkqDzS
|
|
UFvmLaVSIMUt085kcT/Yv72BUWUGaISt7swSNfictRbVZ0k8TbXUDLIAYWN8lsie
|
|
NVxL13PS9pu3WNoORuKAV5RuzDS3djnjb6fti7fTwEUpQVwRrJXY6jNhv4c4zE3x
|
|
Pjm48gIlHbZrxuWNrXnKT6uwXnr6PJ6O3YspferJG1oA3kmOwm41yWDkalbKgkNZ
|
|
WeS+ahB/i9LIG+41CdekPpI0Kr0Ll9X7+zaPV6xzjlG8dYy7ZGm4eTL9STuWlPdL
|
|
+wIDAQAB
|
|
</key>
|
|
<print>13475c8e27399908b4447d7c52ab30822872832eba3a654f0d80e07fb4157673</print>
|
|
</pubkey>
|
|
]]></example>
|
|
</section1>
|
|
|
|
<section1 topic='Revocations' anchor='revocations'>
|
|
<p>A user can revoke his own key. The revocation is contained in a <revoke/> element qualified by the 'urn:xmpp:revoke:1' namespace &VNOTE;, for which the defined child elements are as follows:</p>
|
|
<table caption='Children of the <revoke/> Element'>
|
|
<tr>
|
|
<th>Element</th>
|
|
<th>Description</th>
|
|
</tr>
|
|
<tr>
|
|
<td><key/></td>
|
|
<td>The public key that was revoked.</td>
|
|
</tr>
|
|
<tr>
|
|
<td><keyprint/></td>
|
|
<td>The SHA-256 fingerprint of the public key that was revoked.</td>
|
|
</tr>
|
|
<tr>
|
|
<td><signature/></td>
|
|
<td>A signature for the revocation, as described below.</td>
|
|
</tr>
|
|
<tr>
|
|
<td><revocationprint/></td>
|
|
<td>The SHA-256 fingerprint of the key used to sign the revocation.</td>
|
|
</tr>
|
|
<tr>
|
|
<td><revocationtime/></td>
|
|
<td>The UTC DateTime at which the key was revoked, formatted according to <cite>XEP-0082</cite>.</td>
|
|
</tr>
|
|
</table>
|
|
<p>The data that is signed MUST be the revoked public key (i.e., the XML character data of the <key/> element), the SHA-256 fingerprint of the revoked public key (i.e., the XML character data of the <keyprint/> element), the SHA-256 fingerprint of the key used to sign the revocation (i.e., the XML character data of the <revocationprint/> element), and the time of the revocation (i.e., the XML character data of the <revocationtime/> element), concatenated together with no spaces or other additional characters.</p>
|
|
<p>As an example, consider a revocation of the key from Example 1, where the SHA-256 fingerprint of the revoked key is 13475c8e27399908b4447d7c52ab30822872832eba3a654f0d80e07fb4157673, the SHA-256 fingerprint of the key used to sign the revocation is becb78566783166f4a1a7c64e28dae288fe1a0f2825f6b593b336ce186c6b056, and the time of the revocation is 2009-12-14T20:49:16Z. The string to be signed would be as follows (where line breaks are not significant).</p>
|
|
<code>
|
|
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA25/Y7oonF3+pRjZCk0cQ
|
|
lQFiUFvyMeUOnn01NLfqfBeT4xjahsxaYFPd+V8jIHtpO3nbkpfrBh5aLPCkqDzS
|
|
UFvmLaVSIMUt085kcT/Yv72BUWUGaISt7swSNfictRbVZ0k8TbXUDLIAYWN8lsie
|
|
NVxL13PS9pu3WNoORuKAV5RuzDS3djnjb6fti7fTwEUpQVwRrJXY6jNhv4c4zE3x
|
|
Pjm48gIlHbZrxuWNrXnKT6uwXnr6PJ6O3YspferJG1oA3kmOwm41yWDkalbKgkNZ
|
|
WeS+ahB/i9LIG+41CdekPpI0Kr0Ll9X7+zaPV6xzjlG8dYy7ZGm4eTL9STuWlPdL
|
|
+wIDAQAB13475c8e27399908b4447d7c52ab30822872832eba3a654f0d80e07f
|
|
b4157673becb78566783166f4a1a7c64e28dae288fe1a0f2825f6b593b336ce1
|
|
86c6b0562009-12-14T20:49:16Z
|
|
</code>
|
|
<p>An example follows.</p>
|
|
<example caption='A revocation'><![CDATA[
|
|
<revocation xmlns='urn:xmpp:revoke:1'>
|
|
<key>
|
|
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA25/Y7oonF3+pRjZCk0cQ
|
|
lQFiUFvyMeUOnn01NLfqfBeT4xjahsxaYFPd+V8jIHtpO3nbkpfrBh5aLPCkqDzS
|
|
UFvmLaVSIMUt085kcT/Yv72BUWUGaISt7swSNfictRbVZ0k8TbXUDLIAYWN8lsie
|
|
NVxL13PS9pu3WNoORuKAV5RuzDS3djnjb6fti7fTwEUpQVwRrJXY6jNhv4c4zE3x
|
|
Pjm48gIlHbZrxuWNrXnKT6uwXnr6PJ6O3YspferJG1oA3kmOwm41yWDkalbKgkNZ
|
|
WeS+ahB/i9LIG+41CdekPpI0Kr0Ll9X7+zaPV6xzjlG8dYy7ZGm4eTL9STuWlPdL
