MattJ: well yeah, Jaiku was acquired by Google, used as a vehicle to test app engine and then dismantled. There are some bits and pieces (idea-wise) in Plus.
Kev
Flow: If you can improve the xepdiff tool, I'm sure no-one's going to object. It works pretty well though (and has been useful for years), so I'm not going to say much bad about it :)
dwdhas left
dwd
Flow, That's the RFCDIFF tool. It works on plaintext only. We could build a plaintext rendering of XEPs and use it that way.
dwd
Kev, Did you notice discussion about mixed content in the diff tool yesterday?
Kev
Panic not, my name is now on the list. And unlike 40% of Council, I can follow basic specs.
Kev
I did not.
Kev
I just saw Flow saying
I wish XEP diffs would be like that: http://spec.commonmark.org/0.22/changes.html 22:23
dwd
Ah. One of the CSS files is referenced with a full HTTP (no S) URI, so it doesn't work with HTTPS.
Tobias: Are you still maintainer of the difftool? :)
Tobias
Kev, likely :)
Kev
See above :)
soulhas left
soulhas joined
Kev
Although if we've got any sort of documentation of where the Git repo for it is and how to deploy new versions, I can probably sort out a fix in a bit (I'm about to go unavailable for an hour).
Tobias
git repo? :) i think your hopes are too high
Tobias
it's a collaboration of waqas and mine, should on perseus somewhere...but daisydiff hasn't been maintained for years...so maybe it's worth looking at alternative for the diffing
ralphm
Tobias: someone should introduce you to the wonders of Distributed Version Control Systems
Kev
Well, OK.
Kev
I might try to extract the code from perseus and put it up on the XSF's github repo, then.
Kev
Tobias/waqas: Assuming you're ok with that.\
Kev
AFK a bit.
Tobias
the code extracting the two different XML versions of a XEP shhould be nicely reusable
Martinhas joined
soulhas left
soulhas joined
dwd
MIX §5.1 is "Common User Use Cases". What about posh users? Does one do things differently?
dwdhas left
Flow
Kev: If it was me, I would simply replace to the XEP format from XML to CommonMark (with annotations). Then good difftools come for free :)
waqas
Kev: Sure
waqas
dwd: It would be pretty useful to have a RFCText version of XEPs…
dwd
waqas, XSLT has a text output mode, so it's possible. Could even have that output to CommonMark.
dwd
waqas, Or a transform from XEP-0001 schema to xml2rfc, of course.
waqas
Daisydiff has an intelligent (i.e., structured) HTML diffing mode. My primary contribution to daisydiff was major optimization, so that the PubSub XEP didn't take tens of gigs to diff.
waqas
Daisydiff does optimal diffs, so had O(n^2) complexity, and was too object-creation-happy.
mark.erdhas left
mark.erdhas joined
mark.erdhas left
mark.erdhas joined
mark.erdhas left
mark.erdhas joined
xnyhpshas joined
mark.erdhas left
mark.erdhas joined
dwdhas left
intosi has joined
soulhas left
soulhas joined
mark.erdhas left
soulhas left
tim@boese-ban.dehas joined
soulhas joined
ralphmhas left
Zashhas joined
ralphmhas left
ralphmhas left
Alexhas joined
Tobiashas joined
Alexhas left
Alexhas joined
xnyhpshas left
Jake1984has left
foss81405971has joined
Zash
dwd: does the existing xslt files have a nice text output already?
Zash
I wrote a thing that spits out markdown earlier
Jake1984has joined
boothj5has joined
Flow
I've posted the the link to OX on hn: https://news.ycombinator.com/item?id=10857537
Zashhas joined
soulhas left
soulhas joined
soulhas left
soulhas joined
Jake1984has left
foss81405971has joined
dwdhas left
Jake1984has joined
dwdhas left
ralphmhas left
Valerianhas joined
winfriedhas left
ralphmhas left
xnyhpshas left
ralphmhas left
intosihas left
intosihas joined
boothj5has left
Flow
Is the MIX ProtoXEP acceptable as Experimental given that there are so many white spots?
