XSF Discussion - 2017-03-02

  1. Guus has joined
  2. Ge0rG Damn, you've got me. I type my gpg password rather often. I can look up the other things for mutt tomorrow if you are interested
  3. Zash I'd rather know how to not quit mutt by accident all the time
  4. winfried has left
  5. waqas has joined
  6. Ge0rG Unbind the Q key
  7. Zash Whos brilliant idea was it to put quit and 'go back' on the same key anyways?
  8. Mancho has left
  9. Ge0rG Zash: it's a sensible idea in general. Except when you want to "leave" a limit filter
  10. waqas has left
  11. moparisthebest has left
  12. efrit has joined
  13. moparisthebest has joined
  14. moparisthebest has left
  15. moparisthebest has joined
  16. moparisthebest has left
  17. moparisthebest has joined
  18. jere has joined
  19. waqas has joined
  20. nicolas.verite has joined
  21. jere has left
  22. jere has joined
  23. jere has left
  24. jere has joined
  25. jere has left
  26. jere has joined
  27. Yagiza has joined
  28. nicolas.verite has left
  29. nicolas.verite has joined
  30. moparisthebest has joined
  31. moparisthebest has joined
  32. jere has left
  33. Tobias has joined
  34. kaboom has left
  35. Guus has left
  36. Guus has joined
  37. moparisthebest has left
  38. moparisthebest has joined
  39. vurpo has left
  40. vurpo has joined
  41. Lance has joined
  42. Yagiza has left
  43. Yagiza has joined
  44. Lance has left
  45. nicolas.verite has left
  46. SamWhited I have my password saved in a GPG'ed file; mutt unlocks GPG on start to get the password, which also keeps the GPG agent unlocked for 15 minutes or whatever, which works pretty well.
  47. SamWhited has left
  48. waqas has left
  49. nicolas.verite has joined
  50. Kev has left
  51. Ge0rG Zash: for incoming mail, you can set pop_pass and imap_pass in imap, or even bind a key to a macro like "cimaps://user@domain:password@server/INBOX\n"
  52. Zash https://tools.ietf.org/html/rfc6778 and https://tools.ietf.org/html/rfc7017
  53. Ge0rG That's so meta.
  54. Zash https://trac.tools.ietf.org/group/tools/trac/wiki/Imap
  55. Ge0rG Zash: you might want to tell the XSF why you are pasting all the URLs in here.
  56. sonny has left
  57. Zash Ge0rG: I'm sleep-pasting URLs I think
  58. Ge0rG Zash: time to get coffee, then.
  59. Ge0rG I've had my first coffee of the day at 0430 local time.
  60. Zash Anyways, the IETF seems to have gone through the process of figuring out better ways to access mailing list archives, so I'm trying to nudge people towards looking at the work they did.
  61. Mancho has joined
  62. Ge0rG Zash: I'm not sure how IMAP is going to help in that regard. It sounds to me like a mix of NNTP nostalgia and nerd cred.
  63. Ge0rG Zash: I'd like to have a feature where you can search the ML by affected XEPs. So a kind of tagging.
  64. Ge0rG And people write the craziest things into the Subject:, so you can't just /~s XEP-0123
  65. nicolas.verite has left
  66. Ge0rG if we could add XEP-xxxx tags post-factum, it would be great.
  67. Zash Makes archives predating your subscription accessible.
  68. Ge0rG Zash: last time I needed that (and it was to correctly reply-to to a mail), I just downloaded the .mbox. I think that the number of people who care about that, outside the IETF, is small.
  69. Ge0rG Zash: and the set of people who fail to import an .mbox into their MUA, but manage to connect to an anon IMAP is probably very small.
  70. moparisthebest has joined
  71. Guus has left
  72. Zash The underlying point is to look at what a similar organization did about pretty much the same problem.
  73. Ge0rG Okay, I can buy into that
  74. waqas has joined
  75. Zash They did end up with a pretty nice search thingy.
  76. Guus has joined
  77. Ge0rG Zash: I hope you don't mean "connect with imap, use your MUA search" approach
  78. Zash Ge0rG: https://mailarchive.ietf.org/arch/
  79. Ge0rG Zash: it looks like a web MUA to me. I searched for "xmpp" and wasn't impressed with the results too much
  80. Ge0rG OTOH, it looks like a MUA.
  81. Zash has left
  82. Ge0rG Oh Android. If you register your app as an Intent handler, older versions use "{handler_title}" as the display text, and newer versions use "Open with {handler_title}". I'm pretty sure I'm not the only one to find "Open with Add contact" a strange wording.
  83. Ge0rG isn't awake either, yet. Just misread the last members@ thread as "XSF Bored Meeting Minutes".
  84. nicolas.verite has joined
  85. waqas has left
  86. Ge0rG has left
  87. Lance has joined
  88. Lance has left
  89. Ge0rG has left
  90. suzyo has joined
  91. Ge0rG has left
  92. Guus has left
  93. Guus has joined
  94. nicolas.verite has left
  95. Ge0rG has left
  96. nicolas.verite has joined
  97. goffi has joined
  98. Valerian has joined
  99. suzyo has left
  100. SamWhited has left
  101. nyco has left
  102. nicolas.verite has left
  103. xnyhps has left
  104. nyco has left
  105. nyco has joined
  106. nyco has left
  107. Ge0rG has left
  108. xnyhps has left
  109. nicolas.verite has joined
  110. Flow has joined
  111. jubalh has joined
  112. kalkin has left
  113. efrit has joined
  114. Flow has left
  115. mimi89999 has joined
  116. jonasw ah, that ietf-mailarchive-thing is nice
  117. jonasw seen it a couple of times
  118. xnyhps has left
  119. xnyhps has left
  120. xnyhps has left
  121. suzyo has joined
  122. Kev has joined
  123. Ge0rG has left
  124. Ge0rG has left
  125. efrit has joined
  126. vurpo has left
  127. vurpo has joined
  128. Ge0rG has left
  129. winfried has left
  130. winfried has joined
  131. Valerian has left
  132. Guus has left
  133. Guus has joined
  134. jonasw I’m starting the writeup of the XEP-115 (Entity Capabilities) replacement. I have a few questions: 1. I would like to acknowledge waqas work and the work of the authors of XEP-115. How do I do that appropriately? The XEP-Template doesn’t have an acknowledgements section, but seeing that XEP-115 (and others) have one, I assume that’s an appropriate way to do it. Correct? 2. In the examples I will need a namespace. Where will I source it from? Should I use a namespace under my own control and the editor will choose a different one when the XEP is accepted as experimental?
  135. Kev Is this a replacement of 115, or an update to 115?
  136. daniel jonasw: there is no formal way for acknowledgements. Most authors just dedicate an entire section to it
  137. jonasw Kev: replacement, you can probably work your way from http://logs.xmpp.org/xsf/2017-02-28/#19:49:01 upwards to see the discussion around that.
  138. Kev Just re-using 115 seems appropriate to me, you're not in need of drastically changing the protocol, are you?
  139. Kev (I note that other things like pubsub have dependencies on 115, so if you write a whole new XEP you're looking at patching a *lot* of XEPs to update those dependencies)
  140. daniel That's probably true
  141. jonasw interesting point, noone seems to have thought about that the other day
  142. jonasw a namespace bump for 115 would be less intrusive probably
  143. uc has joined
  144. daniel has left
  145. Kev A namespace bump, if needed, or maybe a backwards-compatible update (if possible) seem reasonable to me. But keep in mind it's not coffee-o'clock yet, and I don't even drink coffee.
  146. jubalh has joined
  147. daniel has joined
  148. jonasw backwards-compatible won’t happen. the algorithm (and I’m not talking about sha1 or something) is broken and in need of fixing for eight years.
  149. Kev I'm not utterly convinced that means it can't happen (forwards-compatible can't happen, certainly), but I'm not convinced it can, either.
  150. Valerian has joined
  151. jonasw i should probably announce coffee-o-clock now.
  152. jonasw in my opinion, xep 60 doesn’t have a dependency on 115, but on 30. it’s just worded badly.
  153. jonasw or rather, "in my reading" than "in my opinion"
  154. jonasw from the amount new work I’m doing for it, an update to 115 feels more appropriate than a new xep, too
  155. Flow has joined
  156. vurpo has left
  157. vurpo has joined
  158. Flow Kev, Steve Kille: Would MIX be interested in an atomic CAS for PubSub. For example to race-free replace the subject/topic/... of a node. I'm considering writing a CAS add-on XEP for PubSub.
  159. jonasw what is CAS?
  160. Flow always wonders why there is no CAS for PubSub
  161. jonasw (I only know Computer Algebra System, which I assume you don’t mean)
  162. Flow jonasw: compare-and-swap
  163. jonasw ah!
  164. jonasw makes sense.
  165. jonasw officially announces coffee-o-clock!
  166. jonasw (or rather, tea-o-clock)
  167. Ge0rG had two cups of coffee yet. Time to get a new one.
  168. jonasw Flow: I feel that CAS will be hard to implement server-side. when do two XML subtrees compare equal?
  169. Flow jonasw: by node id
  170. Flow err item id
  171. Tobias CAS?
  172. jonasw okay
  173. Tobias ah..nvm
  174. jonasw Flow: CAS would be useful for data storage in PEP nodes, too
  175. Flow jonasw: It would be useful everywhere where PubSub/PEP is used
  176. jonasw mostly everywhere :)
  177. jonasw but yes.
  178. Flow and where you want to avoid accidentially deleting existing data because of a race condition
  179. Steve Kille has left
  180. Steve Kille has left
  181. jonasw there are usecases where you add data instead of replacing by item id :)
  182. Tobias I wonder why 115 didn't just use Canonical XML standard for c14n of disco to later hash it https://www.w3.org/TR/2008/REC-xml-c14n11-20080502/
  183. Steve Kille has joined
  184. jonasw Tobias: I was wondering about that, too, but I think canonical XML is strict with the relative ordering of elements
  185. jonasw also I‘m not sure how many xml libs support c14n; considering that there are *still* some in use which don’t do namespaces properly
  186. Tobias could be, yeah
  187. Tobias jonasw, you're aware of this thread, right? https://mail.jabber.org/pipermail/standards/2011-August/025011.html
  188. jonasw not yet
  189. Flow jonasw: which usecases are that?
  190. jonasw Flow: microblogging-ish :)
  191. Flow ahh right
  192. Tobias jonasw, it discusses a lot issues with current XEP-0115, that should be solved in a new version
  193. jonasw Tobias: thanks!
  194. jonasw I’m looking into it
  195. Flow jonasw: Also https://wiki.xmpp.org/web/XEP-Remarks/XEP-0115:_Entity_Capabilities
  196. jonasw I was also planning to ask standards@ for input when I have a first draft
  197. Tobias Flow, what? the IANA has two registries for hash names?
  198. Flow Tobias: Yep
  199. jonasw that’s a good point; the one we currently use doesn’t list sha3 for example
  200. Flow I discovered that when searching for a registry for ISR-SASL2
  201. Tobias Flow, einmal mit profis :P
  202. Flow Tobias: Hehe, to be fair, that could happen to the XSF too :)
  203. Tobias Flow, nah...we'll only ever have XEP-0300, which can be updated relatively easy
  204. Tobias i think IANA stuff requires lots of time and process
  205. Flow If someone knows if and whom we should tell about this within the IETF/IANA, then please do so/tell me.
  206. Flow Link Mauve: BTW, SASL2?
  207. Steve Kille has left
  208. Martin has joined
  209. mhterres has joined
  210. jonasw does anyone know the rationale for querying a specific disco-node containing the hash in the verification procedure xep 115?
  211. Tobias jonasw, what exactly do you mean?
  212. jonasw example 3 here: https://xmpp.org/extensions/xep-0115.html#discover
  213. jonasw node='http://code.google.com/p/exodus#QgayPKawpkPSDYmwT/WM94uAlu0=' instead of simply querying without node. is the idea to avoid races with changing capabilities?
  214. jubalh has left
  215. jonasw hm, it mentions "backwards-compatibility"
  216. jonasw for avoiding races it seems helpful, why was it abandoned?
  217. jonasw (even though races wouldn’t be harmful here)
  218. Flow jonasw: so that you get the result of that very same hash?
  219. jonasw yes
  220. vurpo has left
  221. Flow that approach seems sensible to me
  222. Tobias could also help with server side caching i suppose
  223. vurpo has joined
  224. nicolas.verite has left
  225. jonasw Flow: I don’t like the approach though, from an implementers point of view
  226. Flow e.g. Smack also responds to the last 10 hashes
  227. Flow jonasw: I do like the approach from an implementers point of view
  228. Tobias Flow, you keep a history what sets of features the last 10 smack releases supported?
  229. Flow Tobias: No, disco features are dynamic, not tied to a smack release
  230. jonasw Flow: there is no harm in a race here, because if you get a race with an unknown hash (if you know the hash, you don’t care) you simply get the updated disco#info and discard the hash.
