-
jonas’
1) Roll Call
-
daniel
Hi
-
Zash
Ohai
-
dwd
Afternoon!
-
Ge0rG
Good morning
-
jonas’
\o/
-
jonas’
2) Agenda Bashing
-
jonas’
anything?
-
Zash
Bash it!
-
jonas’
\o/
-
jonas’
3) Editor’s Update
-
jonas’
- Proposed XMPP Extensions: - Implicit WebSocket Endpoints
-
jonas’
there’s already a good amount of discussion ongoing about that one on-list
-
jonas’
speaking of which
-
jonas’
4) Items for Voting
-
jonas’
4a) Proposed XMPP Extension: Implicit WebSocket Endpoints URL: https://xmpp.org/extensions/inbox/xep-iwe.html Abstract: This document specifies implicit connection endpoints for XMPP over WebSocket (RFC 7395).
-
jonas’
as you might’ve guessed, I hadn’t come around yet to read it, so I’m on-list
-
daniel
I'm not the biggest fan
-
Ge0rG
Yeah, daniel you brought up a good point on list
-
Ge0rG
and haproxy on yax.im:5222 tends to agree
-
daniel
I think I might be less oppossed to a XEP called "Recommendation for default port and path for websocket connections" informational XEP
-
daniel
which would address the point Sunny raised
-
daniel
and I do agree with his first paragraph I guess
-
dwd
Would that mean somebody running around and insisting every XMPP server changed their defaults?
-
daniel
sorry misspelled your name
-
daniel
dwd, yes
-
daniel
but the proposed XEP even more so I'm afraid
-
daniel
that's why I've put the "*recommendation* for default" in the title
-
daniel
to make it clear that it's just that
-
daniel
we can let it pan on on the list for a while I guess?
-
jonas’
yes
-
Zash
on-list
-
dwd
I'm not sure we want to encourage anyone to listen on non-TLS websockets these days.
-
Ge0rG
on-list
-
sonny
daniel, no problem - sounds good to me so far
-
daniel
dwd, that too
-
dwd
Which is ironic considering they only exist because I argued for them. :-)
-
Ge0rG
dwd: I think the only reason would be for local development and CI/CD, but maybe there is a less inelegant solution for those
-
Zash
I'm skeptical, the no-SRV fallback thing seems like a mistake in hindsight, should we be repeating it?
-
jonas’
Zash, I tend to agree
-
jonas’
it causes annoying issues
-
Zash
But does it qualify for Experimental?
-
jonas’
no idea, I’m still on-list
-
daniel
Zash. yes that's what I said on list.
-
Zash
daniel, I saw, and I agree.
-
daniel
but i think what i wrote above might be some sort of compromise because sonny does have a bit of a point
-
dwd
Right, so broadly, I think I'll veto, after skimming this. I'll post to the list on why, but as a summary:
-
sonny
I understand that ultimately the use case both for me and the editor is actually localhost/development so ws://service:5280/.well-known/xmpp-websocket would be fine there
-
Ge0rG
159 of the 2726 client connections to yax.im use the non-SRV fallback.
-
daniel
Ge0rG, yes we can confirm ~10%
-
daniel
last time i checked
-
Zash
Pragmatism?
-
dwd
* Non-TLS websockets seem bad. * A "suck it and see" approach seems not something we want to encourage. * It's highly restrictive having the Websocket default to the same domain and a different port.
-
daniel
yes I was going to be +0 at best
-
Ge0rG
what about: * it's an unprivileged port that a random local user could bind on * it's not IANA approved
-
daniel
only because i really try to avoid -1
-
jonas’
ok, I think I need to bring it up again: I had my pidgin fall back to A/AAAA regularly because SRV lookup was failing while the local recursor was still booting. I don’t think that accounts for all of the connections you’re seeing to A/AAAA:5222, but such issues are still a factor and it shouldn’t be attributed to "laziness". They could be addressed by abolishing that endpoint and mandating SRV still (i.e. instead of fallback, retry SRV).
-
Ge0rG
jonas’: old soho router resolvers lack SRV support. BTDT
-
daniel
jonas’, yes resolving SRV on crap wifis is an issue. but that isn’t the case for 156 over http
-
jonas’
I think we can move on here.
-
dwd
I'd be up for a default path and default port for wss, as Daniel proposes, which - I think - satisfies much of the use-case for local dev.
-
jonas’
dwd, I’ll note down your -1?
-
dwd
I hate to veto. I'll ost to the list and see if there are solutions, first.
-
jonas’
ok
-
dwd
But I'm likely to, as far as I can see.
-
jonas’
moving on:
-
jonas’
4b) PR#1032: Data Forms Clarifications URL: https://github.com/xsf/xeps/pull/1032 Abstract: No description provided.
-
jonas’
-1, it does not show sufficiently how this is a clarification and not a massive normative change.✎ -
jonas’
-1, it does not show sufficiently how this is a clarification and not a massive normative change; it introduces a precedent of requiring relative ordering of unrelated (i.e. different qname) elements which I *really* don’t want to see. ✏
-
daniel
on list. over the bike shedding of websocket i forgot to read this
-
flow
form-field type aware parsingof data forms does become more complex if the order is not specified✎ -
dwd
jonas’, I don't think it's a new precedent, actually.
-
flow
form-field type aware parsing of data forms does become more complex if the order is not specified ✏
-
jonas’
dwd, source please
-
flow
and it appears to be actually the norm to have <requirement/> first, simply because most people copy the examples✎ -
dwd
jonas’, The existing text says <reported/> described "the data to follow".
