XSF Discussion - 2017-03-13


  1. zeank

    Hidiho! In the light of Push Notifications I wondered if it wouldn't make sense to add a <no-push xmlns="urn:xmpp:hints"/> to https://xmpp.org/extensions/xep-0334.html ?

  2. Ge0rG

    zeank: where should it be used, then?

  3. zeank

    To not trigger a push on the server side

  4. Tobias

    and you want remote parties in control of that?

  5. zeank

    in certain cases, yes

  6. zeank

    Ok, I see a problem … they could control it all then :/

  7. Tobias

    zeank, what cases are those?

  8. zeank

    in our scenario we exchange let's call it meta information between clients

  9. zeank

    as messages though

  10. zeank

    and we don't want to trigger a push for those

  11. Kev

    Servers need to not act on hints, because you almost never want a remote client being able to tell your server what to do about things like storing or copying or pushing.

  12. zeank

    typing notifications could be another

  13. Tobias

    why would servers trigger push notifications on body-less messages

  14. zeank

    hm, fair point in our case all messages are body less because they are encrypted and have no body in general

  15. zeank

    it's a proprietary system

  16. zeank

    just thought it might be useful for others as well

  17. zeank

    @Kev so the whole XEP is wrong?

  18. Ge0rG

    I think we need a common ruleset for decisions about pushing, carbon-copying and MAM-archiving of messages.

  19. Kev

    zeank: I thought 334 said that they were just hints, and entities didn't have to honour them.

  20. Ge0rG

    Kev: the alternative would be to encode stateful processing rules in the server, right?

  21. Kev

    But if it really says that a remote client can choose whether my server puts things in my archive, then yes, it's of limited applicability (rather than wrong, as it might still be useful in closed systems), and we need to be very careful about anything depending on it.

  22. zeank

    yes, they are just "hints", but they are targeting the behaviour of the server, not sure how push and MAM are so different in this regard then

  23. Tobias

    zeank, that proprietary system sounds interesting if it can encrypt even typing notifications, which OMEMO currently can't afaik :)

  24. zeank

    we don't have typing notifications yet, just to be clear ;)

  25. Tobias is much less excited now

  26. zeank

    :p

  27. Ge0rG

    Kev: do you happen to have an idea how to make the desired functionality of hints secure and proper, in the context of the right trust boundaries?

  28. Kev

    Ge0rG: Put the rules in the server not the remote client, is all I have.

  29. Holger

    As for the copying of messages, doesn't XMPP core allow the sender to control this by addressing the full vs. bare JID and using certain message types?

  30. Kev

    What gets archived by the server is very clearly a server decision, not a remote client decision.

  31. Kev

    Holger: Not with carbons.

  32. Tobias

    right, but there are currently few sensible guidelines on that, not?

  33. Ge0rG

    Kev: "A message of type 'chat' is not eligible for carbon copies if it contains a body and the body starts with the verbatim string '?OTR'"

  34. Holger

    Yes then XEP-0280 breaks this, which is why we need hints for that :-)

  35. zeank

    :p

  36. Ge0rG

    Holger: actually, the remote party can only choose between "deliver to THIS resource" and "deliver to somebody implementation-defined"

  37. Holger

    Sure.

  38. Ge0rG

    and I really despise the last part of it.

  39. Holger

    I think the desired behavior is to be able to address either an individual device or the account.

  40. Ge0rG

    because you can't rely on it, but you need to for a proper notification implementation.

  41. jonasw

    we could all agree that "somebody implementation defined" is "nobody, but everyone interested gets a carbon copy" :)

  42. Ge0rG

    jonasw: that makes sense if all your clients enable carbons and if you make no client-side semantic difference between "real" messages and carbons

  43. Ge0rG

    jonasw: but the latter will bite you in a multi-client context.

  44. Ge0rG

    e.g. in the "I have my phone on the desk and use my desktop" user story.

  45. jonasw

    Ge0rG: you need to solve that anyways, no matter if you CC everything or not

  46. jonasw

    because the user can switch at any point in time

  47. Ge0rG

    jonasw: yes, but you can use carbons as a hint

  48. jonasw

    for the former part: clients who cannot into CC are annoying anyways and they’re gambling on whether they get messages or not as-is

  49. jonasw

    Ge0rG: but you depend on the server implementation-defined mess if your peer always addresses the bare JID like your client does ;)

  50. jonasw

    I’d rather use xep 84 as a hint actually.