  231. Flow so the last 10 features of the connection
  232. Tobias that yoo, yeah
  233. Flow jonasw: true, no race here, but it helps with other things, like tobias said, server side caching, and I think it's the cleaner approach
  234. jonasw how does it help with server-side caching?
  235. Flow jonasw: The server can cache the response
  236. jonasw hm okay
  237. Flow and send it instead of forwarding the request to the queried client
  238. Tobias jonasw, the server doesn't need to forward the IQ to the to-JID if it knows the from-JID just wants the disco#info for a hash
  239. jonasw makes sense
  240. Tobias it could reply directly
  241. jonasw seems like using a different format for these nodes would be great though: '{ecaps2-namespace}#{hash-algo}.{hash-value}' or something along those lines to make it easily recognizable
  242. jonasw right now a server needs to track the 'node' exported in <{caps}c/> to know whether a disco-node is a caps hash
  243. Valerian has left
  244. Valerian has joined
  245. Valerian has left
  246. jonasw *belongs to a caps hash
  247. jonasw is there an element I can use to link to another section in a XEP?
  248. jonasw except <link url='#anchor'/>
  249. Valerian has joined
  250. dwd IANA has *no* registry for hash names. IANA has several protocol registries to cover parameters for hashes, some of these are strings.
  251. jonasw dwd: that makes sense and explains the odd titles for those registries.
  252. Flow like "Named Information Hash Algorithm Registry"
  253. dwd We co-opted one for our purposes in XEP-0300, but it's originally for PKIX, so it contains OIDs as well.
  254. jubalh has joined
  255. dwd Maybe we should also allow urn:oid:2.16.840. for SHA-256?
  256. jonasw no
  257. jonasw no no no no
  258. Tobias dwd, although that one hasn't been updated since 2000something
  259. kalkin has left
  260. jonasw oids are a mess.
  261. dwd jonasw, How can you say that? They're terribly convenient stable identifiers. Even if Surevine only has one OID arc (Isode has two - snazzy).
  262. jonasw ugh, the names in xep-0300 are longer than some base64-encoded hash values themselves…
  263. Tobias jonasw, what names?
  264. jonasw dwd: as long as you don’t need to parse them semantically, it’s fine probably, like urns
  265. jonasw Tobias: <var> <name>urn:xmpp:hash-function-text-names:md5</name> <desc>Support for the MD5 hashing algorithm</desc> <doc>XEP-0300</doc> </var>
  266. Tobias yeah...that's so people don't used md5 :P
  267. dwd jonasw, Oh, the feature names.
  268. Tobias jokingly
  269. jonasw well, close. >>> len(base64.b64encode(hashlib.sha256().digest()).decode("ascii")) 44 >>> len("urn:xmpp:hash-function-text-names:sha-256") 41
  270. dwd jonasw, Well, that's a reason to use SHA3-512, then.
  271. jonasw my python cannot into sha3
  272. jonasw hm, 3.6 can’t either…
  273. Tobias #sad
  274. jonasw but that looks like a configuration problem; it also doesn’t have BLAKE2b512 which is available in 3.5 here
  275. mathieui jonasw, 3.6 can do sha3 just fine
  276. jonasw Tobias: did you mean <sad/>?
  277. jonasw mathieui: yes, it appears to be a problem with my python3.6.0a3 probably sourced from debian/experimental
  278. Tobias jonasw, nah..i mean the trumpish hashtag sad ;)
  279. Tobias jonasw, so 3.6 doesn't have blake2 but 3.5 has?
  280. jonasw Tobias: or rather xep-14 <x xmlns="jabber:x:tone">sad</x>? :>
  281. jonasw Tobias: as I said: it’s most likely an issue with my local setup, the documentation says it is there:
  282. jonasw https://docs.python.org/3/library/hashlib.html
  283. mathieui Tobias, 3.6 has blake2 as well
  284. Tobias nice
  285. jonasw meh, short names for the functions in xep-0300 would be great
  286. jonasw or am I just missing those?
  287. dwd jonasw, The long names are only used in the disco#info, right?
  288. jonasw dwd: it apperas so
  289. dwd jonasw, The actual use in protocol are short names, like "md5".
  290. jonasw dwd: but there doesn’t seem to be a registry or source to refer to on which short name to use for which function.
  291. Piotr Nosek has joined
  292. Tobias jonasw, table 1 has short hash function names
  293. jonasw for some, yes.
  294. Tobias see the sentence before the table
  295. jonasw it is lacking sha3-{224,384} for example
  296. jonasw even including that sentence
  297. Tobias well yeah..didn't see much sense in those intermediate values
  298. jonasw fair point
  299. jonasw re-using 0300 makes a lot of sense
  300. Tobias the standard should probably be 256bit ones, and if you need more security, might as well go to 512 bit then
  301. jonasw hm, would making new hash functions mandatory trigger a bump on the <hash/> element…?
  302. jonasw that sounds like a *lot* of fallout.
  303. Flow jonasw: why should it trigger a (namespace?) bump?
  304. jonasw Flow: I don’t know. I’m asking.
  305. Guus *couch*Flow logo*couch*
  306. Mancho has left
  307. Mancho has left
  308. Alex has joined
  309. jubalh has joined
  310. vurpo has left
  311. vurpo has joined
  312. jonasw Kev: out of curiousity, what software are you talking about in your mail from 09:57+01:00?
  313. Tobias i just assumed that mail was some weird welsh humor :)
  314. dwd jonasw, I suspect it's mailman...
  315. Guus as we're all here: Does any more need to be discussed regarding https://github.com/xsf/xmpp.org/pull/269 ?
  316. Guus or rather: my merging of it?
  317. Tobias dwd, a new version of mailmain you mean?
  318. Tobias or the current mailman?
  319. dwd Tobias, No, I think it's just whatever we're using now. I suspect there might - might - be sarcasm at play here.
  320. jonasw Guus: FWIW, github has a review feature, and it may make sense to have one or two eyes confirm that they took a close look on the changes, possibly leaving comments.
  321. Tobias dwd, never seen him use that before though
  322. Yagiza has left
  323. dwd Tobias, No, it's unusual in those who are cursed by not being English.
  324. Tobias dwd, you misspelled 'blessed' there
  325. jonasw I had to change my editors dictionary to en_US (from en_GB) to write XEPs :<
  326. dwd What? Why?
  327. jonasw because XEP-0134 (or -0001?) says so.
  328. dwd Sounds like a candidate for a PR, then. :-)
  329. jonasw https://xmpp.org/extensions/xep-0143.html#nt-idp1712848
  330. sonny has left
  331. Guus jonasw: I don't disagree, but as far as I know, that feature is not used by XSF. We could, sure. I don't feel that there's a need for it here (the consequences of missing something in a PR review are very unlikely to be catastrophic for our website, and I prefer a continuous release cycle), but I accept that others think differently.
  332. jonasw Guus: it’s really low-entrance-barrier though (if you’re a github user), and I don’t mean that it should be *mandatory*.
  333. Guus jonasw: I'm using it for other projects. Not knowing when to use it appears to be my problem. :) I thought your PR was fine.
  334. jonasw have you checked I didn’t slip in a try: shutil.rmtree("/") except: pass in? :)
  335. Guus I am assuming that you thought so, because you PR'ed it in the first place.
  336. jonasw I’m new in the XSF, my word shouldn’t count a thing when I add code to servers.
  337. kaboom has joined
  338. Guus Oh, you could have slipped in things. I recognized your name, I glanced at the code, I ran it locally, it had the desired effect and did not delete my root partition. That combined made merging the PR an acceptible risk for me.
  339. jonasw :-)
  340. jonasw I’m just saying that I completely understand the point of people asking for thorough reviews. I would do the same if it was my infrastructure.
  341. Guus Who am I to object to thorough reviews?
  342. Guus I think mine was thorough enough by my standards, but I am fully aware that others have different standards.
  343. Kev I think there's a significant difference between 'updating text on the website', which I'm fine with people generally having access to do. And "running code on our servers", for which most people don't have rights.
  344. Tobias Guus, i agree though that i should probably have left a note in the PR that I was planning to review it soonish
  345. Kev Running code that people thought was fine, but wasn't sensibly vetted caused us to not take part in GSoC last year, and huge amounts of wasted effort for me in the process, not to mention the downtime of the server so the XSF couldn't fulfil its primary purpose for a day.
  346. dwd FWIW, the pelicanconf.py file (the only one, as I understand it, that is executed on the server) looks perfectly safe to me and adequately simple.
  347. dwd It also looks clearly bounded, in as much as I can solve the halting problem in my head.
  348. Tobias dwd, as far as I know https://github.com/xsf/xmpp.org/blob/master/buildCompleteWebsite.sh is run to build the whole website on the server
  349. Kev I think the more crises someone has been through with production servers, the less blazé they get about deployment :)
  350. Tobias because pelican has very limited capabilities
  351. Kev Anyway, I don't object to the PR based on the description, I just don't want any code deployed on XSF servers that hasn't been reviewed by iteam.
  352. jonasw Tobias: it can do anything python can if you put it in the pelicanconf :>
  353. Guus Kev: I've been a production herding developer, professionally, for 10+ years.
  354. Kev Guus: And how many times has pushing something without checking it caused a day's worth of downtime for you? ;)
  355. Tobias jonasw, probably
  356. Guus including websites that have significant amount of views (millions, monthly)
  357. Guus Kev: I did check.
  358. dwd Kev, I think you may mean blasé, rather than blazé.
  359. Kev dwd: I very much do.
  360. dwd Although there's an argument for either.
  361. Kev Guus: Then I have no objection. Your original comment didn't mention that you'd reviewed the code, just run it locally.
  362. dwd jonasw, So, not threading, then? :-)
  363. Kev Well, I still have an objection in principle, because I think the server admins should get to review the code too, but I'm happy in this instance if you've reviewed the code.
  364. Guus Kev: I'm pretty sure I did not review it up to your standards. I'm also not worried by that.
  365. jonasw dwd: depends on the specific python implementation and the specific task. Python can very much thread in the sense that C extensions which are called from python code from different threads may in fact run in parallel. It is just pure python code which, on CPython at least, isn’t run in parallel. :)
  366. dwd Kev, This is build-time code, incidentally, not runtime code. So I'd hold it to lower standards.
  367. Kev jonasw: "Python can totally thread, as long as you code in C instead of Python"? :)
  368. dwd jonasw, Yeah, I'm only too aware...
  369. jonasw Kev: pretty much
  370. Kev dwd: When it's run on the server, I'm not sure the standards need to be much lower. If it's malicious, same effect, if it manages to resource-starve and bring down the server, same effect. There are some runtime cases (resource-heavy, but not resource-starving) that don't apply, but the standard's still pretty high.
  371. jonasw actually, this is why in the organisations I use pelican, the build system and the contents are separate repositories. The build system repository has strict review requirements, content lesser so.
  372. jonasw (although, fun fact: pelican lets you write to arbitrary files from the content files alone :-))
  373. jonasw (well, the current master branch doesn’t anymore)
  374. Tobias jonasw, templates probably still can though, right?
  375. jonasw not sure about that, but I don’t consider templates content.
  376. Kev Anyway, my opinion isn't going to matter for long. My new games PC has just arrived, and Cath is going to kill me as soon as she gets home and sees the den.
  377. Tobias heh :)
  378. Guus You have time for a games PC? *envy*
  379. Kev Sure. It just sits there, it doesn't need much time.
  380. Kev Now playing games, that would take more time...
  381. jonasw I would like to re-ask my question now that more people are active. When writing a new XEP, in the examples and specification I will need a namespace. Where will I source it from? Should I use a namespace under my own control and the editor will choose a different one when the XEP is accepted as experimental?
  382. Guus which of both is what will get you killed later today?
  383. Kev jonasw: It's easiest for the Editors if you use an appropriate NS from the start, although technically IIRC the Editors should pick one.
  384. jonasw okay
  385. Kev Stripping out your NS to replace it with an xmpp one at publication time is mostly busy-work.
  386. Kev And while the other Editors are much less lazy than me, stil ... :)
  387. jonasw ack
  388. jonasw just wanted to make sure that I don’t overstep any boundaries by suggesting a namespace from the xmpp-urn-namespace
  389. Kev jonasw: It's slightly tweaking the process, but it's the sensible thing to do, and what everyone else does.
  390. Kev Guus: The mess, and that I'm not intending getting rid of my old games PC, but running both in parallel both run the risk of death-by-spouse.