Kev
Flow: I think so, given that the bits that aren't white were meant to be sufficient to get an implementation.
Flow
Kev: sounds reasonable, was just wondering
Kev
So essentially the white bits are useful in giving an indication of what's to come. We could have just left out the white bits, had a minimal XEP, and added new headings later as we wrote the new features, but I think what we've done is preferable in this instance. In another instance I might have a different opinion.
Kev
I also put TODO: List Discussion in there in a few places, which is very unorthodox, but I think was a good idea because I wanted a) list discussion and b) anyone implementing to understand likely future changes.
goffi
Kev: this list discussion mean there have already been discussions somewhere ? Or it's just a placeholder for future discussions ?
Kev
Meaning that there are some large questions that still need answers, and so I'd like discussion to happen on the lists.
Kev
And, probably, at the Summit.
goffi
I would be happy to do an experimental implementation for the client side, but a server component would help.
Kev
I'll be trying to schedule one of those as soon as I can, but it's not going to be imminent.
dwd
Flow, I'd rather have XEPs with large emtpy spaces marked "TODO" than no XEP.
dwd
Flow, Obviously at Experimental. I'd hope that by Draft it'll be more complete...
dwdhas left
tim@boese-ban.dehas joined
soulhas left
soulhas joined
dwdhas left
stpeterhas joined
moparisthebesthas left
stpeterhas left
waqashas left
waqashas joined
tim@boese-ban.dehas joined
winfriedhas left
waqashas left
waqashas joined
Steffen Larsenhas joined
winfriedhas left
waqashas left
waqashas joined
Tobiashas joined
ralphmhas left
waqashas left
waqashas joined
foss81405971has joined
Valerianhas left
ralphmhas left
moparisthebest
is anyone familiar enough with XEP-0357: Push Notifications to explain the rationale for sending any sensitive data over push at all?
moparisthebest
vs a simple 'wake up and check your xmpp server'
Zash
It's optional, right?
Kev
moparisthebest: You won't be able to wake up to fetch the rest of the data until the user asks you to.
moparisthebest
Zash, yes, but why even make such a horrible decision optional?
Zash
Because use cases
moparisthebest
Kev, what do you mean? a push message wakes up the xmpp client to do network stuff right?
xnyhps
moparisthebest: Not on iOS.
moparisthebest
Zash, yes I'm asking about what use cases it could possibly have?
Zash
I would guess that it depends on the platform
stpeterhas joined
dwd
moparisthebest, iOS is rubbish, basically.
moparisthebest
so it's so on ios it can display 'USER sent MESSAGETEXT"
moparisthebest
instead of 'you have a new message' ?
Steffen Larsen
dwd on some areas yes.. but still .. better in so many others. :-)
Tobias
who ever thought using a network router OS in the mobile realm…just crazy
dwd
Tobias, Oh, *that* IOS is OK.
moparisthebest
I still tend to think a simple 'You have a new message' would be much more preferable giving the security implications :/
Zash
moparisthebest: And that can't be decided by the implementers?
stpeterhas left
moparisthebest
seems kind of dangerous to allow that to be decided by implementers
Zash
FWIW I wrote an SMS based "app server" that just sent "You have chats"
moparisthebest
xmpp enforces encryption between all links, but this xep encourages unknown encryption on 3 links and 2 servers ?
Tobias
Zash, call this number to listen to the messages you've received while offline :)
Zash
Tobias: Ooooooh, that'd be fancy :)
moparisthebest
ok, new idea, if ios clients want to display messages, why not still encrypt sensitive data?
moparisthebest
client could send their xmpp server a public key with which to encrypt things before sending over the push network?
Zash
Tobias: Perfect for me who isn't usually that comfortable with phone calls at all
Valerianhas joined
Tobias
Zash, thought so...finally you can use up all those "free minutes" :)
Zash
Does iOS let the client render the message?
xnyhps
Zash: No.
xnyhps
It can't process it at all until the user taps on it.