  51. Ge0rG

    > clients who cannot into CC are annoying anyways said the pidgin user

  52. jonasw

    yes, that means that I must know, Ge0rG.

  53. Ge0rG

    It's obviously getting complicated and complicated, on the client side. This is the opposite of the general idea of XMPP, but we could do something like this: on received message: if (message is carbon or sent to bare JID) and (we got presence/activity from another resource of our account recently): delay notification by a 1-minute timer which is cancelled on activity from another client

  54. Holger

    Conversations does the "we got presence/activity from another resource" check.

  55. Ge0rG

    Holger: Conversations does many things that are not codified. While this is good for Conversations users, it makes it harder for future client implementations

  56. Holger

    A better solution might be looking at the CSI state. Then again, at least desktop clients probably just don't have a good idea of whether they're currently active or not.

  57. Ge0rG

    What about just reading tea leaves?

  58. Kev

    I think 'implement Kev's upcoming read-sync XEP' might be a good approach ;)

  59. Kev

    I really need to write something there, though :/

  60. Tobias

    Ge0rG, that won't float well with coffee enthusiasts

  61. Ge0rG

    Tobias: they wouldn't even notice, if we provide centralized access to tea-leaves-entropy. Otherwise, we'd need to kindly ask the user to make a photograph.

  62. Ge0rG

    Kev: the read-sync sounds like a more explicit way to tell other clients that messages have been read. I'm not sure if it will also help in the notification-delay/prevention situation

  63. Kev

    Well, it helps, because it's an explicit way of knowing that a message doesn't need to be notified (or that a notification can be cleared), but it doesn't prevent you needing some logic somewhere about delaying notifications, indeed.

  64. Kev

    I think that's just the cost of doing business.

  65. Ge0rG

    Kev: will it be similar to chat state notifications?

  66. Kev

    Not particularly, no :)

  67. Ge0rG

    Kev: why not?

  68. Kev

    Because CSN go to the other party, and read sync goes to your server, and from there to your clients?

  69. Ge0rG

    Hm. So it's an account-centric thing.

  70. Kev

    Yes.

  71. jonasw

    Kev: you could send CSN to your own bare JID :-)

  72. jonasw

    and let carbons do the rest

  73. Ge0rG

    jonasw: it would get reflected to yourself.

  74. jonasw

    exactly

  75. Kev

    jonasw: That doesn't work for saying which messages are read, though.

  76. Ge0rG

    there is no xmpp primitive to "send something to all the other clients of yours"

  77. jonasw

    Kev: yes, but isn’t there something for that already?

  78. jonasw

    Ge0rG: ah, that’s what you mean

  79. jonasw

    Ge0rG: well, we may need one

  80. Ge0rG

    one could use PEP

  81. jonasw

    ugh

  82. Tobias

    Ge0rG, with carbons there is, not?

  83. jonasw

    Tobias: all *other* clients

  84. Ge0rG

    Tobias: what'd be your destination JID? the server?

  85. Tobias

    Ge0rG, your own bare JID? :)

  86. Ge0rG

    message to "account-domain.xmpp" would get carboned to all other clients

  87. Ge0rG

    Tobias: no. you'd get the message twice

  88. jonasw

    on each resource (once as <sent/>, once as <received/>)

  89. Ge0rG

    Tobias: first the 'sent' carbon, then the delivered message/carbon

  90. Ge0rG

    except on the sending client, it would only get one copy

  91. Tobias

    Ge0rG, "at least once" semantic is easier than "exactly once"

  92. Ge0rG

    Tobias: but using the "most probably twice" semantics is just wrong.

  93. Holger

    What's wrong with PEP BTW?

  94. jonasw

    redundancy!

  95. Tobias

    and that would be the last XMPP related fosdem talk tweeted about

  96. Guus

    which reminds me: we could use a new post for the blog. Anyone interested in writing one?

  97. Ge0rG

    Guus: what should it be about?

  98. Tobias

    Ge0rG, federal reserve, rainforest, and that sort of thing

  99. Ge0rG

    Tobias: xsf world domination plans? Because it's a greater challenge if we announce the plans in advance?