|
|
+wIDAQAB
|
|
</key>
|
|
<keyprint>60561AEE-4187-4122-8A71-ACF9195DE572</keyprint>
|
|
<revocationprint>becb78566783166f4a1a7c64e28dae288fe1a0f2825f6b593b336ce186c6b056</revocationprint>
|
|
<revocationtime>2009-12-14T20:49:16Z</revocationtime>
|
|
<signature>
|
|
iEYEARECAAYFAksnvfsACgkQNL8k5A2w/vyVHgCglI5fPQfcu1e5PTA3bMPKiL0F
|
|
J5cAnirpKzJ45OD+03b66UHoIosKQ31O
|
|
=PGFT
|
|
</signature>
|
|
</revocation>
|
|
]]></example>
|
|
</section1>
|
|
|
|
<section1 topic='Attestations' anchor='attestations'>
|
|
<p>Whether in the context of the public key infrastructure (PKI) or a web of trust, a user might want to publish signed copies of his public key, where the signer might be another user or a trusted third party such as a certification authority (CA). The signing key could even be another key owned by the user (e.g., a primary key used to sign a secondary key associated with a particular device controlled by the user). Furthermore, the signing material might be an RSA key, a DSA key, an X.509 certificate, an OpenPGP key, or any other format.</p>
|
|
<p>Each signed copy is contained in an <attest/> element qualified by the 'urn:xmpp:attest:1' namespace &VNOTE;, for which the defined child elements are as follows:</p>
|
|
<table caption='Children of the <attest/> Element'>
|
|
<tr>
|
|
<th>Element</th>
|
|
<th>Description</th>
|
|
</tr>
|
|
<tr>
|
|
<td><keyprint/></td>
|
|
<td>The SHA-256 fingerprint of the public key that was signed.</td>
|
|
</tr>
|
|
<tr>
|
|
<td><signature/></td>
|
|
<td>The signature itself, as described below.</td>
|
|
</tr>
|
|
<tr>
|
|
<td><signerjid/></td>
|
|
<td>The XMPP address of the signer.</td>
|
|
</tr>
|
|
<tr>
|
|
<td><signerprint/></td>
|
|
<td>The SHA-256 fingerprint of the signer's key.</td>
|
|
</tr>
|
|
<tr>
|
|
<td><signtime/></td>
|
|
<td>The UTC DateTime at which the key was signed, formatted according to <cite>XEP-0082</cite>.</td>
|
|
</tr>
|
|
</table>
|
|
<p>The data that is signed MUST be the user's public key (i.e., the XML character data of the <key/> element), the SHA-256 fingerprint of the user's public key (i.e., the XML character data of the <keyprint/> element), the signer's JID (i.e., the XML character data of the <signerjid/> element), the SHA-256 fingerprint of the signer's key (i.e., the XML character data of the <signerprint/> element), and the time of the attestation (i.e., the XML character data of the <signtime/> element), concatenated together with no spaces or other additional characters.</p>
|
|
<p>As an example, consider an attestation of the key from Example 1, where the signer's JID is stpeter@jabber.org, the fingerprint of the signer's key is "becb78566783166f4a1a7c64e28dae288fe1a0f2825f6b593b336ce186c6b056", and the time of the attestation is 2009-12-14T18:43:00Z. The string to be signed would be as follows (where line breaks are not significant).</p>
|
|
<code>
|
|
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA25/Y7oonF3+pRjZCk0cQ
|
|
lQFiUFvyMeUOnn01NLfqfBeT4xjahsxaYFPd+V8jIHtpO3nbkpfrBh5aLPCkqDzS
|
|
UFvmLaVSIMUt085kcT/Yv72BUWUGaISt7swSNfictRbVZ0k8TbXUDLIAYWN8lsie
|
|
NVxL13PS9pu3WNoORuKAV5RuzDS3djnjb6fti7fTwEUpQVwRrJXY6jNhv4c4zE3x
|
|
Pjm48gIlHbZrxuWNrXnKT6uwXnr6PJ6O3YspferJG1oA3kmOwm41yWDkalbKgkNZ
|
|
WeS+ahB/i9LIG+41CdekPpI0Kr0Ll9X7+zaPV6xzjlG8dYy7ZGm4eTL9STuWlPdL
|
|
+wIDAQAB13475c8e27399908b4447d7c52ab30822872832eba3a654f0d80e07f
|
|
b4157673stpeter@jabber.orgbecb78566783166f4a1a7c64e28dae288fe1a0
|
|
f2825f6b593b336ce186c6b0562009-12-14T18:43:00Z
|
|
</code>
|
|
<example caption='RSA public key signed by OpenPGP key'><![CDATA[
