Everyone,

Just a kind reminder to read and comment on Dirk's proposal, so that we can improve/approve/disapprove this document :-)

http://www.tzi.de/~dmeyer/tlsauth.html

Thanks,
/O

----- From the document: --------------------------------------

Introduction

For secure client-to-client (C2C) communication the clients can use Link-Local Messaging [1] or Jingle XML Streams [2] to open a connection between the two clients. To open an XMPP connection End-to- End XML Streams [3] defines a stream setup similar to the setup used by client-server communications. To secure the communication the extension defines the use of Transport Layer Security as defined in RFC 4346 [4] for encryption and authentication. XEP-0246 suggest to use the OpenPGP TLS extension but does not specify how to negotiate if both peers support the extension and if they are able to verify the OpenPGP key. It makes no sense to use OpenPGP instead of H.509 certificates if there is also no trust on OpenPGP level. This document describes how to negotiate how to use TLS to exchange possible extensions and key fingerprints before the actual TLS handshake.

After the TLS handshake both communication partners MUST be sure that they are communicating with the correct person without a man-in-the- middle.




Reply via email to