XMPP Council - 2013-03-20


  1. m&m

    might be a tad "late"

  2. m&m

    or unfocused right at the start

  3. Kev

    OK.

  4. Kev

    I'm *still* reviewing stuff.

  5. Dave Cridland

    Kev, Anyone would think you were busy these days, for some reason.

  6. Kev

    How little they would know.

  7. Kev

    Right. 'tis time.

  8. Kev

    1) Roll call.

  9. m&m

    present physically

  10. m&m

    er … logically

  11. ralphm

    hey

  12. ralphm

    from pycon

  13. Kev

    Ah.

  14. Kev

    Hail, pycon.

  15. Kev

    MattJ / Tobias?

  16. MattJ

    Present

  17. Kev

    Tobias is auto-away, I can tell because Swift has put a Zzz icon over his avatar :D

  18. Kev

    Right. So let's start.

  19. MattJ

    Does that mean he's asleep?

  20. Kev

    Probably.

  21. Kev

    2) Let's start with the completely uncontentious one. LC on 220?

  22. MattJ

    +1

  23. m&m

    +1

  24. Kev

    I'm +1

  25. ralphm

    yea

  26. Kev

    Magic.

  27. m&m

    as I work on making db irrelevant (-:

  28. Kev

    3) 308 to Draft?

  29. Kev

    I have, I believe, addressed all the LC feedback in one way or another.

  30. m&m

    I think so, too

  31. m&m

    I'm +1

  32. ralphm

    +1

  33. MattJ

    +1

  34. Kev

    Amazing.

  35. MattJ

    That wasn't the contentious item, was it? :)

  36. Kev

    4) http://xmpp.org/extensions/inbox/dtls-fingerprint.html Accept as Experimental?

  37. Kanchil

    Kev: http://xmpp.org/extensions/inbox/dtls-fingerprint.html: XEP-xxxx: Use of DTLS-SRTP in Jingle Sessions

  38. m&m

    no objections

  39. Kev

    I know nothing about the subject matter, but that presumably just means I have no meanginful objections.

  40. Kev

    Or spelling.

  41. Dave Cridland

    I thought we had something like this already.

  42. Dave Cridland

    Or was that ZRTP?

  43. m&m

    ZRTP, IIRC

  44. Kev

    ZRTP.

  45. fippo

    dave: 0262 -- dtls is significantly different

  46. MattJ

    I've no objections so far, but that's likely because I only saw the document this morning and haven't read it through yet

  47. ralphm

    No objection

  48. Kev

    5) http://xmpp.org/extensions/inbox/roster-management.html Accept as Experimental?

  49. Kanchil

    Kev: http://xmpp.org/extensions/inbox/roster-management.html: XEP-xxxx: Remote Roster Management

  50. Kev

    I have assorted issues with this, but I don't think they're fundamental to the design, they just need maturing on the vine.

  51. Kev

    I think fundamentally "use iq:roster" is right.

  52. m&m

    I haven't read it yet

  53. MattJ

    I'm +1

  54. MattJ

    It does have questions, but it's implemented in places and working

  55. ralphm

    No objection

  56. Kev

    I read something that I thought was broken, but I don't remember what it was. But I'm not objecting anyway.

  57. ralphm

    heh

  58. Kev

    It wasn't show-stopping.

  59. Kev

    m&m: So, a fortnight for you to object :)

  60. Kev

    6) http://xmpp.org/extensions/inbox/sensor-data.html Accept as Experimental?

  61. m&m

    I'm not objecting now

  62. Kanchil

    Kev: http://xmpp.org/extensions/inbox/sensor-data.html: XEP-xxxx: Sensor Data Interchange over XMPP

  63. m&m

    (-:

  64. Kev

    m&m: Noted, ta.

  65. Kev

    This was the last on my list, and I've not got to it yet. Objections, or lack thereof, within a fortnight.

  66. m&m

    I glanced over this earlier … no objections

  67. ralphm

    No objection

  68. MattJ

    I've no objection to accepting

  69. MattJ

    I think it needs some work though

  70. ralphm

    indeed

  71. Kev

    I'd encourage people to post comments to the list :)

  72. ralphm

    but I like people are working on this stuff

  73. Kev

    In fact, not only would I, but I do!