|
|
<attest xmlns='urn:xmpp:attest:1'>
|
|
<keyprint>60561AEE-4187-4122-8A71-ACF9195DE572</keyprint>
|
|
<signature>
|
|
iEYEARECAAYFAksnyJ0ACgkQNL8k5A2w/vy9DgCfc1eOYZlp1P456NkjgvCtJaRX
|
|
Wi4AoIGhfzr7XMzeOzOBi9A/bxopH8O4
|
|
=MMuz
|
|
</signature>
|
|
<signerjid>stpeter@jabber.org</signerjid>
|
|
<signerprint>becb78566783166f4a1a7c64e28dae288fe1a0f2825f6b593b336ce186c6b056</signerprint>
|
|
<signtime>2009-12-14T18:43:00Z</signtime>
|
|
</attest>
|
|
]]></example>
|
|
</section1>
|
|
|
|
<section1 topic='Publication via PEP' anchor='pep'>
|
|
<p>A user SHOULD publish public keys, attestations, and revocations via &xep0163;, in particular adhering to the best practices defined in &xep0222;.</p>
|
|
<p>Any other authorized entity can then receive notifications related to the user's public keys, and retrieve keys, attestations, and revocations.</p>
|
|
<p>If the user has only one public key (the simplest and most common case), then the pubkey PEP node SHOULD have only one item, with an ItemID of "current".</p>
|
|
</section1>
|
|
|
|
<section1 topic='Requesting a Public Key Directly' anchor='request'>
|
|
<p>If it is not possible for the user to publish his key via PEP, or for a contact to retrieve the user's key via PEP, the contact MAY request the user's key directly by sending an &IQ; of type 'get' to the user's particular full JID, containing an empty <pubkey/> element qualified by the 'urn:xmpp:pubkey:1' namespace &VNOTE;.</p>
|
|
<example caption='Public key request'><![CDATA[
|
|
<iq from='maineboy@jabber.org/bar'
|
|
to='peter@jabber.org/foo'
|
|
id='hfgt654s'
|
|
type='get'>
|
|
<pubkey xmlns='urn:xmpp:pubkey:1'/>
|
|
</iq>
|
|
]]></example>
|
|
<p>The receiving client then return its public key (which might be different from the overall key for the user, e.g. a key for only a particular device).</p>
|
|
<example caption='Public key response'><![CDATA[
|
|
<iq from='peter@jabber.org/foo'
|
|
to='maineboy@jabber.org/bar'
|
|
id='hfgt654s'
|
|
type='result'>
|
|
<pubkey xmlns='urn:xmpp:pubkey:1'>
|
|
<begin>2009-12-11T20:12:37</begin>
|
|
<end>2010-12-11T23:59:59</end>
|
|
<jid>peter@jabber.org</jid>
|
|
<key>
|
|
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA25/Y7oonF3+pRjZCk0cQ
|
|
lQFiUFvyMeUOnn01NLfqfBeT4xjahsxaYFPd+V8jIHtpO3nbkpfrBh5aLPCkqDzS
|
|
UFvmLaVSIMUt085kcT/Yv72BUWUGaISt7swSNfictRbVZ0k8TbXUDLIAYWN8lsie
|
|
NVxL13PS9pu3WNoORuKAV5RuzDS3djnjb6fti7fTwEUpQVwRrJXY6jNhv4c4zE3x
|
|
Pjm48gIlHbZrxuWNrXnKT6uwXnr6PJ6O3YspferJG1oA3kmOwm41yWDkalbKgkNZ
|
|
WeS+ahB/i9LIG+41CdekPpI0Kr0Ll9X7+zaPV6xzjlG8dYy7ZGm4eTL9STuWlPdL
|
|
+wIDAQAB
|
|
</key>
|
|
<print>13475c8e27399908b4447d7c52ab30822872832eba3a654f0d80e07fb4157673</print>
|
|
</pubkey>
|
|
</iq>
|
|
]]></example>
|
|
</section1>
|
|
|
|
<section1 topic='Sending a Public Key Directly' anchor='send'>
|
|
<p>An entity might need to send its public key to another entity, for example if it has generated a new key but does not have a way to publish the new key (or does not wish to publish the key in a world-readable fashion). In this case the entity MAY include the key directly in a &MESSAGE; stanza.</p>
|
|
<example caption='Sending a key in a message'><![CDATA[
|
|
<message from='peter@jabber.org/foo'
|
|
to='maineboy@jabber.org/bar'>
|
|
<pubkey xmlns='urn:xmpp:pubkey:1'>
|
|
<begin>2009-12-11T20:12:37</begin>
|
|
<end>2010-12-11T23:59:59</end>
|
|
<jid>peter@jabber.org</jid>
|
|
<key>
|
|
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA25/Y7oonF3+pRjZCk0cQ
|
|
lQFiUFvyMeUOnn01NLfqfBeT4xjahsxaYFPd+V8jIHtpO3nbkpfrBh5aLPCkqDzS
