XMPP Council - 2013-12-11


  1. Peter Waher

    Anybody knows when the council meeting will start?

  2. Peter Waher

    confused about time zones and summer/winter time in different hemispheres

  3. stpeter

    Peter Waher: should be in ~30 minutes

  4. Peter Waher

    thanks

  5. stpeter is on a conference call but should be done by then

  6. Kev

    Trying to review protoXEPs while exhausted is almost more fun than I can describe :)

  7. Tobias

    why did we get rid of pipelining for BOSH?

  8. fippo

    kev: get over to paris and listen to people talking about RCS and IMS!

  9. Kev

    AIUI, because no-one did it and it's not legal.

  10. Kev

    fippo: Revision Control System? :)

  11. fippo

    rich communication suite

  12. Kev

    I like mine better.

  13. Tobias

    Kev, pidgin did it at one point, if darkrain didn't remove it....will ask him about that :)

  14. Kev

    I think I need to review colibri some time that's not now.

  15. Tobias

    quite a big agenda this tiem

  16. Tobias

    quite a big agenda this time

  17. Tobias

    Kev, will there be a LMC update?

  18. Dave Cridland

    Kev, Pipelining POST, you mean? That's a SHOULD NOT in the spec, and we had reasons aplenty - I don't think we were breaking the spec with that.

  19. winfried

    @Tobias: BOSH makes POST requests and you may not pipeline POST

  20. Tobias

    winfried, ah..okay

  21. Kev

    Dave Cridland: Ignoring a SHOULD NOT /is/ breaking the spec, IMHO.

  22. Tobias

    wasn't always a should not, at least not in the BOSH spec...but don't know for sure...i implemented it eons ago

  23. Kev

    No, we used to say in bosh that you should.

  24. stpeter

    'tis time?

  25. Tobias

    hammer time

  26. Kev

    'tis time.

  27. Kev

    1) Roll call.

  28. Dave Cridland

    Kev, Well, *ignoring* is not the same as acknowledging but doing it anyway. The rule is there for good reason - start pipelining POSTs at something that's not expecting it and all manner of things can go boom. But between consenting adults it's fine.

  29. Lance

    here

  30. Tobias

    hereo

  31. Kev

    fippo was in doubt.

  32. Kev

    Matt sends apologies.

  33. Kev

    fippo: You here?

  34. stpeter

    fippo is in Paris for WebRTC stuff right now, no?

  35. Kev

    stpeter: Yes, he didn't know if he'd be Councilling.

  36. Kev

    When I spoke to him earlier.

  37. Kev

    But he doesn't seem to be here.

  38. Kev

    2) EventLogging http://xmpp.org/extensions/inbox/eventlogging.html

  39. Kev

    There's been some amount of confusion over there. I'm not opposing objecting.

  40. Kev

    Uhm.

  41. Kev

    Not opposing *publishing*.

  42. Lance

    +1 for going experimental

  43. Tobias

    what's the expected locale if the XEP says one shouldn't localize?

  44. Tobias

    regardless of that i'm +1 for experimental

  45. Kev

    Tobias: Then I suggest asking on list :)

  46. Kev

    3) http://xmpp.org/extensions/diff/api/xep/0124/diff/1.11rc1/vs/1.11rc2 http://xmpp.org/extensions/diff/api/xep/0124/diff/1.10/vs/1.11rc2 With changes since last meeting.

  47. fippo

    kev: here, but not physically. will vote on list :-/

  48. Kev

    I'm +1 on this.

  49. Kev

    fippo: Thanks.

  50. Lance

    +1 on the changes

  51. Tobias

    +1 on XEP-0124

  52. Kev

    4) http://xmpp.org/extensions/diff/api/xep/0156/diff/1.1rc1/vs/1.1rc2 Changes since last meeting.

  53. Kev

    I'm +1 here too.

  54. Lance

    We do still need a legend/explanation from m&m for the chart though in 124

  55. Lance

    +1 on 156

  56. stpeter

    are some patches still missing / issues not addressed for BOSH specs? Winfried's message suggested so

  57. Peter Waher

    Tobias: Sorry, all very quick... What do you mean with "what's the expected locale if the XEP says one shouldn't localize"?

  58. stpeter is still on his conference call

  59. Tobias

    wonder why XEP-0156 defaults to unsecure HTTP and unsecure DNS for retrieval of connection methods

  60. Tobias

    Peter Waher, it says you shouldn't localized messages, does that mean that all are supposed to be in english? or in the language of the original software but never translated? or what exactly?