Zash
moparisthebest: So that's impossible.
xnyhps
Unless you do the decryption in your head, yeah. :P
MattJ
How about "if you care about privacy, don't use iOS"?
moparisthebest
the more I learn about iOS the more I'm convinced it's the absolute worst excuse for an "OS" in the world
moparisthebest
I figured there were reasons for including terrible stuff like that in the XEP, I just couldn't figure out why, now it makes sense :)
Zash
http://xmpp.org/extensions/xep-0357.html#security
moparisthebest
I saw that, but allowing bad decisions at all, even if accompanied by security considerations is a bad idea
moparisthebest
and with only knowledge of how android works I didn't see a reason for it
dwdhas left
stpeterhas joined
Jake1984has left
Flow
moparisthebest: that is correct, you don't need xep357 on Android
moparisthebest
Flow, apparently you do for android 6+ I recently learned... :(
moparisthebest
google is racing apple to the bottom I guess
Flow
moparisthebest: not true, you can request to whitelist your app
Zash
... "request to whitelist"
moparisthebest
Flow, apparently it pops up an ugly confusing dialog the user has to 'consent' to, something about lowering battery life
Flowdoes long living XMPP over TCP session on all versions of Android :)
moparisthebest
I mean, that's what I'm personally going to do, I don't have any google apps and therefore no push on my phone
moparisthebest
but an app without technical users like conversations probably can't assume everyone is going to do that, and therefore must implement xep-0357, but hopefully with no data going over the line :)
Kev
Flow: Well, you can't be sure that you're not going to get terminated, so 357 still makes sense.
Flow
Kev: That heavily depends on your use case
Kev
Assuming your use case is 'have the user able to get notifications of new messages while the phones in their pocket'.
Flow
I achieve good results doing a check for liveness every 30 minutes
Kev
How do you check for liveness?
Flow
server ping
Flow
xep199
Kev
But the server pinging you doesn't help if you've been terminated.
Flow
Kev: reconnect if the pong didn't arrive within a reasonable amount of time?
Kev
The server can't initiate the client starting!
Flow
No I ping the server
Kev
How, if you've been terminated?
MattJ
Flow, Kev means process termination, not connection termination
Flow
Then I reconnect
Kev
How, if you've been terminated?
Flow
START_STICKY
Flow
Android will restart the Service component if it's started sticky
Flow
usually wihtin a few seconds
Flow
sometimes within a few minutes
moparisthebest
I've never had conversations terminated by android personally, not sure if it's common elsewhere
Kev
Unless the user's using their web browser for a long time (or other memory-hogging process, but it's usually browsers from what I understand).
moparisthebest
what we need is an xmpp-based push service, where part of the design is end-to-end encryption across it
waqashas left
moparisthebest
then it can come by default with cyanogenmod and other roms, or be installed on rooted phones, and we are good
Kev
I accept that may be a reasonable trade of. I'm not convinced it always is, and in those cases it isn't, 357 continues to make sense.
Kev
+f
Zash
"xmpp-based push service" ...
Flow
Kev: It mostly comes down to if your users are ok that sometimes messages arrive a bit late, 30 minutes in the worst case. But GCM also doesn't provide any gurantees about when the push is delivered. So the trade off is perfectly fine for me. Plus I don't have to depend on third party services.
Zash
But they are or were all xmpp based. And XMPP itself is push, since TCP is push. I don't like the word "push" in this context, it's confusing.
Kev
Flow: Fair.
moparisthebest
Zash, probably are, it's a good choice, but I'm saying fully open source (ie you-can-run-your-own) and encrypted end-to-end always, ie client tells pushing service a public key to encrypt to, only fully encrypted messages transit push service
foss81405971has joined
Zash
It's not about open source or even the protocol. It's about control, which Google and Apple does not give you, so there can be no nice solution here.
moparisthebest
the push service sdk would be easy too, it'd just be a minimal xmpp client, or anything capable of xmpp, could even integrate in the open source gapps replacement for android apps to use the same
Zash
And that's why 357 is ok. It's a compromise.