  74. Kev

    7) http://xmpp.org/extensions/inbox/exi.html Accept as experimental

  75. Kanchil

    Kev: http://xmpp.org/extensions/inbox/exi.html: XEP-xxxx: Using Efficient XML Interchange (EXI) Format in XMPP

  76. MattJ

    Yay!

  77. ralphm

    I haven"t looked at the exi stuff yet

  78. Kev

    I have some issues with this.

  79. Kev

    I'm trying to work out if they're sufficiently fundamental to object or not.

  80. Dave Cridland

    I'd note that while I think EXI may be mature enough (and useful enough) to consider now, I don't think this fits as a compression mechanism - ie, within the XEP-0138 model.

  81. ralphm

    right

  82. Kev

    I /think/ that at least none of this stuff can happen pre-auth.

  83. MattJ

    Dave Cridland, because of bootstrapping?

  84. MattJ

    Kev, why not?

  85. Kev

    (And pre-TLS)

  86. m&m

    dwd: I agree with you

  87. Dave Cridland

    MattJ, There's some negotiation going on, and all sorts.

  88. m&m

    also http://www.quickmeme.com/meme/3tfmdg/

  89. Kanchil

    m&m: http://www.quickmeme.com/meme/3tfmdg/: Southpark Instructor - if youre going to compress after encryption youre going to

  90. ralphm

    Dave Cridland:how would you use it, roughly?

  91. Zash

    m&m: haha

  92. Kev

    MattJ: Because you're sending assorted stuff to the server

  93. Kev

    m&m: Negotiation and layering don't need to be equivalent.

  94. Dave Cridland

    ralphm, What, use EXI? Or use EXI within the context of XMPP?

  95. Kev

    But you need to have verified the server's identity before you're going to be willing to download schemas.

  96. Kev

    And similarly it'll need to have authenticated you for the same.

  97. MattJ

    Good point

  98. m&m

    right

  99. ralphm

    Dave Cridland: latter

  100. Kev

    I do understand the basic principle that compressing data that's indistinguishable from random is a Really Good Idea.

  101. Dave Cridland

    Kev, I'm not sure that's true. You can exchange which schemas you're willing to support for compression without security risk, I *think*. Not sure though.

  102. Dave Cridland

    ralphm, I think it's possibly a new binding, as PSA discussed.

  103. Kev

    Dave Cridland: If I MITM to add somehow malicious schemas, and you download them after auth, that still seems bad.

  104. ralphm

    right

  105. Dave Cridland

    Kev, I don't know - the data is still authenticated, it's just it may be compressed in odd ways.

  106. m&m

    I could be wrong, but the compression could be to the point where a MITM could inject a schema that fundamentally changes the data

  107. MattJ

    You could start with a common mandatory schema for auth, and negotiate others after TLS+auth

  108. Kev

    I'm at least not sufficiently knowledgeable on this to be confident that it's not introducing some really nasty issues.

  109. MattJ

    Nevertheless, I don't object to accepting it

  110. MattJ

    I think it would be good for people to poke at it

  111. MattJ

    Enough are interested that I think it'll happen

  112. m&m

    exactly

  113. MattJ

    Though "enough" are a vocal minority I think :)

  114. Dave Cridland

    Right, I'm not sufficiently knowledgeable either. But I do think this is generally wrong; a "pure" EXI binding seems the appropriate construction.

  115. Kev

    I'll hold off for today, and get my thoughts in order within the fortnight.

  116. MattJ

    nod

  117. m&m

    dwd: that's my feeling, too

  118. Dave Cridland

    FWIW, I note yusuke.doi is present and might have some opinion.

  119. yusuke.doi

    Hi, am I allowed to speak?

  120. Kev

    yusuke.doi: Of course.

  121. ralphm

    yes

  122. ralphm

    Dave Cridland is not on the council, either

  123. yusuke.doi

    Thanks. I believe this proposal should be discussed more, either in experimental state or pre-XEP.

  124. ralphm

    having it on the list wouldnbe awspme

  125. yusuke.doi

    I have no clear opinion to accept or not, but I feel this proposal have slight variation from 'regular' EXI.

  126. ralphm

    yay lag and tablet

  127. m&m

    yusuke.doi: ??

  128. m&m

    that's a little concerning to me … XMPP already abuses XML stacks enough

  129. yusuke.doi

    m&m: I see :-) If it's okay for the committee, I don't object.

  130. MattJ

    m&m, for that suggestion I'll deal with you later :)

  131. Kev

    So, I think we need to take this to list. I'll try and post something soon, and see if I can form a sensible opinion within a fortnight.