  100. Tobias

    we already have a retracted XEP for that :P that should be enough of an announcement

  101. Ge0rG

    Retracted? People don't even care about experimental...

  102. Guus

    Ge0rG: I have no specific agenda, other than trying to help make sure that the blog gets regular updates. So far, I've reached out to Daniel for an OMEMO post, and Rikard for an IoT one.

  103. Tobias

    well..it's kind of hidde

  104. Tobias

    *hidden

  105. Guus

    If you have a good idea, feel free to submit something. You can easily add a blog post via a PR on the website, or send it to me by text, and I'd be happy to post on your behalf.

  106. Tobias

    Ge0rG could write about how snarky comments in open standards communities result in improved protocols ;)

  107. Ge0rG

    Guus: sounds good to me. I'm sure nobody wants ME to write a guest post.

  108. Tobias

    or more seriously, about his efforts on improving UX and usability

  109. Guus

    Ge0rG: guest? you're a member, right?

  110. Ge0rG

    Guus: right. But I'm not a regular contributor to the blog.

  111. Ge0rG

    Tobias: im sure that would get flagged immediately because of neutrality concerns.

  112. Tobias

    Ge0rG, a blog without regular posts doesn't have any regular contributors at all

  113. Tobias

    Ge0rG, we could neutralize it

  114. Guus

    Ge0rG: I wonder if anyone considers themselves a 'regular blogger' here. There's people that posted more than others, but that's more because of a lack of input by the others. :)

  115. Ge0rG

    Tobias: also, what would be the target audience? It seems that it's widely irrelevant to users, and there are two camps of developers: the ones who don't care, and the ones who have no time to improve

  116. Tobias

    yeah...try to channel that optimism into words for the blog post

  117. Guus

    (no response, which presumably means he's drafting a post!)

  118. Guus eyes dwd

  119. Ge0rG

    I feel a bit like Aragorn, having his motivational speech before the fight of helm's deep. Except there is no army. Actually, now that I think of it, it's probably more like Tyrion Lannister's "don't fight for your king" speech.

  120. Guus

    so, you're good with words...

  121. Guus

    Ge0rG: You might be making a bit to much of it :)

  122. Ge0rG

    Guus: this is probably a sign that I'm overqualified ;)

  123. Guus

    Ge0rG: Perhaps. You should take this as a challange to see if you can lower yourself to our level!

  124. Tobias

    Ge0rG, it might result in more users demanding better usability for their clients, who knows

  125. Ge0rG

    Tobias: quite seriously, I'm not sure how to frame the whole thing. "Here is this new set of ideas how to make XMPP better"?

  126. Ge0rG

    Tobias: the obvious question for the readers would be "why are they talking about it, instead of just doing it"

  127. Guus

    Ge0rG: perhaps frame the fact that we need a solution for a probem? "Clients look aweful, we could use an effort to stream line things. We've started doing that at xyz"

  128. Guus

    (but nicer)

  129. Tobias

    Ge0rG, well..it makes little sense talking here about it, as you already made your point and few new people come here

  130. Tobias

    i think our blog has a wider target audience than this room

  131. dwd

    Also more tweetable.

  132. Guus

    Tobias: do you have access to pageview stats?

  133. Tobias

    no

  134. Tobias

    i'd also would like to have access to xmpp twitter account analytics...to see if all that tweeting increased out followers (it did, but how much)

  135. Ge0rG

    Guus: the next problem is: I'd really like to use specific examples of how things can be improved, namely conversations and (to a degree) yaxim. But then it'd result in something like https://yaxim.org/blog/2017/01/31/yaxim-0-dot-9-security-easy-xmpp/ and obviously violate XSF neutrality in a way that's hard to neutralize

  136. Guus

    Ge0rG: I'd almost consider that a follow-up post. I'm not to bothered by the neutrality thing (but others disagree), but, referencing to Yaxim as an example should be fine I think - more so if you can reference another implementation too

  137. Ge0rG

    I fear that even mentioning https://github.com/ge0rg/easy-xmpp-invitation which is really client-agnostic (except for the hardcoded list of yaxim+conversations) would be seen as a violation

  138. Guus

    There's always goign to be someone that sees something as a violation of something. If that stops people, nothign would get done.