|
|
UFvmLaVSIMUt085kcT/Yv72BUWUGaISt7swSNfictRbVZ0k8TbXUDLIAYWN8lsie
|
|
NVxL13PS9pu3WNoORuKAV5RuzDS3djnjb6fti7fTwEUpQVwRrJXY6jNhv4c4zE3x
|
|
Pjm48gIlHbZrxuWNrXnKT6uwXnr6PJ6O3YspferJG1oA3kmOwm41yWDkalbKgkNZ
|
|
WeS+ahB/i9LIG+41CdekPpI0Kr0Ll9X7+zaPV6xzjlG8dYy7ZGm4eTL9STuWlPdL
|
|
+wIDAQAB
|
|
</key>
|
|
<print>13475c8e27399908b4447d7c52ab30822872832eba3a654f0d80e07fb4157673</print>
|
|
</pubkey>
|
|
</message>
|
|
]]></example>
|
|
</section1>
|
|
|
|
<section1 topic='Signalling Key Generation' anchor='generate'>
|
|
<p>There are several situations in which it is helpful for an entity to signal that it is currently generating a key. For example, a client that does not have access to permanent storage might generate a key on startup, but key generation might not be complete when the client sends initial presence upon establishing an XMPP session. In this case the client might signal support for the public key format in the entity capabilities data that it includes in its initial presence broadcast, but also include an indication that it is currently generating a key.</p>
|
|
<example caption='Key generation in progress'><![CDATA[
|
|
<presence from='peter@jabber.org/foo'>
|
|
<generating xmlns='urn:xmpp:pubkey:1'/>
|
|
</presence>
|
|
]]></example>
|
|
<p>After key generation is complete, the entity could publish the new key to the appropriate PEP node (if available) and signal that key generation is complete so that any interested parties can request the new key.</p>
|
|
<example caption='Key generation completed'><![CDATA[
|
|
<presence from='peter@jabber.org/foo'>
|
|
<generated xmlns='urn:xmpp:pubkey:1'/>
|
|
</presence>
|
|
]]></example>
|
|
</section1>
|
|
|
|
<section1 topic='Determining Support' anchor='support'>
|
|
<p>To advertise its support for public keys, revocations, and attestations, when replying to &xep0030; information requests an entity MUST return features for 'urn:xmpp:pubkey:1', 'urn:xmpp:revoke:1', and 'urn:xmpp:attest:1' respectively.</p>
|
|
<p>In order for an application to determine whether an entity supports this protocol, where possible it SHOULD use the dynamic, presence-based profile of service discovery defined in &xep0115;. However, if an application has not received entity capabilities information from an entity, it SHOULD use explicit service discovery instead.</p>
|
|
</section1>
|
|
|
|
<section1 topic='Security Considerations' anchor='security'>
|
|
<p>The reliable association between a user or entity and its public keys is beyond the scope of this document. However, each client SHOULD maintain its own secure library of the public keys it associates with other users.</p>
|
|
</section1>
|
|
|
|
<section1 topic='IANA Considerations' anchor='iana'>
|
|
<p>This document requires no interaction with &IANA;.</p>
|
|
</section1>
|
|
|
|
<section1 topic='XMPP Registrar Considerations' anchor='registrar'>
|
|
<section2 topic='Protocol Namespaces' anchor='registrar-ns'>
|
|
<p>This specification defines the following XML namespaces:</p>
|
|
<ul>
|
|
<li>urn:xmpp:attest:1</li>
|
|
<li>urn:xmpp:pubkey:1</li>
|
|
<li>urn:xmpp:revoke:1</li>
|
|
</ul>
|
|
<p>Upon advancement of this specification to a status of Draft, the ®ISTRAR; shall add these namespaces to the registry located at &NAMESPACES;, as described in Section 4 of &xep0053;.</p>
|
|
</section2>
|
|
<section2 topic='Protocol Versioning' anchor='registrar-versioning'>
|
|
&NSVER;
|
|
</section2>
|
|
</section1>
|
|
|
|
<section1 topic='XML Schemas' anchor='schema'>
|
|
<p>To follow.</p>
|
|
</section1>
|
|
</xep>
|