  61. Kev

    Tobias / Peter Waher: If this isn't blocking publication, I suggest we take it to the list to move things along.

  62. Tobias

    wouldn't it be sensible to expect lookup of those via HTTPS/DNSSEC if possible?

  63. Peter Waher

    you can localize messages. What you shouldn't do is localize event IDs, for instance

  64. Peter Waher

    "event IDs should never be localized"

  65. Peter Waher

    "tag names should never be localized"

  66. Tobias

    +1 on 156, will disuss it with lance later, if he wants

  67. Peter Waher

    everything else can be localized

  68. Kev

    Thanks.

  69. stpeter

    Tobias: yes, it would, but the security considerations say: Entities that use these connection methods need to ensure that they conform to the security considerations of each method (e.g., by preferring to use 'https' or 'wss' URLs that are protected using Transport Layer Security).

  70. Lance

    Tobias: k

  71. Kev

    5) http://xmpp.org/extensions/inbox/jingle-grouping.html

  72. Tobias

    +1

  73. Lance

    +1

  74. Kev

    I'm -1 on this.

  75. Tobias

    Kev, why?

  76. Kev

    But only because we cannot take RFC content and include it in XEPs.

  77. Kev

    See the recent discussion on w3c examples in XEPs.

  78. fippo

    kev: thanks, I was in doubt about that

  79. stpeter

    you mean "a=group:LS voice webcam"?

  80. Kev

    fippo: XEP submission is copyright assignment. You can't copyright assign an RFC to the XSF, so ...

  81. Kev

    stpeter: Yes, so it's trivial to fix.

  82. Kev

    But it says at the bottom that it's doing it, so we should fix it.

  83. fippo

    kev: will do.

  84. Kev

    fippo: Ta. You can tell what I'm going to say about a later submission too :)

  85. Kev

    6) http://xmpp.org/extensions/inbox/peptzo.html

  86. Kev

    This looked fine to me.

  87. Lance

    There was discussion on list that this should be a change to XEP-0080 GeoLoc instead

  88. Tobias

    +1 on peptzo

  89. stpeter

    I don't see ""a=group:LS voice webcam" in RFC 5888

  90. Lance

    Does council think updating 80 is a better approach?

  91. Kev

    Yeah. I didn't really think that was conclusive, but I'm happy for you to retract this instead if you like :)

  92. Kev

    Lance: I've not formed an opinion yet.

  93. Kev

    Shall we put this onto the next meeting agenda?

  94. Lance

    Yeah, so a -1 from me today

  95. fippo

    stpeter: I think i adapted to 0167 already... but need to check again

  96. Kev

    OK.

  97. Kev

    7) http://xmpp.org/extensions/inbox/colibri.html

  98. Kev

    I have to vote on this one on-list, I don't have the cycles to review it today.

  99. Tobias

    will vote on list for this one

  100. Kev

    s/don't/didn't/

  101. Lance

    i'm +1 for exerimental

  102. Kev

    Ta.

  103. Kev

    8) http://xmpp.org/extensions/inbox/jingle-sources.html

  104. Kev

    I'm -1 just for the RFC examples reason, again.

  105. Tobias

    here i was surprised by the urnietf:rfc:5576

  106. Tobias

    here i was surprised by the urn:ietf:rfc:5576

  107. Tobias

    does that have to be registered somwhere?

  108. stpeter

    Tobias: we already do urn:ietf:rfc:3264

  109. Tobias

    stpeter, ahh..ok. didn't know about that

  110. Lance

    +1 once the rfc legal stuff is resolved

  111. Tobias

    same as lance...+1 then

  112. stpeter

    Tobias: http://tools.ietf.org/html/rfc2648

  113. Kev

    9) Board requests for liaisons.

  114. fippo

    tobias: rfc 2648 defines that

  115. stpeter

    yes

  116. Kev

    bear / stpeter: This one's for one of you.

  117. stpeter

    I have been in communication with the UPnP Forum about a liaison relationship

  118. stpeter

    their spec-in-progress references the core XMPP stuff as well as various pubsub-related specifications

  119. stpeter

    they *might* also hope for some input regarding Jingle

  120. stpeter

    that's less clear right now

  121. stpeter

    I can work with the Council regarding a call for volunteers

  122. Kev

    stpeter: How many people in this liason? One or more?

  123. stpeter

    can be more than one

  124. Kev

    And does this happen in public or private?