  139. jonasw

    Guus: +1

  140. Ge0rG

    Guus: I just extrapolate the previous feedback I've received from XSF members to my public statements about the state of XMPP.

  141. Ge0rG

    Guus: if I disregard that, I can imagine writing a call-to-action post about Easy XMPP. And I'll try hard to make it as positive as possible

  142. Guus

    Ge0rG: you might generate more feedback than others here :)

  143. Ge0rG

    Guus: I'm not sure if the feedback I generate is of the right sort.

  144. Guus

    Ge0rG: I'd love for you to draft a rough outline of a post. We can do a PR on that, and have some reviews.

  145. Ge0rG

    Guus: deal

  146. Guus

    awesome, thanks!

  147. Guus

    and again - I think it might be a good idea to smear this topic out over a couple of posts. One that describes the problem and the approach taken to start working on a fix - another one that describes a few of the fixes, and more that illustrate how individual implementations are now improved. Then, a final one where you claim victory.

  148. Guus

    Ge0rG: there might be a handful of posts and world dominition in this for you ;)

  149. Ge0rG

    Guus: I don't aim for world domination

  150. Ge0rG

    Guus: all I want is a nice big yacht. :D

  151. Guus

    Ge0rG: if you want, I can put you in contact with one of my Nigerian royal friends who badly need to transfer money out of the country? Supposedly, that's a win/win and risk-free.

  152. Ge0rG

    Guus: I think I'm already in negotiations with that person

  153. jonasw

    :)

  154. Guus

    Ge0rG: I am sure then that your ship will litererally and figuratively come in any minute now.

  155. Guus

    Tobias: could you do a review of https://github.com/xsf/xmpp.org/pull/185 ?

  156. Guus

    I think it's ready to merge now (finally)

  157. Tobias

    will do this evening

  158. Guus

    Thanks

  159. jonasw

    is my dynamic list generation code live already?

  160. Guus

    jonasw: I think so, yes.

  161. jonasw

    then we can start the attack on the quality of listed software, right?

  162. Guus

    I fixed the problem that prevented a bunch of commits to go live, after which the changes that were visible to me popped up.

  163. jonasw

    with requiring projects to re-request their listing and so on

  164. Guus

    jonasw: I see a blogpost in your immediate future :D

  165. jonasw

    ugh

  166. jonasw

    pelican-based blog?

  167. Guus

    yup

  168. jonasw

    can do

  169. Guus

    tx

  170. jonasw

    but I might forget

  171. Guus

    add something here: https://github.com/xsf/xmpp.org/tree/master/content/posts/blog

  172. jonasw

    I’m super tired right now, not sure if writes to my task memory persist currently :)

  173. Guus

    no worries, I'll be here to haun...remind you.

  174. Ge0rG

    Guus: https://github.com/xsf/xmpp.org/pull/274 - I'm sure this will ignite a discussion.

  175. Guus

    Thanks Ge0rG. I responded on github

  176. Ge0rG

    Guus: the verbatim tldr will get out, but I'm used to make the first paragraph of long posts effectively a tldr

  177. Guus

    Ge0rG: that might be a sign that the text is to long for a blogpost :)

  178. Guus

    but, a matter of personal preference, probably

  179. Guus

    My main point is that I really dislike 'tl;dr'

  180. Ge0rG

    Guus: I'd say it is a sign of respect to the prospective reader. I tell them in a single paragraph if the remaining part worth reading.

  181. Ge0rG

    *is

  182. Guus

    personal preference. :)

  183. Guus

    go for it - it's your text.

  184. Ge0rG

    Guus: thanks for your feedback. I'll update the pr when I find some more time

  185. jonasw

    Guus: you could call it "Abstract", is that better?

  186. Ge0rG

    jonasw: what's wrong with an implicit "summary"

  187. jonasw

    I don’t know.

  188. dwd

    So... The only point where mam:2 makes any difference is in the one place where the XML namespace is not used.

  189. dwd

    ... and this has no impact *at all* on MIX.

  190. Kev

    Question, UX experts.

  191. Kev

    Hypothetically if you were writing an XMPP client and wanted the experience when opening a chat from within a MUC to not suck (i.e. to open to the real JID instead of the room JID) in the usual case, how (if at all) would you protect it against spoofing on untrusted remote MUC services?