  391. Guus Kev: in which case, I am glad I had the chance to meet you in person at FOSDEM, before your premature death.
  392. jonasw is there any precendent to form arbitrary (i.e. entity controlled) disco#info nodes from an urn:xmpp:-namespace? so for http://… namespaces it’s obvious to use # as a separator, is there any precedent what to use with urn:xmpp:-namespaces?
  393. Kev I'm afraid I'm too stupid to understand the question.
  394. Tobias jonasw, so you want to have dynamic namespaces, not previously defined in a XEP or registry?
  395. jonasw not namespaces, but disco#info node names
  396. jonasw nah, I’m too stupid to formulate it clearly. see in https://xmpp.org/extensions/xep-0115.html#discover <query xmlns='http://jabber.org/protocol/disco#info' node='http://code.google.com/p/exodus#QgayPKawpkPSDYmwT/WM94uAlu0='/> the node there is composed of a URL base and a hash value.
  397. jonasw I don’t see the point of using some client-provided string as a prefix so I would like to use the namespace of the XEP as prefix. what kind of separator makes sense between the prefix and the hash info? Is there a precedent for that?
  398. jonasw ah yes, it appears so
  399. jonasw xep 290 also uses #
  400. kalkin has left
  401. Valerian has left
  402. kaboom has left
  403. Valerian has joined
  404. Zash has joined
  405. Yagiza has joined
  406. Valerian has left
  407. Valerian has joined
  408. vurpo has left
  409. vurpo has joined
  410. kalkin has left
  411. Guus has left
  412. kaboom has joined
  413. kaboom has left
  414. kaboom has joined
  415. kaboom has left
  416. kaboom has joined
  417. kaboom has left
  418. Valerian has left
  419. Valerian has joined
  420. Valerian has left
  421. vurpo has left
  422. vurpo has joined
  423. kalkin has left
  424. Guus has left
  425. Zash has joined
  426. nicolas.verite has joined
  427. suzyo has left
  428. nicolas.verite has left
  429. sezuan has left
  430. nicolas.verite has joined
  431. Guus has left
  432. Valerian has joined
  433. suzyo has joined
  434. nicolas.verite has left
  435. nicolas.verite has joined
  436. kaboom has joined
  437. Yagiza has left
  438. Yagiza has joined
  439. nicolas.verite has left
  440. intosi has joined
  441. intosi has left
  442. intosi has joined
  443. daniel has left
  444. daniel has joined
  445. Mancho has left
  446. nicolas.verite has joined
  447. jubalh has joined
  448. jubalh has left
  449. daniel has left
  450. daniel has joined
  451. daniel has left
  452. sezuan has left
  453. sezuan has left
  454. sezuan has left
  455. sezuan has left
  456. sonny has joined
  457. kalkin has left
  458. Zash has left
  459. sonny has left
  460. moparisthebest has left
  461. jonasw has left
  462. daniel has joined
  463. sonny has joined
  464. Alex has left
  465. sezuan has left
  466. daniel has left
  467. sezuan has left
  468. sezuan has left
  469. Guus has left
  470. sezuan has left
  471. daniel has joined
  472. suzyo has left
  473. jubalh has joined
  474. pep. has left
  475. suzyo has joined
  476. Piotr Nosek has left
  477. arc the argument that won me over on not allowing clients to dictate their resource was that of distributed hosting routing
  478. Tobias you mean clustering?
  479. arc sure, whatever term you want to have for a @server hosted by multiple servers. and sorry i completely misread the conversation above, so that statement was kinda out of the blue
  480. Ge0rG I'm still not convinced of that clustering use case. "Google does it this way" doesn't cut it for me.
  481. arc Ge0rG: we're going to need it for IoT
  482. Kev Ge0rG: Well, I guess it'd be interesting if you could explain how you solved it in your clustered server, to persuade the other clustered server vendors that it's easy?
  483. Ge0rG Kev: wait, let me fire up a bunch of dockers.
  484. arc right now prosody can effectively handle 40k concurrent users on an average AWS instance last i ran the brute force test. in order to scale to the size that some of these IoT manufacturers want you need multiple servers, ideally geographically distributed
  485. nicolas.verite has left
  486. Ge0rG arc: what about running different per-region domains?
  487. arc the last sit-down I had with an IoT manufacturer they said 10m units is what they consider base level, and any solution they consider should be able to scale to ten times that
  488. lskdjf has joined
  489. Ge0rG are there any xmpp installations handling north of 1m connections? I only remember WhatsApp's we-are-awesome post in that regard.
  490. Tobias really wonder if all those IoT devices need permanent connections
  491. SamWhited per-region domains is changing the security model. Also, it means if I live in the US, but I travel to China, I'm still connecting to my server in the US (or whatever domain I registered on). We were talking about single domains, multiple-domains is a completely different thing.
  492. Ge0rG Tobias: of course they do!
  493. arc Tobias: for receiving input, yes. though they're not very active.
  494. SamWhited Ge0rG: I can't give exact figures (and don't know them anyways), but I'm pretty sure we (HipChat) are.
  495. SamWhited (and we also use the server-assigned-resource-part-for-routing solution, FWIW)
  496. MattJ FWIW Prosody's clustering will use the resource for internal routing purposes
  497. arc in one case a device wanted to send a "heartbeat" with 12 bytes of data every 6 seconds (1/10th of a minute)
  498. Ge0rG arc: that's a very intensive use case
  499. arc Ge0rG: yes, and each device having a retail price of around $15
  500. arc that's the future we face and have to plan for
  501. Kev I like that Arc has such a high opinion of our maths that he had to explain that 6 seconds was 1/10 of a minute :D
  502. arc Kev: sorry i haven't had my tea yet lol
  503. jonasw tea <3
  504. Guus I for one wonder how many seconds 2/10 of a minute is.
  505. arc I will readily admit that a 100m service blitzed my brain out. I mean, sure we can toss around big numbers like its nothing, but that's actually some significant engineering challenges.
  506. lskdjf has left
  507. Kev arc: It undoubtedly is.
  508. arc at that rate you need dedicated S2S routers. and questions like where are the heartbeats routing to
  509. Ge0rG I could also imagine that a 100m IoT deployment has different requirements than a public chat service
  510. Ge0rG (and also probably different sysop challenges, where having a resource string as a debug tag is less useful)
  511. arc absolutely. from the EXI side those stanzas are extremely small. as long as the 12 bytes of data are encoded in int or float attributes within their custom schema, the whole stanza could be around 16 bytes. and since the devices will be communicating with a finite number of other devices, mostly on the same LAN..
  512. arc my recommendation was embed their XMPP server in their 802.15.4 to wifi gateway module, to keep a majority of the traffic local and reduce their service end traffic as a first point. which i think is what they're doing
  513. MattJ Ge0rG, client-provided debug tags aren't guaranteed to be unique, I'm really unconvinced by your argument
  514. SamWhited I've also come to the conclusion that agreeing to compromise on that basis was a mistake… if you were using the resource part as a debug tag you were using a quick hack; if that's a thing we want, we need a real solution, we don't need to make a part of the JID more complicated just so someone can see sometihng in existing logs.
  515. SamWhited Adding stuff to the JID that isn't related to routing is changing the purpose of JIDs, and that feels like a bad idea.
  516. Ge0rG MattJ: a properly implemented client can provide sufficient uniqueness.
  517. MattJ Ge0rG, you're not a server developer, clearly :)
  518. SamWhited As a general rule of thumb I don't think we should ever have to rely on a "properly implemented" client.
  519. MattJ Indeed
  520. arc SamWhited: from the EXI side it doesn't matter. the entire JID is one string in the string table. i think having a human readable (aka designed for the UI) resource after the # makes some sense. though, that could also be done through pep
  521. Ge0rG MattJ: but I know a little bit about client development
  522. jonasw at this point I tend to agree with SamWhited. for debugging, there really should be something else, like an additional optional stream header which can be used for debugging, or a stream feature to attach a debug identifier to a stream or use <identity/> as soon as it’s available.
  523. MattJ Ge0rG, it's a nice idea, for you, with your client. But in the real world, on a real server, we can't depend on every client being Yaxim
  524. arc wouldn't this make sense to attach to PEP?
  525. MattJ I totally get why you want a debug tag, and let's do that. But I think it's separate to the resource
  526. SamWhited Or just some form of fingerprint the server constructs (so that the client doesn't have to do anythihng), eg. maybe it queries the client for its disco#info, and then hashes that along with the JID and any other info it can get and uses that to track sessions
  527. MattJ arc, no, because PEP is per user, not per client
  528. arc MattJ: couldn't the PEP .. sorry still early .. list a resource to human readable lookup?
  529. jonasw SamWhited: for a single session, a server can just roll a random number.
  530. Ge0rG MattJ: let me rephrase your suggestion: let's create a nice perfect future debug tag sometime in the remote future, and remove the existing and working debug tag right now.
  531. SamWhited jonasw: ah, yah, I guess this is about tracking clients, not sessions. oops.
  532. SamWhited The existing and working debug tag that breaks more critical parts of the system and makes everything more complicated.
  533. sezuan has left
  534. sezuan has left
  535. jonasw for clients use <identity/> as soon as its available and log it to associate the identity with the session nonce in the logs.
  536. jonasw identity + bare jid probably
  537. SamWhited And requires that clients do a specific thing which they may or may not actually do.
  538. MattJ Ge0rG, given that you're currently the only person I've seen suggesting that the resource string can and should be used this way, I don't think we're anywhere near your ideal being reality either
  539. sezuan has joined
  540. MattJ i.e. other clients don't use the resource this way, you do. You'll update to use the debug tag, they won't
  541. SamWhited I remember at summit people complained that identity couldn't be used for this, but I don't remember why? What jonasw suggested sounds sensible, and works today.
  542. jonasw I see that the resource is *currently* a nice way to track a client in debug logs; but BIND 2.0 won’t be there tomorrow. There’s plenty of time for server devs to adapt. This could easily be part of the UX considerations for sysops in BIND 2.0
  543. jonasw (s/BIND/Bind/?)
  544. MattJ I'd be fine (and glad) to include some kind of unique client identifier in bind2
  545. Ge0rG MattJ: I don't know how many sysops of public servers are active in this MUC
  546. jonasw or even include a "debug identifier" in Bind 2.0 which is never ever exposed to anything but server logs. although I think a stream header would be nicer because it allows tracking even before authentication succeeded.
  547. jonasw ha, MattJ beat me to it
  548. MattJ and with bind1 clients, use their provided resource as a cookie, and then use something else for the actual resource
  549. Zash What is it with you and writing lots of text while I'm out on a walk?
  550. MattJ (sorry, cookie == debug tag in my mind)
  551. jonasw MattJ: makes sense
  552. SamWhited nods
  553. jonasw sounds like a very useful way forward
  554. MattJ Zash, you should take your phone, to make sure you never miss a message!
  555. Zash I did, for photos of all the snsow
  556. Zash I did, for photos of all the snow
  557. Ge0rG MattJ: I want to be able to easily grep my logs for certain things, and to get all traffic exchanged with a given client instance (including re-auth and 0198 resumption)
  558. jonasw (this discussion also pins me to a chair in a waiting room where I wanted to leave 20 minutes ago, but whatever)
  559. arc phone? he should have always wear Glass so this room is constantly flowing above his eyeball
  560. Ge0rG MattJ: or to get all traffic exchanged with a certain client software.
  561. Tobias Zash, how much ❄?
  562. jonasw Ge0rG: I think you actually want structured logs
  563. MattJ I want to submit pull requests to all other clients to change their default resource string to "yaximXYZ"
  564. jonasw cramming all those criteria in a single string isn’t doing any good
  565. Zash My position on resource selection is that the rules in xmpp-core are fine and don't need changing.
  566. Zash I agree with SamWhited that something else ought to be used for this kind of tracking and debugging.
  567. Zash Ge0rG: Would it satisfy you if we returned the log tag in the handshake somehow?
  568. Ge0rG Zash: the rules in xmpp-core are sufficient indeed. As long as the server doesn't override what the client sends ;)
  569. arc the more i think about it, the less i think about this as an issue of debugging, but more of the use case where you want your contacts to be able to specifically reach you on your laptop vs phone vs whatever
  570. arc that was brought up at the summit, i dont remember by who
  571. SamWhited The rules in xmpp-core would be fine, except that if you let clients "set" a thing, they're going to stop reading the RFC at that point and assume that's the JID they get. In my mind the rules should be "the server sets the resource part, it's opaque to clients, and the clients get no say in it"
  572. Zash arc: That is doable via disco#info
  573. jonasw Ge0rG: what about the following: 1. bind 2.0 allows for a "debug tag" 2. servers are strongly encouraged (via UX considerations in the bind 2.0 xep) to include that debug tag to every log message related to that client ?
  574. Zash SamWhited: The client gets to make a suggestion, but the server decides. Similar to how extensions and stuff work in TLS.