  132. ralphm

    yeah

  133. MattJ

    Sounds good

  134. fippo

    m&m: shall i propose a asn.1 binding for xmpp? :-)

  135. ralphm

    sure

  136. m&m

    my problem is that I don't understand EXI enough to feel comfortable commenting

  137. Kev

    I'm not fundamentally opposed to the idea of EXI for XMPP, at least.

  138. yusuke.doi

    You need to invent namespace in asn.1 :-)

  139. ralphm

    and a protocol buffers oene

  140. Kev

    Right. I think we're done.

  141. Kev

    7) Date?

  142. m&m

    protobuff!

  143. Dave Cridland

    yusuke.doi, X.693

  144. Kev

    8) Date, rather

  145. Zash

    JSON!!

  146. m&m

    next week works for me

  147. ralphm

    sbtsbc

  148. yusuke.doi

    Dave Cridland: Thanks

  149. MattJ

    wfm

  150. Kev

    OK.

  151. Kev

    9) AOB?

  152. MattJ

    nack

  153. m&m

    the IETF meeting was rather uneventful

  154. ralphm

    glad about per's message

  155. m&m

    mostly because it was the very last session of the week

  156. m&m

    and we were all brain-dead

  157. MattJ

    I noticed :)

  158. Kev

    OK, that's it then.

  159. Kev

    Thanks all.

  160. m&m

    someone has to be the sacrificial goat; RAI likes to rotate which group that is

  161. MattJ

    Thanks Kev

  162. yusuke.doi

    Thanks

  163. ralphm

    people at pycon are really cynical about Google's plans with XMPP

  164. Kev bangs the gavel.

  165. m&m

    I just want to know I think EXI for XMPP is interesting, but I'm not sure this is the right a approach

  166. Kev

    ralphm: Oh? This because of the somewhat political "Google Bad, Mkay" thing prominent people have done this week?

  167. m&m

    ralphm: I can't blame them

  168. ralphm

    yeah, many misinformed opinions

  169. fippo

    ralphm: as long as google doesn't put jarkko (the irc guy) in charge there is no reason to worry :-)

  170. ralphm

    hah

  171. m&m

    no comment (-:

  172. ralphm

    google reader thing and caldav didn't go over well, and then this came up

  173. Dave Cridland

    CalDAV isn't being dropped, though.

  174. Zash

    Just require you to be whitelisted to access?

  175. Dave Cridland

    I'm told that it's being moved to an Oauth2 based service, but the transition just happens to be a bit rough.

  176. ralphm

    well that's entirely different from what they wrote themselves

  177. Dave Cridland

    Once it's OAuth2, it will have per-application keys, though I don't know the details.

  178. yusuke.doi

    m&m: I'd like to propose different port approach for EXI with XMPP soon.

  179. m&m

    yusuke.doi: that sounds like the alternative binding route … which is probably the right approach

  180. ralphm

    in the announcement they said move to the google calendar api

  181. yusuke.doi

    m&m: depends on use case (is the fair answer, I believe alternative binding should be better :-)

  182. Dave Cridland

    ralphm, Yes, they did. I think the road to OAuth2 CalDAV is long and rocky.

  183. ralphm

    ok, but communicating that would've been nice

  184. ralphm

    oh well

  185. ralphm

    gotta walk to sprints now

  186. Kev

    Enjoy.

  187. MattJ

    m&m, by the way - a question that came up after IETF: as an implementor, how would I actually use POSH? Am I supposed to fire off HTTPS requests every time I see an invalid cert?

  188. MattJ

    See you ralphm

  189. fippo

    mattj: i think so

  190. MattJ

    m&m, or will we have a way in XMPP to hint that POSH should be used to verify?

  191. m&m

    MattJ: or everytime you see a new domain

  192. Dave Cridland

    yusuke.doi, I don't see nearly as many benefits for in-stream negotiated EXI, since you need a traditional XML parser, fallback cases, and so on. Feels all wrong.

  193. Zash

    MattJ: Just as we would need to fire off a DNS lookup for DANE

  194. MattJ

    Do both at the same time, and see which returns faster? ;)

  195. m&m

    basically, yes

  196. yusuke.doi

    Dave Cridland: Personally I agree. But Peter should have different answer

  197. m&m

    Happy Eyeballs for Everyone!