  192. Ge0rG

    Kev: you are talking about private chats?

  193. dwd

    Hypoethetically, if I were using an untrusted remote MUC service, how stupid would I be to be sending it messages anyway?

  194. Kev

    It depends on the trust, I think?

  195. Ge0rG

    with my UX hat: I'd just open a chat wit the bare JID advertised in the MUC. with my security hat: what dwd said.

  196. dwd

    Kev, What are you trusting it to do and not do?

  197. Kev

    I mean, I may trust my inane discussions to something, but not want it to be able to lie about someone's real JID and have me spam a helpless person directly.

  198. Ge0rG

    Kev: this is the same security concerns I'm pondering about for some weeks already, in the context of mediated vs. direct MUC invitations

  199. dwd

    Kev, That's not a security concern.

  200. Kev

    Turning occupants into a DDoS probably is :)

  201. dwd

    Kev, That's a concern you might annoy someone, not a concern about leaking information.

  202. Kev

    I don't think I said anything about it being a concern leaking information, did I?

  203. Kev

    (Or even security)

  204. dwd

    Kev, Hardly; you're reliant on having users PM people. And if you're a remote MUC, you can spoof the PMs directly, causing people to get any responses.

  205. Kev

    You can't spoof the PM as being from my server, though.

  206. dwd

    Kev, No, but I can spoof them as being from you, via a MUC.

  207. Kev

    Yes. I'm thinking about people not in the room at all.

  208. dwd

    Kev, Who isn't in the room?

  209. Kev

    You annoy me, so I tell all jabber.org MUCs to say that every occupant's real JID is yours, and then you get spammed every time someone tries to send a PM.

  210. dwd

    Kev, That was you?

  211. dwd

    Kev, You git.

  212. Kev

    I do.

  213. Kev

    Although I don't tend to use it as a verb.

  214. Kev

    Regardless, this feels like it might not be ideal, to me.

  215. dwd

    Kev, True, that would be subversion.

  216. Kev

    Very good.

  217. dwd

    Kev, OK. So I think the "real-jid" issue here remains irrelevant. It's one case where a (popular) MUC service could abuse trust.

  218. Kev

    I'm pondering possible options being "Meh, you're in the MUC, you're showing some trust", "Do it if it's someone in your roster" (so you can probably work through the social issue if it gets spoofed), "do it if it's a local service". (where 'it' is opening to the real JID).

  219. Ge0rG

    Kev: I think the only sane solution to that is having MUC presence signed by the user's account key.

  220. Kev

    There's also revealing your own JID in the case that you're a moderator in a room.

  221. dwd

    Ge0rG, Seems fair.

  222. Zash

    How do you know what account key is the right one?

  223. dwd

    Kev, I think any of your options is fine.

  224. Kev

    Certainly the irritation of having PMs outside your normal flow is significant and I want to fix it.

  225. dwd

    Zash, By asking the MUC for the public key of its occupant of course. Duh!

  226. Zash

    MUC can't lie

  227. SamWhited

    MUC real-JID dial-back verification? When you want to verify a JID in a MUC you send them a token (through the MUC), and then they echo it back via their real-JID. I'm not sure this is necessary either, but it's fun to think about.

  228. dwd

    Zash, Evil-MUC-bit?

  229. Ge0rG

    Zash: you query the bare JID for a signed presence, or check your roster

  230. Kev

    SamWhited: Sure, but that only works if you've running over jidnssec, which no-one is :)

  231. Ge0rG

    Kev: may I point you to https://mail.jabber.org/pipermail/standards/2017-January/032021.html

  232. SamWhited

    Kev: jidnssec? Not sure if real thing or a joke I didn't get…

  233. Tobias

    it's a DNSSEC deployment joke

  234. SamWhited

    Oh, heh, right

  235. Kev

    SamWhited: It's a joke. You mentioned dialback, which is a fine thing to use for S2S as long as you have dnssec.

  236. dwd

    (And you also use TLS).

  237. Tobias

    and .im domains can't do DNSSEC because people from the isle of man are afraid of locsk

  238. Tobias

    *locks

  239. SamWhited

    I think it works in this case though if you trust the s2s connection at all

  240. SamWhited

    (the s2s connection doesn't have to do dialback, I just used that name because they're echoing an HMAC or something back at you)

  241. Kev

    Yes, it's not a stupid idea.