  575. SamWhited Because it's for *routing* which is strictly a server concern.
  576. SamWhited Zash: Yah, I wouldn't mind that, except it seems to be a source of bugs because clients don't actually pay attention to the servers decision
  577. SamWhited Or at least, that's what it sounded like at summit.
  578. arc SamWhited: most client authors AFAICT don't write to the rfc, they use it as a rough guide and really write to a server
  579. Ge0rG SamWhited: there is still no consensus on whether that _routing_ info should be persistent for a given client instance or not.
  580. Zash arc: And that's how we get "but it works in Internet Explorer".
  581. SamWhited Ge0rG: Sure, but that's orthogonal (and probably up to the server / service)
  582. SamWhited arc: Indeed :(
  583. Ge0rG SamWhited: actually it's related, because the client is the only one that knows its identity on a reconnect
  584. jonasw there should be a way to pain to those who do that, arc
  585. Zash Ge0rG: Have you thought about my suggestion of including a namespaced attribute on the stream header? That's greppable in logs, which gives you the sessions log tag, which you can then grep for.
  586. arc jonasw: a network testing script which tests a client or service for compliance
  587. arc starting with "fun" things like sending <stream:stream version="2.0">
  588. Zash Are there any security issues with using the stream ID as tag in logging?
  589. SamWhited Ge0rG: Ah, yah, fair enough, I guess you can't really separate that from the clients control.
  590. arc and using custom prefixes.
  591. Ge0rG Zash: I want to reduce the number of IDs, not increase it.
  592. arc just basically go through the RFC for every MUST and SHOULD, write a test for that case, and MUSTs show up as red, while SHOULD appears in yellow - any client failing to (eg) accept a different resource than requested by the server would show up this way
  593. arc and if you provide it, and its something client authors can find, they will almost certainly use it.
  594. Ge0rG Sorry, I'm in a meeting currently, and I'm heavily sleep-deprived. Can't focus on the discussion here.
  595. Zash arc: FWIW I don't think the client needs to know its own resource in that many cases.
  596. arc sure but can you think of a case where a client not understanding its resource correctly would cause a fault that you could test for on the server side?
  597. Zash Strip out the 'to' attribute on everything you send, see how the client reacts.
  598. jonasw as a client, I don’t care about the to a server sends me
  599. arc yea isnt it legal to do that?
  600. Zash No 'to' attribute is supposed to be semantically equivalent to to=full JID
  601. arc i mean i guess you could test an iq ping addressed to nobody, to the client by a random resource, to the client's requested resource, and to the client's given resource
  602. Zash Or the bare JID in the other direction
  603. arc replying to a ping that's misaddressed should at least be a warning, tho in that case it'd often be hard to say whether it was understanding its resource correctly or not
  604. arc but if it only replied to its requested resource but not its given resource..
  605. Zash Isn't that an error on the servers part?
  606. jonasw has left
  607. arc Zash: test servers must send bad data. thats the point.
  608. vurpo has left
  609. vurpo has joined
  610. Zash There's been a bunch of security issues related to not validating the 'from' on certain stanzas, like roster requests and such.
  611. arc the point of a test suite isnt to test whether a client behaves correctly with typical data to a properly functioning xmpp server. the point is to test whether it behaves according to the RFC, so in many cases the client would - i assume - need to close the connection and reconnect.
  612. jonasw yeah, but from is not to
  613. arc or send an <iq type='error'> or etc
  614. Alex has joined
  615. arc i mean i above proposed one of the first tests would be <stream:stream version='2.0'> to check that the client is actually parsing the stream version according to the RFC. it should reject the connection, right there
  616. Zash arc: https://modules.prosody.im/mod_conformance_restricted.html may be of interest to you
  617. arc Zash: i'll look at it
  618. arc but does it send intentionally bad data to test?
  619. arc I have a utf8 test suite I'd *love* to see how both clients and servers respond to
  620. Zash Yes, sends XML things forbidden by the RFC
  621. jonasw sending PIs is bad data i guess :-)
  622. jonasw damn i need tobunload csi
  623. jonasw *to unload
  624. jonasw has left
  625. arc Zash: have you tested for UTF-8? what happens when NULL is in the middle of a stanza, say in the <message><body>? or ending a <message><body> with a chr(148) followed by </body>
  626. Zash arc: Have we had the conversation about IDNA versions and PRECIS and how the only reasonable thing to do is crawl down under ones desk and cry?
  627. arc Zash: no but it sounds like a conversation id love to have ;-)
  628. SamWhited Heh, this is true.
  629. Ge0rG arc: yay! please tell me if Unicode Robot Face (🤖 U+1F916) is a legal resource character
  630. SamWhited and Unicode, and UTF-8, and natural languages
  631. arc Ge0rG: I don't know but i'd love to find out!
  632. SamWhited I'm almost certain it is; I can go check if you really want.
  633. arc i discovered that GNU Screen has some deep UTF8 issues, as does Synergy
  634. vurpo has left
  635. vurpo has joined
  636. arc I started digging in and found lower level libraries were at fault
  637. arc GNU Screen only handles 1 and 2 byte unicode
  638. arc internally it was using UCS2
  639. xnyhps has left
  640. Zash Like how MySQL has something called "utf8" which only supports up to 3 byte UTF-8 sequences?
  641. arc heh
  642. SamWhited Yup, it's valid
  643. arc i think SamWhited cheated
  644. Zash arc: GNU libidn and IBM ICU behave differently when given Unicode outside of Unicode 3.something or whatever was state of the art at the time. One accepts. One rejects. Much fun.
  645. SamWhited https://gist.github.com/SamWhited/cc6fd0a9c0a1559c71f828f6b6c8b729#file-validjid-go
  646. SamWhited That JID implementation is using a very well tested PRECIS implementation that's built with Unicode 9
  647. arc Mr Miller *IS* in the DC area, we're setting up a time for coffee
  648. MattJ ^5
  649. mimi89999 has joined
  650. Homer J has joined
  651. Homer J has left
  652. Homer J has joined
  653. Homer J has left
  654. moparisthebest has joined
  655. Homer J has joined
  656. Homer J has left
  657. Ge0rG Now I wish I could have Robot Face as a sRVname SAN in a LE cert
  658. bjc has joined
  659. Zash Ge0rG: Nice things, they are unobtainable.
  660. Ge0rG Zash: like Unobtainium?
  661. SamWhited Oh no, Unobtanium is much more attainable than nice things.
  662. Ge0rG Bummer.
  663. Ge0rG BTW, why is the Board Meeting over now?
  664. Zash It was the board meeting to end all board meetings
  665. jubalh has left
  666. Ge0rG Zash: I think it only ended three of them.
  667. lskdjf has joined
  668. lskdjf has left
  669. lskdjf has joined
  670. lskdjf has left
  671. lskdjf has joined
  672. jubalh has joined
  673. tim@boese-ban.de has joined
  674. arc lol
  675. nicolas.verite has joined
  676. nicolas.verite has left
  677. arc so today's joy on the FLOSS Foundations mailing list is the announcement of the new Open Fashion Foundation, quote, "to disrupt fashion industry with lessons learned from computing industry."
  678. lskdjf has left
  679. Zash Aaaawhat who let this override browser shortcuts?!
  680. SamWhited So they're going to spend all their time adding new features to cloths and ignoring the fact that the cloths are unraveling and falling off?
  681. Zash throws things at LE's discuss thing
  682. arc SamWhited: lol
  683. arc this is one I won't even be synical about. Its just a pure bundle of joy that someone out there has made FOSS licensed fashion a personal mission in their life
  684. SamWhited ahem, yes, sorry about that. I mean, "good for them" :)
  685. arc can you imagine a fashion show hosted by this organization?
  686. Zash The latest in beard and ribs fashion?
  687. arc "This piece by Manuel Debrough, available under the Apache 2.0 license from github..."
  688. xnyhps has left
  689. arc Zash: oh no, dollars to donuts I'm willing to bet a fabulous gay man is behind this.
  690. SamWhited heh, I have a bit of a guilty pleasure in that I really enjoy fashion stuff (even though I know nothing about it, which is probably obvious if you've ever seen the way I dress), so that actually sounds pretty nifty
  691. SamWhited But I do enjoy seeing the things people come up with
  692. arc actually I can see them trying to QueerEye geek's tshirt and jeans
  693. SamWhited aww yeah, I'm gonna be fashionable for once
  694. arc the rugby club I started 4 years ago in DC just raised over $2500 in one night hosting a drag show.
  695. arc https://goo.gl/photos/XEKE5peqYG2b4gfb7
  696. Valerian has left
  697. arc when I mentioned this on IRC, one of my friends with the Gnome foundation immediately said they needed to run a drag show, and had people volunteering. The thought of that alone is priceless.
  698. arc so yea I can see a geek fashion show, especially in san francisco
  699. arc they could raise thousands for charity too
  700. dwd I can see "designer-stained t-shirts" and "artful crumpling" becoming a thing.
  701. SamWhited Hah, indeed. I'm going to start a new line: "morning coffee spill"
  702. suzyo has left
  703. suzyo has joined
  704. dwd "Bob wears jeans (model's own) and a t-shirt (free from some conference)"
  705. arc dwd: have you ever watched queer eye?
  706. nicolas.verite has joined
  707. nicolas.verite has left
  708. dwd arc, Can't say I have.
  709. moparisthebest gah I hate that, I have jeans with holes worn in them by myself by working before that was in fashion, and now I don't want to wear them for fear of people thinking I'm trying to be fashionable...
  710. arc https://www.youtube.com/watch?v=g5dZ4QG7dW0 most of the men they makeover are shaggy geeks. they turn them metro. in almost every case the man starts with tshirt and jeans, and they end up posh with a new haircut, product, etc - also with their house/office made over.
  711. SamWhited hipster moparisthebest was into jeans and t-shirt's before they got all popular
  712. moparisthebest :(
  713. dwd moparisthebest, You're way older than I thought, then. I recall holes in jeans being fashionable, and that was when my mum bought me clothes.
  714. xnyhps has left
  715. moparisthebest I seriously still wear the same jeans and t-shirts I wore when I was 18 and stuff, my wife tries to throw them away all the time lol
  716. dwd arc, See, I don't need that. I *can* dress up. I just usually *don't*.
  717. moparisthebest dwd, oh maybe it went out of style and back in, or I just didn't know about it, I'm 31 :P
  718. arc https://youtu.be/g5dZ4QG7dW0?t=11m25s is where they bring this one guy to buy fashonable denim to replace his "jeans"
  719. arc dwd: nor I. but its a great visual
  720. arc this is more like my husband and I: https://www.youtube.com/watch?v=kbf_nFtA8YQ
  721. dwd moparisthebest, Yeah, I'll be 43 soon, and I suspect my mother was telling me ripped jeans should just be replaced at about the time you were born, then...
  722. arc its funny, i have a tshirt and jeans policy - and have gotten a lot more traction with it than otherwise.
  723. vurpo has left
  724. vurpo has joined
  725. arc also the beard. the bigger the beard, the more they think you know. John "Maddog" Hall taught me that trick
  726. Valerian has joined
  727. jubalh has left
  728. Tobias has joined
  729. mhterres has left
  730. Valerian has left
  731. Yagiza has left
  732. intosi has left
  733. kalkin has left
  734. intosi has joined
  735. Guus has left
  736. kaboom has left
  737. uc has left
  738. jonasw that’s some unexpected backlog
  739. Ge0rG so much text, so laggy connection.
  740. jonasw Ge0rG: barely worth it if you’re not into fashion. most likely not worth it on your 30% loss link there.
  741. Ge0rG the link already feels like 20%. Looks like it's improving. I even have sub-second latency.
  742. intosi has left
  743. Ge0rG Maybe I should fire up Gajim to see how it behaves with MSN and high-latency links.
  744. jubalh has joined
  745. winfried has left
  746. Guus has left
  747. nicolas.verite has joined
  748. mimi89999 has joined
  749. vurpo has left
  750. vurpo has joined
  751. jere has joined
  752. Steve Kille has left
  753. Steve Kille has left
  754. vurpo has left
  755. vurpo has joined
  756. Ge0rG has left
  757. Steve Kille has joined
  758. peter has joined
  759. vurpo has left
  760. vurpo has joined
  761. Ge0rG has left
  762. arc heh
  763. intosi has joined
  764. arc If I have the joy of reading about Open Fashion Foundation today so should all of you ;-)
  765. uc has joined
  766. jonasw is there a section in a usual XEP where I can put notes on alternative variants I considered but eventually decided against? much like PEPs have, for example here: <https://www.python.org/dev/peps/pep-0448/#variations>? otherwise I might add a Design Considerations section…
  767. Steve Kille has left
  768. Ge0rG jonasw: +1 for Design Considerations
  769. moparisthebest that sounds right to me
  770. Zash # requirements it needs to do the thing # discussion we could do something, but that has these problems we colud do something else, which seems pretty good, so the rest of the spec is about this
  771. Ge0rG I think that every XEP should contain its rationale.
  772. Zash +1
  773. jonasw yESSSSss
  774. jonasw Zash: hm, PEPs do it differently: requirements, then spec, then other variants. I actually like that, because when I implement something, I don’t need to read the other variants. If I want to know why the other variants were rejected, I can skip to that section. thoughts?