-
flow
and it appears to be actually the norm to have <reported/> first, simply because most people copy the examples ✏
-
dwd
jonas’, Also, I think Sl{eek|i}XMPP already assumes an order, I noticed it in the code the other day.
-
daniel
wait wasn’t the lack of element ordering the reason we can’t use schemas?
-
jonas’
dwd, it’s not clear from me that imposes a strict ordering requirement
-
flow
daniel, that's why it isn't specified in the schema but in normative text
-
jonas’
and for the record, I know of at least one implementation which does not guarantee the order and which would with that change become non-compliant.
-
flow
jonas’, hence the clarification ;)
-
jonas’
flow, I don’t believe, yet, that this is a clarification instead of a normative change
-
jonas’
(and, obviously, as the XML document is the entire XML stream, the wording as written is invalid anyway)
-
jonas’
(but that is easy to fix)
-
flow
sure, everything which does clarify normative requirement that wasn't previously explicitly spelled out could be considered a normative change
-
dwd
jonas’, https://github.com/fritzy/SleekXMPP/blob/develop/sleekxmpp/plugins/xep_0004/stanza/form.py#L27 for example.
-
flow
it's a trade-off
-
Ge0rG
can we agree that the updated first commit of the PR is a clarification indeed?
-
jonas’
flow, I don’t think that imposes a strict ordering during ingestion (as opposed to emission) of such stanzas
-
jonas’
Ge0rG, I have to parse that in context first, one moment please
-
dwd
Anyway, happy to suggest this should be discussed on list, and not here.
-
jonas’
Ge0rG, yes, I agree
-
Ge0rG
on-list regarding the ordering requirement.
-
jonas’
*sigh* I’ll see that I start a thread on that then
-
Zash
Ge0rG, yes
-
flow
jonas’, I don't think we should be able to make a difference between ingestion and emission
-
jonas’
moving on, let’s take that to the list
-
dwd
flow, Except at mealtimes.
-
jonas’
yikes
-
Zash
mm. on-list
-
jonas’
5) Pending Votes
-
flow
I would tolerate implementations changing the order of first level stanza extensions, but not the order of arbitrary elements while en-route
-
jonas’
there are still missing votes by daniel and dwd on the Service outage status protoxep, unless I missed any on-list
-
jonas’
the vote expires today
-
daniel
jonas’, i voted on list
-
daniel
+1
-
daniel
in the minutes thread
-
jonas’
thanks, didn’t see that yet
-
dwd
Oh, sorry. My bad, very much. +1, I'm pretty sure the general concept is fine.
-
jonas’
dwd, thanks!
-
jonas’
6) Date of Next
-
jonas’
+1w wfm
-
Zash
+1w wfm
-
daniel
+1w wfm
-
Ge0rG
+1W WFM
-
jonas’
that’s a quorum, thanks
-
jonas’
7) AOB
-
daniel
none here
-
Zash
-
-
dwd
·
-
jonas’
that was a lot of effort for saying "no" :)
-
jonas’
alright then
-
jonas’
8) Ite Meeting Est
-
jonas’
thanks everyone!
-
Ge0rG
thanks jonas’
-
daniel
thanks jonas’
-
moparisthebest
FYI a future SRV2 XEP will support advertising websocket in conjunction with other advertisement methods, and routers and such will all support it very quickly because what HTTP/The Browsers (tm) want, they get✎ -
Zash
Hrrrrrrrrrrrrr
-
moparisthebest
FYI a future SRV2 XEP will support advertising websocket in conjunction with other connection methods, and routers and such will all support it very quickly because what HTTP/The Browsers (tm) want, they get ✏
-
Zash
And crappy firewalls will all magically implement this on day 1.
-
flow
i guess the sad part is that this is likely to be true
-
Zash
false, they will implement the `HTTPS` record only.
-
moparisthebest
the record name is still up in the air, it might end up being srv2 or https or http-svc or something else but that's just a minor detail
-
moparisthebest
what matters is browsers will require it so everyone will fall all over themselves to implement it asap, many already have
-
Zash
It has been deployed already. It's too late now.
-
moparisthebest
yep, something like 5% of sites already using it, support in all chrome channels etc
-
moparisthebest
but that's fine, we'll use whatever The Browsers (tm) support, and we'll be set because of it :)
-
pep.
moparisthebest, link?
-
Zash
s/The Browsers/The Browser/
-
moparisthebest
Zash, don't depress me :'(
-
moparisthebest
pep., to, which? SRV2 ?
-
pep.
yeah
-
Zash
pep., https://mailarchive.ietf.org/arch/msg/dnsop/ldaCto09yaOuSXM92HgJhGqmPJw/
-
moparisthebest
pep., always takes me a minute to find the latest version, I think https://tools.ietf.org/html/draft-ietf-dnsop-svcb-https-02
-
pep.
thanks
-
moparisthebest
(this also gets us encrypted client hello too, ie, hiding SNI and ALPN)
-
pep.
ietf.org is hosted at clownflare..
-
moparisthebest
isn't everything? :(
-
pep.
:(
-
Zash
pep., no, www.ietf.org is hosted at cloudflare, but not ietf.org
-
Zash
I know this because there's a thread on a mailing list complaining about this.
-
pep.
re SVCB/HTTPS RRs, I guess we'll be able to do reverse roles now. HTTP on www.foo.tld served under foo.tld, and foo.tld serving XMPP and getting certificates properly. Useful in BYOD setups