XMPP Council - 2025-11-18


  1. Daniel

    Quick reminder of our meeting today. Our last meeting if I'm not mistaken.

  2. Daniel

    There are pending votes on channel binding types and Forums. Both pass if you ignore them. (they both have the minimum 3 +1s)

  3. Daniel

    However I usually feel a bit better if we don't pass things through default and instead actually review them

  4. Kev

    I think they only pass if the voting period ends before the end of the Council term, or theyโ€™re ended by everyone voted, donโ€™t they?

  5. Kev

    That is - I think votes that are open at the end of Council term get reset, although maybe Iโ€™m misremembering.

  6. Daniel

    Strictly speaking you are correct. The forum ones has its voting period end and would default to pass

  7. Daniel

    Channel binding would be brought into the next council period

  8. Daniel

    In any case. Just read the damn thing ๐Ÿ˜…

  9. singpolyma

    I think I'm only pending on forum. I guess my concerns are not enough to -1 if others are ok with it so I will +0

  10. moparisthebest

    > Move 'XEP-0440: SASL Channel-Binding Type Capability' to stable I'm assuming we can still update security considerations after moving to stable... but sure seems like this should explicitly mention that tls-unique isn't secure since it defeats the entire purpose of channel binding

  11. moparisthebest

    do we have evidence that tls-server-end-point is secure over TLS 1.2 without the extended master secret? If not also seems like it should err on the side of caution and just say channel binding shouldn't be done at all outside of TLS 1.3

  12. singpolyma

    Secure is hardly a binary state. But certainly it should say that any channel bindings are defined elsewhere and their security considerations must be considered

  13. moparisthebest

    > Secure is hardly a binary state sure, but when the *entire purpose* of the XEP is to secure against MITM I think it should mention things that don't accomplish that in any way, like tls-unique

  14. moparisthebest

    an implementor shouldn't need to additionally read and understand the entire history of TLS to implement this so it actually accomplishes the single goal of this XEP

  15. moparisthebest

    this isn't like a theoretical problem, we have *all* current implementations of this XEP that don't do it securely, and think they are protecting against MITM when they aren't at all

  16. moparisthebest

    and it's not a legacy thing either, extended master secret https://datatracker.ietf.org/doc/html/rfc7627 was published in 2015, it was known without a doubt tls-unique was broken before that, yet 440 wasn't published until 2020 and we are sitting here with all these vulnerable implementations

  17. Daniel

    It's time

  18. Daniel

    1) roll call

  19. goffi

    .o/

  20. larma

    ๐Ÿ‘‹

  21. dan.caseley

    Here!

  22. dan.caseley

    But only just. Did a conference. Caught the germs.

  23. goffi

    dan.caseley, get well soon.

  24. dan.caseley

    Thanks :)

  25. daniel

    2) Agenda bashing no agenda for our last meeting

  26. daniel

    3) Editor updates

  27. daniel

    STABLE: XEP-0485 (PubSub Server Information) as per our vote last week

  28. daniel

    UPDATED: XEP-0492 (Chat notification settings)

  29. daniel

    4) Items for voting

  30. daniel

    none

  31. daniel

    5) Pending votes

  32. daniel

    i have larma on forums and larma and goffi on channel binding i believe...

  33. goffi

    +1 on channel binding

  34. larma

    +1 on both

  35. daniel

    6) Date of next

  36. daniel

    technically none. just in case some of us get re-elected i suggest +1w

  37. larma

    +1w should wfm

  38. goffi

    +1w if re-elected wfm

  39. daniel

    7) AOB

  40. daniel

    no AOB, i assume

  41. daniel

    8) Close

  42. daniel

    Thank you all

  43. goffi

    Thanks Daniel, thanks all.

  44. dan.caseley

    Thanks everyone! That felt like a good year.

  45. dan.caseley

    And thanks Daniel for shepherding!

    ๐Ÿ‘ 2
  46. singpolyma

    > And thanks Daniel for shepherding! ๐Ÿ‘

  47. Guus

    A heartfelt thank-you for your expertise! Next yearโ€™s Council candidates promise the exact same level of excellence. Verbatim.

    ๐Ÿ˜‚ 2
  48. emus

    Thank you Daniel!