  775. Zash No it should start with the schema! :)
  776. jonasw ah, I wish one could rely on schemas in XEPs.
  777. moparisthebest my ideal documentation would just start with already written code :)
  778. jonasw moparisthebest: no.
  779. moparisthebest in the language I'm using
  780. moparisthebest and it has to magically know that beforehand
  781. moparisthebest yea I'm joking sorry :)
  782. jonasw :-)
  783. moparisthebest I agree with you about that PEP order jonasw
  784. Zash Language Specification: What the code does is correct. EOF
  785. moparisthebest right :)
  786. jonasw :D
  787. moparisthebest if you think you found a bug you are mistaken, it's actually a feature
  788. jonasw #php
  789. moparisthebest and it's apparantly worked for xep115 for 10 years right?
  790. Zash Is fine, don't worry
  791. kaboom has joined
  792. moparisthebest ... why did I automatically read what Zash just said with a russian accent?
  793. jonasw https://www.youtube.com/watch?v=rp8hvyjZWHs (Trust me, i’m an engineer !)
  794. efrit has joined
  795. kaboom has left
  796. kaboom has joined
  797. Ge0rG Hm. I need to youtube-dl that so I can watch it. ETA: 12:51
  798. jonasw don’t.
  799. moparisthebest some of those things are actually awesome
  800. moparisthebest the backhoe rowing the boat for example
  801. Ge0rG jonasw: alternatively, you could stream it to the MUC with libcaca and LMC.
  802. jonasw Ge0rG: my client cannot into LMC
  803. Ge0rG I'm sure mathieui would be glad to provide a video streaming plugin for poezio :D
  804. jonasw Tobias: you mentioned earlier that a server could cache xep115 responses for those specific disco#info nodes.
  805. jonasw I wonder whether that’s a great idea after all.
  806. jonasw I was wondering whether it has any privacy implications for a client.
  807. jonasw (on behalf of whom the server is answering)
  808. Zash jonasw: You may be able to guess that the server has seen a disco#info before through timing
  809. kalkin has left
  810. jonasw Zash: well, yes, but lets assume that a server has seen that disco isn’t revealing anything, for example because all servers use the capsdb.
  811. jonasw I wonder whether it would be okay for a server to reply on behalf of a client if the client is not actually online. While that would prevent any unintended presence leaks if the server answers for a resource which would by itself not have answered to that specific asker, it has the downside that stuff may be confused if a server answers a request for a resource which isn’t even online.
  812. Tobias jonasw, as long as you have not an extremely user specific client feature set, that shouldn't be a an issue
  813. SamWhited I don't think it's a problem because it's generally up to the server to enforce permissions / decide who can query what anyways, not the client.
  814. SamWhited So your server SHOULD be taking precautions to prevent presence from leaking anyhow
  815. SamWhited (or whatever is being queried)
  816. vurpo has left
  817. vurpo has joined
  818. nicolas.verite has left
  819. intosi has left
  820. vurpo has left
  821. vurpo has joined
  822. vurpo has left
  823. vurpo has joined
  824. vurpo has left
  825. vurpo has joined
  826. kaboom has left
  827. kaboom has joined
  828. jere has left
  829. jere has joined
  830. vurpo has left
  831. vurpo has joined
  832. kaboom has left
  833. kaboom has joined
  834. vurpo has left
  835. vurpo has joined
  836. Lance has joined
  837. vurpo has left
  838. vurpo has joined
  839. vurpo has left
  840. vurpo has joined
  841. jonasw what are the criteria for an xsd to appear here? <https://xmpp.org/schemas/>
  842. Ge0rG NoooOooOOOooo! [download] 87.6% of 3.35MiB at 45.18KiB/s ETA 00:09ERROR: unable to download video data: [Errno 104] Connection reset by peer
  843. jonasw Ge0rG: youtube-dl can resume :)
  844. MattJ Ge0rG, it supports resum...
  845. MattJ :)
  846. MattJ I should know. Are you using my wifi by any chance? :)
  847. Zash MattJ: You have wifi?!
  848. MattJ Too many complaints from "smart"phone users in the house to resist any longer
  849. Ge0rG MattJ: free WiFi on a rowded train, moving at 200km/h
  850. Ge0rG MattJ: free WiFi on a crowded train, moving at 200km/h
  851. moparisthebest kind of amazing that works at all
  852. bjc has left
  853. SouL has joined
  854. SouL has joined
  855. daniel has left
  856. daniel has joined
  857. kalkin has left
  858. kaboom has left
  859. kaboom has joined
  860. arc jonasw: https://youtu.be/rp8hvyjZWHs?t=2m37s has got to be the best hack I've seen in a long time
  861. jonasw :D
  862. moparisthebest arc, the rowing backhoe? yea that impressed me the most
  863. arc yea..
  864. moparisthebest there is no arguing with that one, boat motor breaks, have a backhoe on board, it's ingenious
  865. arc i thought my use of a toilet fill valve in a bucket for plant watering was good
  866. Zash I don't usually have a backhoe on board
  867. arc this is a whole new level
  868. dwd Zash, So what do you do if your motor breaks?
  869. moparisthebest probably something boring like an oar
  870. Zash I guess I would have to convert it into a putt putt boat
  871. Zash I would also have to get a boat and a motor...
  872. arc what if you had a car onboard and could get it up on jacks
  873. moparisthebest change out the wheels for paddles like an old river boat?
  874. dwd arc, If he doesn't even have a boat he's got worse problems.
  875. narcode has left
  876. narcode has joined
  877. SamWhited arc: Like this (sort of)? https://www.youtube.com/watch?v=dyBl9vf8Td0
  878. arc thats true. Zash how will you hack up a boat to start with?
  879. Zash But why would I have a boat? Not really a water person.
  880. Zash I'd rather have cabin in the woods and some potatoes. Backhoe would come in handy then.
  881. arc Oh, I *really* doubt that you want to have cabin in the woods
  882. arc https://www.youtube.com/watch?v=NsIilFNNmkY
  883. ThurahT true, there are nicer things than a portal to a demi-god-demon
  884. daniel has left
  885. daniel has joined
  886. Zash Can't be worse than the mosquitoes
  887. arc i'll take mosquitos over the horrific monsters they send to kill you
  888. arc and what rises if EVERYONE fails
  889. moparisthebest I think I'd prefer the things I could kill with guns
  890. arc I think the scene of the japanese school children circling around and dispelling the demon is the best
  891. arc https://www.youtube.com/watch?v=IIE8Fq4Zm1E
  892. arc "The spirit of the demon will now live in the happy frog!" ... "How hard is it to kill a group of 9 year olds?"
  893. efrit has joined
  894. moparisthebest this has been an odd day in the xsf, went from talking about fashion, to boats rowed by backhoes, to demons in cabins in the woods
  895. arc blame me.
  896. moparisthebest with some xmpp sprinkled in :)
  897. arc yea there's XMPP involved, that's all that matters. That means we can charge lunch to the corporate card right?
  898. Alex has left
  899. Ge0rG blames arc.
  900. arc after all the work I did I realized this morning that the hash function isnt likely all that useful for embedded systems, and in 95%+ of the cases won't even get included in the binary
  901. arc embedded xmpp is unlikely to include text xml.
  902. Ge0rG It ain't no fun with the lags.
  903. arc the hash function is used pretty much, if not entirely exclusively for hashing text strings in order to find a cooresponding match on the string table
  904. arc anyone else have a problem that you dig too deep into a problem that you lose sight of the big picture?
  905. SamWhited oh yes… frequently.
  906. efrit has joined
  907. efrit has joined
  908. jubalh has left
  909. peter has left
  910. Ge0rG When I dig too deep into a problem I always encounter sub problems to which there is no documented solution on the Internets, but often many people having the same issue.
  911. MattJ Don't get me started, today has been one of those
  912. arc i hate that.
  913. Zash I still got some glibc in my eye from yesterday.
  914. arc or you dig deep enough that you realize its a problem caused by the language you're using that can't be fixed, just.. worked around
  915. MattJ e.g. the moment when I realised (after putting log statements all over the place) that the testing tool I was using was broken, and connecting to the wrong server
  916. MattJ (in production)
  917. Zash Why isn't getrandom() in glibc until like the latest bleeding edge version nobody has?
  918. MattJ and the rabbit hole just goes deeper
  919. MattJ and now I'm just looking for some utility that will read lines from stdin and send them somewhere as UDP packets
  920. MattJ and trying to pretend I don't need to write my own
  921. Zash netcat
  922. MattJ netcat failed on the "line" part
  923. arc my first "in office" job had two charming things; 1) a ban on coffee in the office (only green tea, because of management philosophy hogwash), and 2) "Eat Me" cookies in a sealed container in the break room for when you get trapped too deep in a rabbit hole
  924. jubalh has joined
  925. arc it took me far too long to realize the reference
  926. Zash hah
  927. goffi has left
  928. arc a also found that for every schema i could think of, bitpacked EXI is better, faster, and smaller binary than compressed EXI
  929. arc i didnt expect that.
  930. moparisthebest that's just a type of compression though isn't it?
  931. Zash What's compressed EXI?
  932. moparisthebest like it'd probably be equally susceptible to CRIME / BREACH type attacks?
  933. arc I guess you could call bitpacking a form ofcompression..
  934. arc Zash: so there's 4 modes for EXI; bitpacked, simple byte-aligned, pre-compression, and compression.
  935. arc byte-aligned is essentially the same as bitpacked but always padded to byte alignment, obviously
  936. Zash Can you explain them in terms of ASN.1 encoding schemes? :)
  937. arc compression is pre-compression plus DEFLATE
  938. Zash (that was a fun rabbit hole too)
  939. moparisthebest so which ones are secure under encryption? only pre-compression?
  940. arc pre-compression is byte-aligned, but with similar types of data grouped together on the stream. so eg all int values are together, all string values together, etc
  941. arc i wouldn't propose to know the answer to that moparisthebest
  942. jonasw MattJ: socat READLINE: UDP:?
  943. moparisthebest arc, probably should have someone figure it out before starting to use/promote it though?
  944. arc but the idea with pre-compression is that some form of compression will be applied on, eg, the TLS layer
  945. MattJ jonasw, I saw that, but READLINE seems to actually involve the readline library, i.e. it's intended for human input, not piping from another program
  946. jonasw MattJ: and STDIN doesn’t do the trick? :/
  947. jonasw *STDIO
  948. moparisthebest arc, I think most if not all TLS libs removed support for TLS level compression because it's woefully insecure
  949. arc moparisthebest: i can *barely* hold enough of the EXI specification in my head to work on it. i don't have room for encryption on top of it.
  950. Ge0rG New personal record. Sigh: 64 bytes from icmp_seq=9 ttl=53 time=377539 ms
  951. MattJ jonasw, only if they split on lines (which I see no indication of)
  952. jonasw meh
  953. moparisthebest arc, and you shouldn't have to consider it at all as long as you don't do anything that makes it insecure, compression being one of those things
  954. Ge0rG MattJ: I'd write a small loop with scapy.py
  955. MattJ I found a utility, it just needs the correct command-line arguments
  956. arc but i would assume if you consider compression insecure, eg DEFLATE, Brotli, etc, then you would prefer bitpacked over all options
  957. MattJ lua -e'u=require"socket".udp() for line in io.lines() do u:sendto(line, os.getenv"HOST",os.getenv"PORT") end'
  958. jonasw python3 -c 'import socket; s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM); while True: s.write(s.stdin.readline().rstrip("\n"))'?
  959. jonasw heh
  960. MattJ Lua wints ;)
  961. MattJ Lua wins ;)
  962. arc at this point my primary concerns are the size of the embedded image. cutting text-domain XML out reduces the binary size of the library in about half. removing compression library is a pretty big win too.
  963. jonasw moparisthebest: CRIME and BEAST are based on the fact that the packet size changes depending on previously sent content, I doubt that this is the case with bit-packed, from the sound of the name :)
  964. jonasw but I haven’t looked into it, at all
  965. arc wolfssl is pretty small
  966. jonasw soo… now I have that xep-ecaps2.xml here, let’s check out xep-0001.xml on what I need to do next.