Zash
Even the architecture of XMPP itself is a compromise, one that happens to work really well.
moparisthebest
google does, something like this could come with cyanogenmod and all the other roms?
artyhas left
moparisthebest
you could use it on a 'jailbroken' ios device too I guess
Jake1984has joined
dwdhas left
Flowhas left
dwdhas left
Steffen Larsenhas left
moparisthebest
so does http://www.mitls.org/pages/attacks/SLOTH mean SCRAM is totally broken? and therefore XMPP authentication with untrusted servers?
moparisthebest
though most things I see use PLAIN anyhow :/
Zash
moparisthebest: No. It just means SCRAM-PLUS is not as secure as it should be.
Zash
But we knew that already
foss81405971has joined
moparisthebest
ok good then :)
Zash
See also https://secure-resumption.com/
stpeter
have we all discussed PrivaTegrity here yet? http://www.wired.com/2016/01/david-chaum-father-of-online-anonymity-plan-to-end-the-crypto-wars/
mathieui
Zash, doesn’t the weakness exposed by sloth require you to use the same credentials on a trusted and on a malicious service?
moparisthebest
mathieui, yes that's how I read it
moparisthebest
it's not a good security policy, but you know many people do it all the time... :(
Zash
mathieui: Huh?
dwd
XEP-0369 - quite a good number.
mathieui
moparisthebest, it also requires a man in the middle from the malicious service, (in order to sync the tls-unique) afaik
intosi
stpeter: sounds like that council mention in the article is a job for the Elders of the InterNet
ralphm
dwd: numberist
intosi
ralphm: that doesn't make dwd any less right.
moparisthebest
mathieui, yep
Zash
https://en.wikipedia.org/wiki/369_%28number%29
Zash
magic number!
dwd
The only number better is XEP-0248, since that's increasing powers of two.
Zash
dwd: I quite like 313
Zash
It's a happy prime
moparisthebest
until 968 XEPs from now that is
Kev
I'm happy with both 313 and 369.
Zash
mathieui: I'm not sure what you mean that about same credentials, or how it applies.
moparisthebest
Zash, SLOTH allows credential forwarding with SCRAM, where SCRAM uses tls-unique to prevent credential forwarding
dwdhas left
moparisthebest
stpeter, I'm sure the 5 eyes would be quite happy with PrivaTegrity, they'd only have to hack 4 other countries to ex-filtrate their keys and they'd have everything they always wanted :)
MattJ
I loved it when I found out 313 was a palindrome in binary as well as decimal
MattJ
and a prime number
Zash
and a happy number!
intosi
And that :)
foss81405971has joined
Ashhas joined
Jake1984has left
stpeter
moparisthebest: yeah for sure
moparisthebest
and for literally the millionth time, criminals will just use non-backdoored crypto anyhow....
winfriedhas left
Zash
Question is, does TLS 1.3 fix tls-unique?
moparisthebest
that article mentions the md5 fixes for tls 1.3 but nothing about tls-unique, so I'd *guess* no
Zash
As it was already broken by that 3 handshake thing, which IIRC did not require finding a collision at all
SamWhitedhas left
Valerianhas left
dwdhas left
Lancehas joined
moparisthebest
the 3 handshake thing says Mitigations pending modification to tls-unique or adoption of new TLS extension
Zash
Which isn't there yet afaik
moparisthebest
given the truncation of sha256 causing the SLOTH problem too, hopefully tls 1.3 will do SOMETHING about it?
Either negotiated as an extension or replaced entirely in TLS 1.3 ✏
Zash
I've looked at tls-server-end-point but it requires more asn1 introspection to be added to our tls library. :/
winfriedhas left
dwd
I thought that was just a hash of the server cert?
dwd
Well, the server cert in its DER form, at least.
moparisthebest
I like things that hash a der :)
moparisthebest
dane/hpkp etc
Zash
dwd: But the hash algorithm is determined by the hash used in the signature algorithm.
stpeterhas left
moparisthebest
as long as it's sha2+ it's fine
dwd
Ah, I see.
