Abstract: | This document defines a protocol for authenticating HTTP requests using Jabber Tickets. |
Author: | Richard Dobson |
Copyright: | © 1999 – 2018 XMPP Standards Foundation. SEE LEGAL NOTICES. |
Status: | Deferred |
Type: | Standards Track |
Version: | 0.2.1 |
Last Updated: | 2018-11-03 |
WARNING: This document has been automatically Deferred after 12 months of inactivity in its previous Experimental state. Implementation of the protocol described herein is not recommended for production systems. However, exploratory implementations are encouraged to resume the standards process.
1. Introduction
2. Requirements
3. Use Cases
3.1. Client web browser window requests a Jabber Ticket Authentication protected web page
3.2. Client requests JabberTicket
3.3. Client replies to 401 HTTP error
3.4. Server responds and allows or denies access to the file
4. Implementation Notes
5. Security Considerations
5.1. Man in the middle
5.2. Key length
5.3. Ticket expiration
6. IANA Considerations
7. XMPP Registrar Considerations
Appendices
A: Document Information
B: Author Information
C: Legal Notices
D: Relation to XMPP
E: Discussion Venue
F: Requirements Conformance
G: Notes
H: Revision History
Jabber Ticket Authentication is a method of authenticating with HTTP servers using your jabber identification.
This allows you to login to websites using your jabber address in a single sign-on fashion similar to .NET Passport, but unlike .NET Passport is not locked into a single authentication provider.
Tickets also mean the jabber ticket provider and the web server do not need to be tightly integrated for authentication to work, also because it's not tightly integrated it means webmasters do not need to setup their own jabber server to provide tickets, they can use a third party provider even a central "tickets.jabber.org". Also because tickets are not tightly integrated it makes it far easier for webmasters to integrate with Jabber, it also makes web farms far more scalable and reliable.
The motivations for this document are:
GET http://www.webserver.com/webpage.html HTTP/1.1
401 Unauthorised HTTP/1.1 WWW-Authenticate: JabberTicket realm="ticket.server.com"
The realm is the JID you need to request your JabberTicket from.
<iq to='ticket.server.com' type='get' id='ticket1'> <query xmlns="http://jabber.org/protocol/ticket"/> </iq>
<iq to='user@domain.com/resource' from='ticket.server.com' type='result' id='ticket1'> <query xmlns="http://jabber.org/protocol/ticket"> 54yudvjhssa76dta6sgdst78r4sadsfjdhs... </query> </iq>
The ticket is encrypted data represented as a string, the client does not need to decode it since it is passed to the webserver unaltered.
GET http://www.webserver.com/webpage.html HTTP/1.1 Authorization: JabberTicket 54yudvjhssa76dta6sgdst78r4sadsfjdhs...
200 OK HTTP/1.1 Content-Type: text/html
403 Forbidden HTTP/1.1
The following guidelines may assist developers.
This form of HTTP authentication is susceptable to man in the middle attack where the ticket could be captured and retransmitted by someone else, but this can be solved by using an encrypted jabber connection (e.g. HTTPS) and an HTTPS connection to the webserver.
It is recommended the encryption key length for the ticket be long enough to make it hard to crack the ticket.
It is recommended the ticket has an expiration and that it be between a few minutes and a few hours, e.g. 60 minutes.
The HTTP authentication scheme "JabberTicket" may need to be registered with IANA.
The XMPP Registrar [1] will need to register the new namespace of "http://jabber.org/protocol/ticket".
Series: XEP
Number: 0101
Publisher: XMPP Standards Foundation
Status:
Deferred
Type:
Standards Track
Version: 0.2.1
Last Updated: 2018-11-03
Approving Body: XMPP Council
Dependencies: XMPP Core, RFC 2616, RFC 2617, XEP-0030
Supersedes: None
Superseded By: None
Short Name: Not yet assigned
Source Control:
HTML
This document in other formats:
XML
PDF
Email:
richard@dobson-i.net
JabberID:
richard@dobson-i.net
The Extensible Messaging and Presence Protocol (XMPP) is defined in the XMPP Core (RFC 6120) and XMPP IM (RFC 6121) specifications contributed by the XMPP Standards Foundation to the Internet Standards Process, which is managed by the Internet Engineering Task Force in accordance with RFC 2026. Any protocol defined in this document has been developed outside the Internet Standards Process and is to be understood as an extension to XMPP rather than as an evolution, development, or modification of XMPP itself.
The primary venue for discussion of XMPP Extension Protocols is the <standards@xmpp.org> discussion list.
Discussion on other xmpp.org discussion lists might also be appropriate; see <http://xmpp.org/about/discuss.shtml> for a complete list.
Given that this XMPP Extension Protocol normatively references IETF technologies, discussion on the <xsf-ietf@xmpp.org> list might also be appropriate.
Errata can be sent to <editor@xmpp.org>.
The following requirements keywords as used in this document are to be interpreted as described in RFC 2119: "MUST", "SHALL", "REQUIRED"; "MUST NOT", "SHALL NOT"; "SHOULD", "RECOMMENDED"; "SHOULD NOT", "NOT RECOMMENDED"; "MAY", "OPTIONAL".
1. The XMPP Registrar maintains a list of reserved protocol namespaces as well as registries of parameters used in the context of XMPP extension protocols approved by the XMPP Standards Foundation. For further information, see <https://xmpp.org/registrar/>.
Note: Older versions of this specification might be available at http://xmpp.org/extensions/attic/
END