  967. moparisthebest arc, well compression is insecure because if an attacker can add the string "ar" to the payload and the size doesn't increase, then add the string "arc" and it still doesn't change, and build up from there, it can figure out what's under the encryption
  968. moparisthebest so if bit packing works in a similar way, it's equally insecure
  969. Zash jonasw: Print it on paper, fold a paper airplane and aim for SamWhited :)
  970. moparisthebest right jonasw I don't know either, just saying it's probably something that should be determined
  971. arc moparisthebest: hmm. no i don't think so. so the only way you could reverse engineer it would be exploiting the string table.
  972. moparisthebest like it'd be another useless thing to work on if it was proven as insecure as compression arc , idk
  973. jonasw moparisthebest: it also probably does not matter much for IoT-thing <-> gatewaything.
  974. moparisthebest yea it's pretty obvious security doesn't matter when it comes to IoT haha
  975. jonasw like Ge0rG quoted yesterday: "The S in IoT is for security"
  976. SamWhited It would actually be pretty awesome if XEPs were submitted that way…
  977. arc moparisthebest: ok, so string values are stored in the string table. this refers to whole strings only, but eg a JID you're communicating with would be added to the string table and referenced by id.
  978. SamWhited Please change the font to OCR-A or something first so I can scan it back in though.
  979. jonasw SamWhited: because you would not have to do any work, as paper planes don’t travel several thousand km?
  980. SamWhited jonasw: Says you; that just means you're not building a big enough paper airplane!
  981. jonasw SamWhited: we could also try XMPP over RFC 1149
  982. SamWhited heh, indeed
  983. SamWhited My favorite part is that there are Errata for that one.
  984. jonasw there was an actual implementation
  985. moparisthebest ok arc so the full payload size would increase with the strings you added, say "arc" would increase it 3 bytes, *unless* that FULL string was already in there, then it wouldn't decrease at all? if I understood you correctly
  986. moparisthebest that at least would not let you incrementally guess strings like 'a' then 'ar' then 'arc' etc etc
  987. arc moparisthebest: so if you can send a string value containing a 3rd party JID that you want to know if that agent is already communicating with, AND you know the schema being used, then you can determine whether that agent has communicated with that JID already.
  988. moparisthebest like you I don't know enough to say without a doubt that makes BREACH or CRIME not a problem, but it seems better to me...
  989. arc moparisthebest: yes. I do not recall a method for partial or combined strings
  990. jonasw assuming you can observe the network traffic between those entities, which may only be within the local wifi
  991. Ge0rG RFC1149 would be faster than my current link.
  992. arc i'm still loading the spec back into my head. but i remember that as a fault.
  993. arc one of my criticisms of EXI actually is the lack of a "list" type
  994. moparisthebest I'd feel better if someone like xnyhps said they'd reviewed it and it looked good to them :)
  995. SamWhited eeew, I just decided I should actually print EXI and read it… but it goes on forever.
  996. arc this comes up in some XML schemas such as SVG, where paths are made of collections of floats, ints, and characters separated by spaces
  997. Zash Hm, I should look at what a printer costs
  998. arc SamWhited: yea its not light reading. I recommend https://www.w3.org/TR/exi-primer/ to start with
  999. SamWhited arc: Thanks
  1000. jonasw is there an email-adress where XEPs are supposed to go? the http://xmpp.org/xmpp-protocols/xmpp-extensions/submitting-a-xep/ page linked in XEP-1 404s
  1001. arc that gives a very nice overview without sucking you into the details
  1002. SamWhited jonasw: You can submit a PR on GitHub
  1003. jonasw Zash: nothing, just "google" for one and ask the owner kindly to send you the printouts :)
  1004. Ge0rG jonasw: you can make a PR of the XEP in inbox/
  1005. jonasw SamWhited: which puts my xep in the inbox/ dir?
  1006. jonasw right
  1007. SamWhited jonasw: Yup
  1008. arc you're younger than me, you might be able to handle it better, but ive had to segmentize the details so i dont get overwhelmed. its a lot to hold in your head at once
  1009. nicolas.verite has joined
  1010. SamWhited oh I doubt that; if you can't hold the entire spec in your head I doubt I have any chance
  1011. arc that's flattering but I doubt its true. age wears down your memory
  1012. SamWhited jonasw: See the other XEPs in there for naming, I *think* you don't want it to start with xep- for reasons that I can't remember… something, something tooling.
  1013. arc I'm turning 38.
  1014. nicolas.verite has left
  1015. jonasw yeah, figured that much
  1016. moparisthebest speaking of the inbox, some of those things are *ancient*, does or should it ever be cleaned out?
  1017. jonasw am I the only one *always* falling for the delay github has with showing the "you have pushed to branch X n minutes ago, do you want to pull request?", hitting F5, seeing it appear before the page has reloaded, click compare & pull request and then the page reloads and you’re back to square one?
  1018. SamWhited I think the editor readme says it never gets cleaned out. We don't want to break old pages.
  1019. SamWhited Oh yah, I do that all the time
  1020. daniel has left
  1021. moparisthebest break pages? do they get rendered?
  1022. moparisthebest or you just mean links to the xml ?
  1023. SamWhited moparisthebest: they get rendered on the site, just like actual XEPs
  1024. moparisthebest I didn't know that
  1025. jonasw SamWhited: https://github.com/xsf/xeps/pull/440 consider yourself paperplaned also: https://www.youtube.com/watch?v=Co452wJ-3Lg (Long Distance Calling - Black Paper Planes) (Music)
  1026. moparisthebest https://xmpp.org/extensions/inbox/
  1027. moparisthebest awesome
  1028. SamWhited moparisthebest: Also, ¿Porque no los dos?
  1029. SamWhited (I couldn't find the adorable little girl gif to send, so you just get text)
  1030. arc given the current status of IoT I think I might actually focus for a few weeks on *just* the schema compiler and get a XEP out for it. the one thing im missing for the XEP is a definition for the schema of the schema
  1031. SamWhited > the schema of the schema
  1032. SamWhited I'm so sorry…
  1033. jonasw that meta
  1034. jonasw arc: schemas like in XML Schemas for XEPs?
  1035. jonasw how are you going to deal with the mostly incorrect or inaccurate schemas out here in XEPs?
  1036. jonasw well, probably not mostly.
  1037. jonasw but they’re not normative, I’ve been told once.
  1038. arc yea, in order for a client to transfer to the server the schema that it wants to use, which the server doesnt already have, it needs to be able to dump the EXI-encoded schema to the server. and that needs to be defined since every client and server needs to be able to understand it
  1039. arc so the EXI schema for the EXI schema needs to be defined in the XEP
  1040. jonasw that’s meta.
  1041. arc its why I havent touched the XEP yet.
  1042. arc but it needs to happen, and sooner the better
  1043. jonasw hands arc a large bag of tea.
  1044. moparisthebest sounds like he needs something harder to me
  1045. arc i havent written a line of code in a month. i'm up for it.
  1046. moparisthebest maybe 160+ proof
  1047. jonasw there are too many movies showing that coke doesn’t end well.
  1048. jonasw oh
  1049. jonasw nevermind.
  1050. Zash 160+ proof tea?
  1051. arc oh I have a copeous amount of cannabis
  1052. nicolas.verite has joined
  1053. arc there's a "Balmer limit" to cannabis too, though.
  1054. jonasw heh
  1055. arc er "Ballmer Peak" https://xkcd.com/323/
  1056. jonasw :D
  1057. dwd jonasw, That your protoxep? ecaps2?
  1058. jonasw dwd yes
  1059. arc though its more a cliff. more is better, to a point, and then rapid degeneration. its around the point that you start feeling like time is on a bungee chord
  1060. dwd jonasw, I think you win the prize for using every obscure separator character in the ASCII subset.
  1061. jonasw dwd: thanks :D
  1062. jonasw they were barely enough, I was worried I’d also need EOT
  1063. dwd jonasw, Can those appear in XML?
  1064. jonasw dwd: no.
  1065. jonasw XML forbids control characters except htab, newline and carriage return
  1066. jonasw (those between 0x00 and 0x20 at least)
  1067. Ge0rG Hm. Thereis an IoT thread going on with me in Cc. I wonder who deemed me so important and why.
  1068. dwd jonasw, Perfect. Nicely done.
  1069. jonasw dwd: thanks! :)
  1070. arc Ge0rG: you are the chosen one for IoT. you must lead the way, because everyone knows nobody else knows it
  1071. dwd arc, IoT is different and special from everything else.
  1072. Ge0rG arc: this must be a SCAM.
  1073. jubalh has left
  1074. arc I'm humored by these IoT "Meetups" full of VCs who think IoT means a standalone device that communicates solely with their service, like a modern wifi-connected thermometer that you can control with your phone through their online service
  1075. mimi89999 has left
  1076. Zash jonasw: "Cabability"
  1077. Flow has joined
  1078. arc in that ideology things like protocol standards don't matter. they mostly use a HTTP ReST API between the device an their service
  1079. dwd arc, The sad thing is that most of these devices are going that way.
  1080. goffi has joined
  1081. jonasw Zash: that’s only because you cannot use entities in <dt>! thanks, fixed locally, waiting for more of these stupid typos before I push another commit.
  1082. arc dwd: only because of the novelty of it. we need to catch up to steer course
  1083. dwd arc, And worse, those that aren't suffer - my iKettle, for instance, is controlled locally, but people want to integrate - and they have to integrate via cloud services now.
  1084. Zash dwd: Like the e-reader thing requiring an account with some online service to display text?
  1085. mimi89999 has joined
  1086. arc why does your .. what i assume is a water kettle.. need remote access?
  1087. arc that's my other IoT rant that I won't get into. not everything needs a chip in it. bloody Target selling basketballs with a chip in it to count bounces and report them to your phone via bluetooth
  1088. dwd arc, So I can set it to boil from my desk, and - more importantly - so I get a notification on my smartwatch when it does.
  1089. arc my basketball does not need bluetooth.
  1090. dwd arc, I understand. You're wanting it to use zigbee instead?
  1091. arc dwd: lol
  1092. jonasw +1
  1093. arc dwd: you're doing well roleplaying an IoT VC!
  1094. dwd arc, I'm just like a VC, except without the money.
  1095. arc oh so you're homeless? ;-)
  1096. Zash dwd: My water boiler has this amazing wireless notification protocol called "loud click and the sound of boiling water slowly fading away"
  1097. moparisthebest a basketball with a bounce counting chip?
  1098. SamWhited mine makes a sort of loud whistling noise when the water is ready
  1099. dwd Zash, Well. I can actually hear the kettle from my desk, in fairness.
  1100. moparisthebest I'd think you were joking if I didn't know better
  1101. xnyhps moparisthebest: I didn't read much of the backlog, but the DEFLATE option for EXI very likely is vulnerable, without, probably.
  1102. Zash Weren't there baseballs with accelerometers in them to measure how hard they got hit?
  1103. SamWhited it sounds vaguely like air being forced through a small round opening
  1104. moparisthebest maybe I will move to a cabin in the woods like Zash :)
  1105. jonasw Zash: uh, I once had an oven which had the protocol of "if you don’t take care the water boils over the pots edge and flows down the sides into the oven tripping the RCA and thus cutting of your power"
  1106. arc we have a bluetooth enabled pressure cooker. it has a bluetooth range of maybe 8 feet, 10 if you're lucky. the app you need to communicate with it has basically a clone of the physical interface on the machine
  1107. moparisthebest xnyhps, yea any compression like deflate/brotli/etc would be, the question was whether the 'bitpacking' optimization without compression would be
  1108. moparisthebest or, without what we normally call compression
  1109. moparisthebest I suck at wording
  1110. Zash moparisthebest: Call it PER
  1111. arc xnyhps: DEFLATE only or newer methods like Brotli too
  1112. dwd moparisthebest, EXI in bitpacking mode doesn't have back-references, which is the basic issue.
  1113. Mancho has left
  1114. arc but there is the string table, which I think would argue could have issues, and that's in all modes.
  1115. arc your own JID, for example, will be on the string table. so if someone could send you a jid as an attribute value, i believe it could under specific conditions, confirm if that is your JID or not.
  1116. Zash jonasw: 'the i;octet' intentional or typo?
  1117. arc or if your device is communicating with a server, and they know which IP you're communicating with but not the specific hostname..
  1118. dwd Zash, ACAP Comparator. Not a typo.
  1119. jonasw Zash: that’s how it’s called. not my idea :/
  1120. dwd got his ACAP server compiling again the other day because someone actually wanted to use it.
  1121. Lance jonasw: ^5 on the XEP, this looks awesome
  1122. jonasw Lance: thanks
  1123. SouL has joined
  1124. SouL has joined
  1125. SouL has joined
  1126. SouL has joined
  1127. arc but given what moparisthebest described earlier I think that's a lot less of a security risk, since you couldn't pull out substrings to progressively reverse engineer, and the specific conditions are more difficult to otherwise achieve
  1128. Zash jonasw, dwd: Well it could also have been an artifact of the conversion to epub I did
  1129. moparisthebest right I think you couldn't progressivly build up by guessing 1 character at a time that way arc
  1130. dwd Zash, RFC 4790, now, extracted from ACAP. My mistake, I'm behind the times.
