View on GitHub

GSOC2017

Landing page for my GSoC 2017 project - OMEMO encrypted Jingle File Transfer in Smack

Google Summer of Code 2017

Paul Moritz Schaub - OMEMO Encrypted Jingle File Transfer in Smack

Welcome to the project page of my GSoC 2017 project!

The goal of my project was to implement Jingle File Transfer for Smack. Smack is a client library for the XMPP protocol for Java and Android.

XMPP stands for eXtensible Message and Presence Protocol. The focus lays on extensible. Many features are not part of the core specification, but instead are defined in so called XEPs (XMPP Extension Protocols). XEPs are numbered, so every XEP has a unique number and a name to identify it. The goal of my project was to implement XEP-0234 - Jingle File Transfer. In order to achieve this goal, I had to implement a whole number of other XEPs, since there are some transitive dependencies (see below).

I documented my progress in weekly blog posts. Those can be found in my blog.

XEP-0234 - Jingle File Transfer

This XEP describes how two entities can exchange files using the Jingle Protocol. Jingle itself is another XEP which I also had to implement (see below), since Jingle File Transfer is defined on top of it. The specification for XEP-0234 can be found here. The code I wrote for that XEP is available in this package.

XEP-0166 - Jingle

The Jingle XEP defines how two entities can negotiate bytestreams between each other. This involves, which transport methods are used (examples for that down below), which parameters are used for the application of the bytestream (eg. which audio codec in a voice chat) and so on. Also security plays a role in the negotiation. The Jingle protocol consists of three main components:

A session consists of one or more contents, which in turn consist of a description, a transport method and a security component. Those components can be composed and replaced in arbitrary ways.

Implementing the Jingle XEP was the biggest part of my project. I worked using the waterfall model to learn from previous errors I made and it took me 3 iterations, until I was happy with my code. Now I have a very modular codeset which can be easily extended and composed in any way. This blog post gives an overview of the structure. The specification is available here, while my implementation can be found here.

XEP-0261 - Jingle InBandBytestream Transport

The easiest, most basic transport method is described in XEP-261. When data is sent using InBandBytestreams, the raw data is split into blocks of typically 4096 base64 encoded byte, which are sent one after another via the XMPP protocol itself. This method is occasionally very slow, but since it depends only on the XMPP protocol itself, it does not require additional server infrastructure. The XEP can be found here, my implementation resides in this package.

XEP-0260 - Jingle SOCKS5Bytestream Transport

A more advanced transport method is described in Jingle SOCKS5Bytestream Transports (short Jingle S5B). Here SOCKS5 proxy servers are utilized to enabled clients behind firewalls or NATs to establish connections with each other. It is possible to use either external servers (eg. proxy components of the XMPP servers), or local servers for this purpose.

Working on the implementation for that XEP was a pain. For half a week I was stuck at finding one little bug. My frustrated blog post has more information about that. The XEP can be found here, my implementation here.

XEP-0261 and XEP-0260 are based on two older XEPs (XEP-0047 and XEP-0065), so I could reuse some already existing code for those two transport methods.

XEP-0300 - Use of Cryptographic Hash Functions

A Jingle File Transfer involves checksums to ensure the integrity of the sent file. Since computer science is a rapidly changing field, hash functions might quickly get obsolete (see SHA1 - well done you, Google :D), so it is desirable to be able to quickly replace hash functions. For that purpose XEP-0300 defines namespaces for hash functions, so that negotiators can use different algorithms as they wish. The specification can be found here, while my implementation lives here.

XEP-xxxx - Jingle Encrypted Transports (JET)

JET Logo The most exciting part of my project was to create my own specification! With JET I specified a way to utilize OMEMO and OX (OpenPGP) end-to-end encryption to secure Jingle transports. This way entities can transfer bytestreams end-to-end encrypted. The specification allows for easy extensibility with other encryption mechanisms additionally to OMEMO or OX. My plan is to propose the specification to the XSF for approval, so that it might one day become an official XEP.

This blog post goes into more details on how the protocol works.

My draft specification can be found here, while my prototype implementation can be found here (only OMEMO encryption so far).

Status

The following of my code has been merged into Smacks master branch. Some parts are still missing, which is partially due to experimental features, which need approval by the XSF. Unmerged code can be found in my repository.

Merged

Immediate Merge Pending

Prototypical Code

Interoperability

The whole point of XMPP is to avoid walled gardens, so there are many clients implementing many of the specified features. Ideally all clients are interoperable to one another (in reality it doesn’t always go so well unfortunately). This is why I’m very happy to announce that my file transfer code has been successfully tested against Gajim, a well established desktop XMPP client, as well as against Conversations, a popular XMPP client for Android.

Demo Application

Since my works is mostly invisible library code, I wrote a small application to demonstrate some features. XMPP_SYNC is a command line application, which can be used to synchronize files between computers via (encrypted) Jingle File Transfer.

A blog post about XMPP_SYNC can be found here and the source code for it is available in this repository.

Feedback on XEPs

Mailing List

During my time implementing the XEPs, I often gave feedback to the XSFs standards mailing list.

XEP PRs

Whenever I could, I created Pull Request to address errors I found in the XEPs.

Thanks!

Big thanks to all, who welcomed me :)