  125. stpeter

    in this case, I might say "should be more than one"

  126. stpeter

    this work happens within the UPnP Forum, and their work is not public -- they have a working group made up up UPnP members and invited "observers" (which would include the people we name)

  127. stpeter

    I think it would be best for now if we name only XSF members, too

  128. stpeter

    not just general people we find on the street :-)

  129. Tobias

    heh

  130. stpeter

    i.e., we are treating this liaison group as a "Work Team" per http://xmpp.org/about-xmpp/xsf/xsf-bylaws/

  131. stpeter

    I think that I can send a PDF of the proposed liaison agreement to the membership

  132. Kev

    I'd be inclined to say that it'd be sensible to try to have someone from Council, and someone not.

  133. stpeter

    I will check on that

  134. Kev

    But let's ask for volunteers and see what happens.

  135. stpeter

    Kev: sure

  136. Kev

    So, date of next?

  137. Peter Waher

    and dynamic forms?

  138. stpeter

    Kev: IMHO the process is, Council asks for volunteers, chooses the liaison team, and proposes it to the Board for approval

  139. Kev

    stpeter: Right.

  140. stpeter

    (keeping in mind that we're going to have liaison relationships with UPnP Forum, ISO, and IEC by the looks of it, so we can't burden the same people with all the work IMHO)

  141. Kev

    Peter Waher: Has been covered in previous meetings, no objections.

  142. Kev

    stpeter: Yes.

  143. Kev

    So, date of next?

  144. Peter Waher

    (y)

  145. Lance

    next week, usual time is good for me

  146. Kev

    I'm inclined at this point to suggest we go for the new year, but we can do next week if people like.

  147. Kev

    Yeah, ok, let's do that.

  148. Kev

    Any other business?

  149. stpeter

    WFM

  150. Tobias

    Kev, next week wfm

  151. stpeter

    no AOB here

  152. Peter Waher

    so both can have numbers and be published as experimental?

  153. Kev

    Excellent.

  154. stpeter

    Peter Waher: I think so

  155. Peter Waher

    excellent :)

  156. Peter Waher

    thanks

  157. Kev

    Peter Waher: Need the two people not present to express an opinion for logging.

  158. stpeter

    my other conf call just finished (went 30 minutes over), sorry about the divided attention

  159. Kev

    Right, we're done.

  160. Kev

    Thanks all!

  161. Kev bangs the gavel.

  162. Tobias

    thank you

  163. stpeter

    thanks, Kev!

  164. Lance

    Tobias: what was the issue you had with 156?

  165. stpeter

    Lance: that it should be done over HTTPS or DNSSEC if possible

  166. stpeter

    I think the security considerations talk about that, but perhaps not strongly enough for his taste

  167. Tobias

    stpeter, i think they basically say that if you originally intended to do a secure connection you should also only choose secure alternative methods

  168. Tobias

    but i doesn't say, at least i haven't read it that way, that you should use secure methods to discover the alternative methods

  169. stpeter

    Tobias: that does make some sense

  170. Tobias

    i mean sure, DNSSEC isn't here....but HTTPS has some availability ^^

  171. stpeter

    "Entities that use these connection methods need to ensure that they conform to the security considerations of each method (e.g., by preferring to use 'https' or 'wss' URLs that are protected using Transport Layer Security)."

  172. stpeter

    that could be worded more strongly

  173. Tobias

    stpeter, that still only talks about the choice among the provided methods, right?

  174. Dave Cridland

    Tobias, You're talking about using https to do the XEP-0156 discovery, right?

  175. Tobias

    right

  176. Dave Cridland

    Tobias, Not merely using https for BOSH.

  177. Tobias

    requesting the json file via HTTPS

  178. Tobias

    or requesting that TXT record via DNSSEC

  179. stpeter

    Tobias: yes, agreed

  180. Lance

    ah, right. yeah, adding a sentence for that should be done

  181. Lance

    technically that should bubble up from RFC 6415 for the host-meta stuff

  182. stpeter

    Lance: right, let's check what the RFCs say for sure

  183. Lance

    stpeter: 6415 says if authentication is necessary for what's in the host-meta file, HTTPS only MUST be used

  184. Tobias

    "Applications utilizing the host-meta document where the authenticity of the information is necessary MUST require the use of the HTTPS protocol and MUST NOT produce a host-meta document using other means. In addition, such applications MUST require that any redirection leading to the retrieval of a host-meta document also utilize the HTTPS protocol." they have this in their sec. considerations

  185. Tobias

    but it wouldn't hurt to also mention it in the XEP, and that way we can add DNSSEC to it too

  186. Lance

    Tobias +1

  187. stpeter

    Tobias: agreed, thanks for pressing the issue

  188. fippo

    stpeter: "no burden the same people" means you cant be on it :-)