  1131. xnyhps If you're not compressing the password anyway, the thread model becomes rather vague.
  1132. moparisthebest which again sounds better/more secure to me, but probably not as secure as not being able to guess at all? I'm sure someone could come up with an attack
  1133. xnyhps Finding out someone's JID requires quite a lot of access for not that much information.
  1134. arc yea no the string table refers to whole qnames and string values
  1135. xnyhps Or who someone is talking to, etc.
  1136. arc yea its not exposing, say, integer values coming from a sensor
  1137. dwd Surely you'd need to address things to them? So at best, you're able to try to guess if someone who you already know by IP address, who is also in a chatroom with you, is the Jid you think they are?
  1138. xnyhps dwd: Yeah, and you probably have much easier ways to do that.
  1139. arc well it only confirms that they're a JID in your string table. it wouldnt expose, necessarily, if they were that JID vs had talked to that JID
  1140. jere has left
  1141. arc EXI doesn't "understand" XMPP beyond the schema you provide it.
  1142. arc i think it might be possible under certain conditions for an IoT vendor to craft an insecure schema tho
  1143. arc for example sensor data should be fixed length
  1144. dwd TBH, I don't think that the use of deflate in XMPP is a general problem anyway. In extremely high-risk cases, perhaps, and if you're dumb enough to use PLAIN and TLS compression.
  1145. arc in that way EXI is more secure than text xml in that integer should be a fixed length, where a string representing an integer is not
  1146. nicolas.verite has left
  1147. jonasw Zash: do you have a diff of xep 369 from 0.8 to 0.8.1 from your fancy difftool at hand?
  1148. arc for security any XEP for sensor data, it should be actually put in the security section that float and integer values should be zero-padded to their maximum value to decrease risk of data leakage
  1149. jonasw zero-padded to their maximum value? how does zero-padding to maximum value work?
  1150. arc if all the stanzas from a device are the same except being X length, X+1, X+2, X+3, etc based on the scale of a specific integer value, you can determine whether that value is 0-9, 10-99, 100-999, etc
  1151. Zash Don't EXI basically work like if you were to generate optimal C structs for all the things, then send that down the wire?
  1152. arc so if the maximum value is, say, 255, it should send as '001' '002' etc
  1153. jonasw arc: wait, leading zeros are encoded?
  1154. arc jonasw: for text xml
  1155. moparisthebest if it's a string it has to be
  1156. arc what i was saying is this is a weakness in text XML that EXI doesn't have
  1157. moparisthebest but even if not most things send integers in a set number of bytes
  1158. arc sure, but eg, a light sensor could flip between 0 and 100, and that would make it obvious what the state was
  1159. jonasw ah I thought you were talking about EXI already, of which I assumed that it encodes it as binary integer
  1160. arc people do not generally encode 0 as <light value="000"/>
  1161. arc yea it encodes as a binary integer
  1162. jonasw is it a variable-width encoding?
  1163. arc i would have to look that up again, i havent touched that part in awhile
  1164. arc i know you can constrain the range of most values
  1165. jonasw that would have the same issue then, and it cannot be worked around with leading zeros
  1166. arc well i don't believe its variable width per value, i think its only variable width by schema. if the schema says the integer value of a given attribute is 0 to 127, it'll do the right thing.
  1167. arc i havent touched that since november tho, id have to read up on it again
  1168. kaboom has left
  1169. jonasw no worries
  1170. kaboom has joined
  1171. arc but im like 98% certain that an integer, float, etc value is fixed width from stanza to stanza
  1172. moparisthebest the question is if an integer can be 0 to 65535, it obviously encodes 60000 as 2 bytes, but does it encode 120 as 1 byte or 2 ?
  1173. kaboom has left
  1174. moparisthebest that'd be a type of compression too
  1175. kaboom has joined
  1176. arc i believe that if an integer is a short it will always be a short.
  1177. moparisthebest could leak something, idk
  1178. arc you're right it could. but i dont think it does that.
  1179. moparisthebest that's how everything I can remember seeing works yea
  1180. kaboom has left
  1181. arc and when we draft EXI 2.0 that is something that should be definitely put on the table as a concern
  1182. waqas has joined
  1183. moparisthebest in general it seems like most things pre-2013 kind of took security as an after thought and might need to be revisted today
  1184. arc so far the only thing I would like to add to EXI is being able to encode a delineator-separated sequence like is used in SVG
  1185. arc if we had that, the SVG world would be all over it
  1186. arc being able to encode paths more efficiently would be a major breakthrough.
  1187. Zash jonasw: You happen to know which revisions that correspond to?
  1188. jonasw Zash: nevermind, I diffed it locally
  1189. arc my initial interest in EXI came from getting tired of hearing about why X chat system doesn't use XMPP, but a binary protocol, for efficiency on mobile / etc
  1190. arc and the same is true for SVG vs proprietary vector formats
  1191. jonasw I’m going to bring up the <feature xmlns="…" /> stuff on standards@ again.
  1192. winfried has left
  1193. moparisthebest my complaint about SVG is that most things just arbitrarily execute javascript from them
  1194. moparisthebest not a great security feature
  1195. Ge0rG I wish I'd get some more insight from The Elders on carbonated body-less normal messages...
  1196. arc moparisthebest: the same is true for XHTML-IM
  1197. moparisthebest yep arc
  1198. jonasw script content is not allowed in XHTML-IM…
  1199. moparisthebest but like on my discourse instance I enabled common image format uploads, for example png, jpg, gif, and svg
  1200. jonasw (reminds me, I wanted to polish up my XSLT which strips off anything not allowed as per xep 71)
  1201. moparisthebest then, luckily it was a friend, uploaded an svg with some XSS javascript to steal cookies and showed me :)
  1202. jonasw are there any xslt/xhtml wizards here?
  1203. moparisthebest I'd assume this is where the xslt wizards live :) not me though
  1204. Lance jonasw: stuff like <a href="javascript:alert(1)"> can still exist even without allowing <script> elements
  1205. jonasw Lance: haven’t thought of hrefs, good point
  1206. nicolas.verite has joined
  1207. jonasw but that is usually easily filtered depending on the webview used
  1208. dwd Lance, Dependsing on CSP.
  1209. moparisthebest a blacklist would be a never ending hole
  1210. nicolas.verite has left
  1211. jonasw moparisthebest: that’s why I’m using the whitelist from the XEP.
  1212. dwd moparisthebest, No, I mean Content Security Policy stuff would prevent inline javascript from working.
  1213. moparisthebest I'm not positive you can do that kind of thing with xslt
  1214. moparisthebest yea dwd, not sure how you get/set that with something like xhtml-im
  1215. moparisthebest surely if there was a handy .noJavascript() method they would have called it
  1216. arc XSLT could do it. You shouldn't do this with XSLT.
  1217. arc no matter how hard you try it will always leave a hole
  1218. jonasw arc: what exactly?
  1219. arc jonasw: filtering XML/HTML
  1220. jonasw hm
  1221. jonasw how else are you going to do it?
  1222. jonasw also, I think that this should be pretty sound: https://github.com/horazont/aioxmpp/blob/devel/data/xhtml-im-sanitise.xsl (leaving aside the @href issue)
  1223. arc I'm in the camp for saying XHTML-IM shouldn't be supported
  1224. arc I wasn't. now I am.
  1225. moparisthebest I agree
  1226. jonasw arc: I also do not like XHTML-IM.
  1227. jonasw but then again, there are people who want rich text in their IM clients.
  1228. Zash BBcode
  1229. moparisthebest you can have rich text without html
  1230. jonasw moparisthebest: is there a XEP for that?
  1231. moparisthebest not that I know of :)
  1232. arc https://plus.google.com/+ArcRiley/posts/BXpPxYRcRim
  1233. moparisthebest someone was advocating markdown somewhat recently
  1234. jonasw (actually, a body type="text/markdown" or type="text/rst" would be great; just make sure your markdown/rst doesn’t pass through HTML…)
  1235. moparisthebest right :) or it starts all over
  1236. bjc has joined
  1237. Zash Wasn't Markdown is defined as a HTML superset?
  1238. jonasw yes, Zash
  1239. arc i dont think thats still a complete solution.
  1240. Zash Nice things, you can't have them
  1241. arc the <a href="javascript:"> links will leak through
  1242. moparisthebest well as Zash said bbcode it is then
  1243. Lance plus the issues with multiple flavors of markdown, etc
  1244. moparisthebest I'm sure there are plenty of libraries already ready to use
  1245. moparisthebest in php...
  1246. jonasw gah, bbcode is annoying too.
  1247. Zash There can be only one! (And it is pandoc)
  1248. Zash <3 pandoc
  1249. moparisthebest as the saying goes annoying or insecure pick one
  1250. moparisthebest I probably just made that saying up
  1251. arc Lance: btw one thing i love is the stream framing from websockets? the added overhead for jabber:client namespaces is completely eliminated in EXI
  1252. vurpo has left
  1253. vurpo has joined
  1254. Lance yes!
  1255. arc if back then when that was being vexed over, if someone had said "in 5 years that won't be an issue anyway because EXI" it would have made the decision much easier
  1256. Flow jonasw: I do think that xep115 has hash agility, and signalling the caps using a second hash algo wouldn't require a ns bump
  1257. moparisthebest re: markdown only one markdown I know has a defined spec, http://commonmark.org/
  1258. arc good lord, i cant even use libxml2 anymore. its just painful.
  1259. jonasw Flow: there was some mailing list post where people discussed otherwise, in the thread Tobias linked I think
  1260. nicolas.verite has joined
  1261. arc schema-based xml coding makes so much more sense
  1262. moparisthebest so I think if you mandated commonmark with the exception of no support for http://spec.commonmark.org/0.27/#html-blocks it might be easier, would need more thought
  1263. Flow nothing prevents clients from using a second hash mech, as long as they still send the mandatory to implement one
  1264. mimi89999 has left
  1265. Zash Flow: You mean sending multiple <c> elements?
  1266. Flow Zash: yep
  1267. Zash Flow: Doesn't fix the algorithm for producing the hash tho
  1268. Flow Zash: Right
  1269. goffi has left
  1270. Flow But I don't aggree with the statement that the change of the hash function of xep115 requires a namespace bump in ecaps2
  1271. Flow jonasw: Any particular reason for going with a new xep instead of updating xep115?
  1272. jonasw Flow: I asked here, and people suggested that a clean new xep is the better way to go.
  1273. Flow jonasw: i see
  1274. Lance IIRC, it was so we could flag 115 as obsoleted by the new one
  1275. Kev jonasw: Well, I think I suggested that a new XEP was the wrong way to go, and updating 115 was preferable :)
  1276. nicolas.verite has left
  1277. Lance as an encouragement to devs to upgrade
  1278. jonasw Flow: to be clear, I’m happy to drop -xxxx and merge the changes into 115 if council prefers that.
  1279. Ge0rG also to prevent people from doing some compat with the old stuff badly.
  1280. Tobias has left
  1281. jonasw but considering that it were council people who suggested to go with a new xep, I followed that suggestion.
  1282. Flow pfff, council people are not always right ;)
  1283. Lance not even close :)
  1284. jonasw Flow: they’re, from my understanding, those who decide whether a patch to XEP-115 will be accepted though.
  1285. Kev I think it led to the wrong outcome in this case, but I can't fault the logic of taking advice from Council in general.
  1286. Flow Sure, asking for feedback is always a good idea.
  1287. SamWhited It seems like a good idea to me to go with a new XEP in this case just to encourage people not to try and have backwards compatibility with the old one (which rather defeats the purpose of having a new one), but I don't feel strongly about it and could be convinced either way.
  1288. jonasw in any case, I’m off for tonight. may read the backlog if highlighted
  1289. SamWhited defeats the purpose in this case, I mean, since it's a security issue. Backwards compatibility is sometimes a good idea.
  1290. Kev SamWhited: 115 is a core dependency of a *lot* of XEPs. I don't think replacing it is warranted in this case.
  1291. SamWhited yah, that is tricky, not sure what to do about that. Either way tough we'd have to solve that problem and I suspect the two will have to coexist for a while.
  1292. jonasw has left
  1293. Flow Kev: The question is: Is xep115 is dependency or xep115 *and* the current namespace of xep115?
  1294. Kev Well, at least for the dependency, it's straightforward, as the dependency is just on the latest version of 115.