Zash
Yeah, I think you can cheat and always use sha256, but it'll break if it's signed with rsa-sha512
Zash
It would have been easier if the hash algo was fixed, or determined by having eg tls-server-end-point-sha256 and tls-server-end-point-512 etc
Valerianhas joined
Valerianhas left
Zash
But then it's tricky since there's no negotiation, so client's can't know if anything other than tls-unique is supported
Valerianhas joined
thorstenhas joined
thorsten
Hi guys .... A small mistake in https://xmpp.org/extensions/xep-0369.html MIX has been accepted. :)
thorsten
Version 0.1 (2015-01-07)
Initial published version approved by the XMPP Council.
(XEP Editor (asw))
Version 0.0.1 (2015-10-12)
First draft.
(kis/psa)
END
kalkinhas joined
thorsten
Year should be 2016 ;)
Laurahas left
thorsten
Hi guys .... A small mistake in https://xmpp.org/extensions/xep-0369.html MIX has been accepted. :)
Version 0.1 (2015-01-07)
Initial published version approved by the XMPP Council.
(XEP Editor (asw))
Version 0.0.1 (2015-10-12)
First draft.
(kis/psa)
END
Year should be 2016 ;)
MattJ
Heh
dwd
Heh.
Flowhas joined
stpeterhas joined
SamWhitedhas left
SamWhitedhas joined
SamWhitedhas joined
winfriedhas left
dwdhas left
bjchas left
bjchas joined
winfriedhas left
xnyhpshas left
Steffen Larsenhas joined
dwdhas left
Martinhas left
Flowhas joined
Ash
thorsten: Yeah - that's fixed now (might need a hard-refresh though). The copyright date was also still 2015.
thorsten
Ash: and I didn't see the copyright ..... Great Ash. ;)
Ash
It's far too early in the year still for this kind of thing! Thanks for spotting :)
SamWhited
It's still early in the year; we have not had enough coffee yet this year to be thinking about these kinds of things (pretty sure coffee works that way on any time scale).
thorsten
Ash: SamWhited just wanted to help a bit ;)
Zash
I have a serious problem. I'm out of coffee and it's too cold for me to want to go out and buy more. I guess I'm doomed.
moparisthebest
can you reuse the old coffee grounds until it warms up enough?
thorsten
Zash: that's what's missing: coffee delivery service for offices
thorsten
moparisthebest: I'll find a button place in conversations for it ;)
Zash
moparisthebest: That's worse than the emergency instant coffee I'm currently surviving on
moparisthebest
eek I'm not convinced it's WORSE, maybe the same
thorsten
Zash: u drink what?
thorsten
And my colleagues want to kill me when I out some hot water in my cappuccino to stretch it !
thorsten
Out=put
SamWhited
That's a brilliant idea… I wonder if there's a service that delivers coffee around here; I would love having a HipChat addon or something for that.
SamWhited
I would be broke very quickly.
intosihas left
dwdhas left
foss81405971has joined
Lancehas joined
soulhas left
soulhas joined
foss81405971has joined
Lancehas joined
xnyhps
Zash: There's no such thing as too cold to go out and buy coffee.
boothj5has joined
boothj5has left
xnyhps
(Though that's easy for me to say while it's 7°C outside.)
Lancehas joined
dwd
Can't see the attraction of coffee, myself.
dwd
But if I ever ran out of tea the world would end.
moparisthebest
dwd, british?
dwdhas left
dwd
Of course.
soulhas left
MattJdoesn't like tea
MattJ
or cricket
foss81405971has joined
soulhas joined
SamWhited
MattJ: Isn't that illegal for you people?
dwd
Or bacon, though, which makes you officially weird.
moparisthebest
dwd, yea that's pretty much the most british-sounding thing I've ever heard, you guys really like your tea