  198. MattJ

    Doesn't it essentially make everyone with a cert their own CA? :)

  199. fippo

    mattj: you might even do traditional dial-back in parallel :-)

  200. m&m

    it's the Oprah paradigm for protocols

  201. Zash

    MattJ: DANE? Yes. :D

  202. m&m

    DANE definitely does, POSH could depending on what other HTTP-based things you support

  203. fippo

    even though i think that the samecert stuff might be faster than POSH (less secure though sincc it works with self-signed certs)

  204. m&m

    fippo: dialback is not a prooftype

  205. MattJ

    fippo, samecert?

  206. fippo

    m&m: not for the ietf at least ;-)

  207. m&m

    fippo: not for anyone that actually cares about assurances d-:

  208. MattJ

    Neither for Prosody, as of the next version

  209. MattJ

    It's also an open question as to whether we allow dialback by default in the config

  210. fippo

    mattj: open a reverse connection to the host, starttls, compare certificates. slighty better than 0185, less roundtrips

  211. MattJ

    But either way it's motioning towards being called "insecure"

  212. fippo

    m&m: well, 99%+ of server admins don't care

  213. m&m wanders back to his day job responsibilities

  214. MattJ

    fippo, ah, right

  215. Zash

    !xep 185

  216. fippo

    m&m: shall i point out that muc.xmpp.ogr was using an invalid cert until like two weeks? :-)

  217. Kanchil

    Zash: XEP-0185(N/A): http://xmpp.org/extensions/xep-0185.html Dialback Key Generation and Validation - Informational/Active - Updated: 2007-02-15

  218. MattJ

    fippo, it wouldn't have been if nobody could connect to it :)

  219. MattJ

    Someone needs to jump first

  220. m&m

    right

  221. Zash

    Is samecert documented somewhere?

  222. fippo

    yeah. that big hammer called "jabber.org" ;-)

  223. MattJ

    fippo, well yes, there is that

  224. fippo

    zash: dave had a blogpost describing it...

  225. MattJ

    I was thinking of shipping XMPP servers, but jabber.org would be a better hammer

  226. Tobias

    Kev, yeah..the zZz meant i was asleep..sry

  227. MattJ

    or Google, but... meh

  228. Zash

    fippo: orly?

  229. Zash

    Dave Cridland: orly?!

  230. Zash

    Wasn't that d-w-d, which iirc was about verifying certs as normal

  231. Zash

    But in a dialback

  232. m&m

    that's what I thought

  233. fippo

    i think it descried samecert, too

  234. Zash

    Dave Cridland: Your blog, when will it return to the land of the online?

  235. fippo

    m&m: btw, DNA still needs a turbohalibut prooftype, otherwise that cridland guy will block it :-)

  236. m&m goes off for more caffeine

  237. fippo

    http://jabber.soup.io/post/88601075/Dave-Cridland-Dialback-Now-without-dialback -- cached version

  238. fippo

    the third paragraph describes samecert

  239. Zash

    And as I said at the summit, I'd like to see "If the SRV record is Secure, then the target name is acceptable in the certificate" in a standalone document :)

  240. Dave Cridland

    Tubrohalibut. Mmmmm.

  241. Dave Cridland

    Zash, So, my blog is more or less shot. I might resurrect it at some point. Or I might do something odd with having it semi-present and backed onto G+.

  242. Kev

    nanoc!

  243. Kev

    (Nanoc really does seem to be quite competent)

  244. Dave Cridland

    It's really that I'm not sure I can be bothered having a traditional blog, rather than G+.

  245. Zash

    It wouldn't be the same :(

  246. Zash

    But then, I'm in the 'doesn't really want to depend on Google'-crowd.

  247. fippo

    we should have recorded peters statement on open federation at the summit

  248. Zash

    fippo: summary? not sure I recall

  249. fippo

    zash: i don't recall exactly either :-( maybe webex was active and is recorded

  250. MattJ

    One day I'll finish my blog

  251. MattJ

    http://blog.matthewwild.co.uk/

  252. Kanchil

    MattJ: http://blog.matthewwild.co.uk/: Matthew Wild's Blog

  253. Tobias

    haha

  254. Zash

    !

  255. Tobias

    that reminds me of http://216.119.142.188/~jbwp/wp-content/uploads/2011/05/2011-05-01-Homer-Web-Page.jpg

  256. Tobias

    but sure beats the design of my blog