  1295. Kev Whether it should be or not is another matter, of course.
  1296. Flow This is a fundamental question as we will find ourselves in the situation more and more in the future. For example with the XEPs depending on xep300
  1297. Lance Yeah, aside from PEP, most of the "dependency" for these XEPs is just the fact that it optimizes the true dependency on disco#info
  1298. Zash Do we need a BCP kind of thing?
  1299. nicolas.verite has joined
  1300. Flow Do we want to update all consumers of xep300 if it receives an incompatible update?
  1301. Flow Or do we want to sepcify a dependency as xep number *and* "namespace", and update the consumers one after another?
  1302. Flow Lance: Well said. I hate that some XEPs give you the impression that xep115 is an alternative to xep30
  1303. Flow Zash: BCP?
  1304. Zash Flow: IETF thing, like a pointer to the latest RFC on some specific topic.
  1305. Lance Best Current Practices
  1306. Flow ahh berst current practice
  1307. Zash Flow: RFCs never change, but a BCP may be changed to point to a new RFC
  1308. Flow isn't the the opposite what XEP do?
  1309. Flow i.e., they do change, so we need a pointer to a fixed revision of a xep
  1310. kalkin has left
  1311. Flow (which we have in our attic btw)
  1312. Zash Final XEPs are probably the closest to how RFCs work
  1313. Flow true
  1314. uc has left
  1315. uc has joined
  1316. Flow ahh, enough DNSSEC fun for today. I follow jonasw to the realm of sweet dreams where everthing is like it should be
  1317. nicolas.verite has left
  1318. arc its too bad SRV records don't allow additional information
  1319. Ge0rG Flow: and dreem of jumping and colliding SHA1eep?
  1320. Lance arc: what kind of additional info?
  1321. arc i havent touch DNS resolution in awhile, can you send a single request for multiple SRV records?
  1322. Mancho has left
  1323. arc Lance: for example, the server capability, protocol version, etc
  1324. Zash arc: Multiple how?
  1325. moparisthebest with the same name sure
  1326. Lance arc: whether or not to start with EXI, hrm?
  1327. arc Lance: yes, or TLS, or etc
  1328. moparisthebest I suppose that'd be what TXT records are for arc
  1329. arc yes I know there's a XEP for TLS
  1330. moparisthebest or encode TLS or not TLS in the name like I did haha
  1331. moparisthebest that would easily explode though if you try to encode more
  1332. arc moparisthebest: yes, but doesnt that require multiple lookups? or can the two alternative names be requested at once?
  1333. moparisthebest now we have _xmpp-client, and _xmpps-client, we don't want _xmppse-client and _xmppe-client for exi for example too, probably
  1334. Zash _xmpp{s,}-{client-server}{,-exi}._tcp
  1335. arc yea. so.. part of EXI is the first byte of an EXI stream is never a valid text unicode string by any enconding
  1336. moparisthebest yea arc that's 2 seperate lookups
  1337. arc one way is SRV records. the other way is to just punch EXI at the server, and it either responds with EXI or not
  1338. moparisthebest arc, uh what about ALPN I think that neatly solves your problem?
  1339. arc ALPN?
  1340. moparisthebest tls extension, tells it the protocol(s) you'd like to speak
  1341. moparisthebest Application Layer Protocol Negotiation ?
  1342. moparisthebest http2 uses it
  1343. arc oh, yes that could work
  1344. Flow has left
  1345. arc ive seen this before, just forgot about it
  1346. nicolas.verite has joined
  1347. moparisthebest xep-0368 uses it too, but optionally
  1348. nicolas.verite has left
  1349. Mancho has left
  1350. arc yea i saw this mentioned somewhere about http2 awhile ago. so, what does the payload look like
  1351. Zash A text string in a TLS extension
  1352. Ge0rG a byte array.
  1353. Ge0rG because text strings are imPRECISe
  1354. arc ok so we could define a meaning for that which is extensible to other things
  1355. moparisthebest yea Ge0rG is more correct it's a precisely defined sequence of bytes
  1356. arc the key is it must be possible to use EXI without support for text XML
  1357. moparisthebest so basically an EXI xep could depend on xmpps-* records from xep-0368, and send it's own custom ALPN protocol sequence
  1358. moparisthebest or optionally, both xmpp-client and xmpp-exi-client or whatever
  1359. moparisthebest and server would say I can speak X
  1360. moparisthebest at which point you'd proceed or try next SRV record
  1361. Mancho has left
  1362. arc i *hope* that server support would be well deployed before its an issue
  1363. arc oh interesting. it doesnt look like Contiki OS supports ALPN
  1364. Lance arc: also, once the EXI XEP is decent, I'd be happy to help with making a proper xmpp-exi websocket binary subprotocol
  1365. arc Lance: absolutely. but lets get a javascript library for it first ;-)
  1366. arc from the times its been brought up i think the right path is to kill 0322 and start fresh. the one up there is utter nonsense from an implementers point of view
  1367. arc 50% of the document is re-implementing EXI header format in a less compact form
  1368. arc and it doesn't even really get into how to handle a "pure" EXI stream (not starting with text XML)
  1369. nicolas.verite has joined
  1370. sezuan has left
  1371. arc the mechanism I think is best is this: 1) Client sends EXI header with <open> framing. in the header, the schemaId field contains a hash identifier for the schema it wants to use, generally in sha256: URI format, but this allows future hash values to be used
  1372. arc 2) if server doesn't already have that schema, it responds with EXI header for a "default" stream using the schema-schema, and gives an error that the requested schema must be provided
  1373. arc 3) if client receives such an error, it will restart its EXI stream with the same schema and transfer that schema 4) server responds with the hash as it understands it wishes the client to use in the future (generally, sha256: URI) 5) stream restarts (or continues after step 1, if server responded with the EXI header for the same schema) normally
  1374. arc the error-restart method should only be needed after a server is wiped, upgraded, or the first time a client of a specific version connects to it. sha256 is suggested to minimize this (large servers will already have the schema on file) but can be boosted in the future
  1375. arc it otherwise uses the same framing as websocket.
  1376. arc vs XEP 0322 it removes the issues with asking the server to download schemas from a HTTP resource (eg, using XMPP servers to multiply ddos attacks on webservices), removes the need for a text XML parser, reduces handshakes to initiate a typical connection, and removes redundant negotiation
  1377. moparisthebest so it just sends a hash of the schema it wants to use?
  1378. moparisthebest no other info about it?
  1379. arc yes in the EXI header field for schemaId. i believe the hash URI standard allows for length too
  1380. moparisthebest I was going to ask what stops a malicious client from uploading a 10gb schema
  1381. arc if the hash isnt known by the server, it asks the client to transfer the whole thing, and then the server gives the client a URI to refer to that schema in the future - which might be a newer hash
  1382. arc moparisthebest: the server should cut it off at some point obviously. schema should never be anywhere near that big, especially EXI encoded.
  1383. arc i mean you could make the same claim for what stops a client from sending a 10g <stream:stream opening element with a gazillion attributes
  1384. moparisthebest that is true
  1385. moparisthebest I wonder what current servers do with that hehe
  1386. moparisthebest or clients
  1387. arc with EXI? the few experimental ones use XEP 0322
  1388. arc i am not aware of EXI being used in production anywhere tho
  1389. arc the only complete implementation of EXI I'm aware of is written in Java
  1390. nicolas.verite has left
  1391. arc my libexi will be #2.
  1392. moparisthebest oh I meant I wonder what current servers or clients do with 10 gigabyte <stream:stream xml
  1393. arc oh, that's a good question
  1394. moparisthebest evil me wants to try it out
  1395. arc I'm willing to bet at least one will catch on fire
  1396. moparisthebest not at a production server of course other than mine :)
  1397. moparisthebest I'm guessing some are protected by a naive "no xml will contain > 10m so that's my buffer size"
  1398. moparisthebest or similar, but yea, testing time
  1399. arc well id bet actually that expat or libxml2 will dutifully attempt to parse it regardless.
  1400. SamWhited What is realistically the biggest packet size a server should expect? Not more than a couple of kilobytes surely?
  1401. arc SamWhited: with HTTP over XMPP it could be more. isnt there a way for a MTU to be set?
  1402. Kev Given the minimum maximum stanza size is 10k, no, a bit more than that.
  1403. Kev Depending what you mean by 'packet'.
  1404. arc i assume stanza
  1405. SamWhited yah, I don't know what I meant by packet… "start stream tag or any second level element" I suppose
  1406. arc amount of data in the XML parser which is not yet returned to the client?
  1407. arc er, application
  1408. arc moparisthebest: this is a good secure case to note
  1409. arc another issue servers might want to look out for is flooding it with new schemas. an LRU cache should be used to keep the number of schema from being pushed out of control by an attacker
  1410. daniel has left
  1411. moparisthebest it might or might not matter, but it could be a bit racy
  1412. moparisthebest like if 10000 iot devices all connect at the same time, request the same hash, server doesn't have it
  1413. arc yea disk size. but you can flood that with logs too
  1414. moparisthebest I guess they all simultaneously upload it?
  1415. nicolas.verite has joined
  1416. arc that sounds like a crazy race condition
  1417. arc actually no, that'd almost never happen because each one has to be provisioned right?
  1418. moparisthebest it seems like it'd happen when you reboot the server or something though
  1419. arc i mean almost never happen that two try to send in the same schema at once. and one would hope the server can handle that well
  1420. arc oh, true. or upgrade it such that it wants to wipe the cache
  1421. moparisthebest maybe something like that
  1422. moparisthebest maybe you block the others while a few are uploading or something?
  1423. moparisthebest servers might be able to do something smartly
  1424. arc if a server policy is to, eg, use a SHA512 for added security because the operator considers SHA256 weak, even if it "has" the schema on disk it would need clients to transmit it in order to give it the hash that it wants
  1425. arc the schema shouldnt be large. thats why EXI encoding too.
  1426. moparisthebest I kind of assumed once a schema is uploaded the server would store it along with *all* the hashes
  1427. arc it could do that too.
  1428. moparisthebest anyway I'm off here for the day :) have a good one
  1429. arc so if a newer client asks for a sha512: right off the bat the server can respond "correctly"
  1430. arc all the server MUST do is return the schemaId it would like the client to refer to this schema with in the future. it SHOULD return with a hash URL, and it SHOULD record and handle any hash URL by any method the server considers secure
  1431. arc so that clients connecting to the server for the first time using the same schema as another client of the same model, can do so without having to send the schema first.
  1432. moparisthebest any reason it just wouldn't always use the hash?
  1433. arc #futurehash
  1434. moparisthebest that seems like the only way you could be safe knowing you were both talking about the same thing
  1435. arc allow the server to support future hash mechanisms without clients needing to understand them
  1436. arc a client sends a sha256: URI. the server responds to uploading it with a sha512: uri. client records and uses what the server gave it. the sha256: URI the client started with a guess. if sha512: were to become a new standard every client could use it.
  1437. arc otherwise a client connecting to a server for the first time would just start with the default schema and send the schema in order to get the identifier. which could become a bit much.
  1438. Zash has left
  1439. arc in 2017 i think we all consider sha256 strong. 2020 who knows
  1440. nicolas.verite has left
  1441. Zash has joined
  1442. arc this is just me spitballing though.
  1443. Zash has joined
  1444. moparisthebest so maybe a server MUST respond with a hash, it MUST respond with the hash in the same algorithm the client sent unless it doesn't understand that algorithm, in which case it MUST respond with the hash in the 'strongest' algorithm the server supports as decided by the server
  1445. arc that has some odd implications too. the hash itself is added weight for every connection. if 256 is considered enough, it should use 256.
  1446. arc 802.15.4 devices have an effective MTU of around 100 bytes, and over 6lowpan packet fragmentation can cause real connectivity issues. its best to keep the EXI-encoded stanza payload under 100 bytes
  1447. nicolas.verite has joined
  1448. arc the exi header with a sha256 uri consumes almost 100 bytes by itself, iirc
  1449. arc if its just <open> though its fine
  1450. arc i imagine #futurehash is more likely to be used over 802.11ah or similar newer, low-power protocol though which isnt necessarily subjected to the same constraints
  1451. kalkin has left
  1452. arc in some cities right now, every bus is driving around with a 802.15.4 transceiver in a weather-proof plastic shell and a tiny solar cell glued to the top of the bus, rechargable battery, recording and sending realtime air quality data through a makeshift mesh network using, IIRC, some MQTT-based protocol
  1453. arc since they use 2.4ghz the buses are regularly delinked from the mesh network due to excessive frame collisions and inability to return pings, so restarting a stream on reconnect while under pressure is a real thing
  1454. arc fragmentation multiplies the problem in those cases.
  1455. nicolas.verite has left
  1456. intosi has joined
  1457. SouL has joined
  1458. intosi has left
  1459. jere has joined
  1460. SamWhited has left
  1461. suzyo has left
  1462. moparisthebest has left
  1463. moparisthebest has joined
  1464. waqas has left
  1465. waqas has joined
  1466. Zash has left
  1467. nicolas.verite has joined