  242. SamWhited

    You'd have to do it two ways though for mutual verification, so there's probably a better way

  243. Ge0rG

    SamWhited: like... distributed MUCs

  244. Ge0rG

    or maybe we need to replace JIDs with pubkey-based identities

  245. SamWhited

    Ge0rG: I'm assuming this was a question for a MUC implementation today, not for a future-widely-used-thing implementation.

  246. Ge0rG

    or we just ignore the problem and pretend it doesn't exist.

  247. Zash

    Let's build an elaborate PKI!

  248. Zash

    The world needs more of those

  249. Ge0rG

    Or we introduce a "security level slider" into our apps, ranging from "I don't care, just make it work" to "I'm ultraparanoid"

  250. Kev

    (And thanks all, BTW)

  251. dwd

    Ge0rG, Excellent. The world need more security options that users don't understand the implications of.

  252. Ge0rG

    Kev: so have you come to a conclusion how to do it?

  253. Zash

    Ge0rG: Key based identity would be interesting, but I don't think that's even XMPP 2, that's gotta be something completely new.

  254. Ge0rG

    dwd: most users don't understand the implications of any of the security options provided to them.

  255. Kev

    Ge0rG: I think the conclusion is "Meh, just do it"

  256. Ge0rG

    Zash: TOX maybe. It's got an "X" in it at least.

  257. Ge0rG

    Kev: this conclusion was also reached at the end of the lively security debate in the thread I pointed to.

  258. Kev

    FWIW, for mediated invitations, Swift shows it but warns that it could have been spoofed.

  259. Kev

    I can't remember if we replied to the thread or not.

  260. Kev

    But the whole mediated invite thing is horrid anyway and everyone needs to just use direct invites :)

  261. Ge0rG

    Kev: direct invites don't auto-add the receiver to the MUC affiliation

  262. Tobias

    Ge0rG, jet fuel can't melt steel beams

  263. Tobias

    Ge0rG, i think setting up specific affiliations for participants is a quite rare use case

  264. Ge0rG

    Tobias: I want to have a private group chat with my family members. Do you have an idea of the steps I have to perform to achieve that, client-side?

  265. Ge0rG

    Hint: none of them are described in 0045.

  266. Kev

    Ge0rG: You open Swift, you choose 'start chat' and drag all of them into it? :)

  267. Tobias

    just create a UUID MUC and invite the people you want to join

  268. Ge0rG

    Tobias: but I need to make that MUC invite-only and hidden.

  269. Ge0rG

    I think there are some forms to enable that.

  270. Tobias

    hidden yes, invite-only (why, who will know the JID?)

  271. Ge0rG

    Tobias: and then I need to add all the folks into the affiliation

  272. Ge0rG

    Tobias: so you are using the JID as a password?

  273. Tobias

    basically, yes

  274. Ge0rG

    Am I the only one who thinks this is significantly worse than following invites from a remote untrusted MUC?

  275. Tobias

    Ge0rG, what's your fear? people guessing the JID? that one of the participants leaks the JID?

  276. Ge0rG

    Tobias: accidental leaking of the JID

  277. Tobias

    how?

  278. Ge0rG

    Tobias: pastebinned client debug logs, server bugs

  279. Tobias

    what says the way you'd accidentially leak your JID wouldn't also leak the password if it were password protected?

  280. Ge0rG

    Tobias: JIDs are not generally considered "secret"

  281. Ge0rG

    Tobias: by violating that assumption, you are bringing your users one step closer to the abyss

  282. Ge0rG

    Tobias: leaking a password requires gross negligence

  283. SamWhited

    User probably shouldn't see or know that a JID exists (especially if it's really just a UUID), so I don't see why it matters.

  284. Tobias

    well...if you want to provide a true sense of security to your users you should do OMEMO in the MUC anyway

  285. Ge0rG

    Tobias: my point is that it's good to have additional guards

  286. Ge0rG

    and "closed affiliation" is one such

  287. Holger

    Tobias: For OMEMO you want to have the group members affiliated with the room anyway, though :-)

  288. Holger

    And simply for listing the offline members of your group chat.

  289. Holger

    And because you want that anyway, you can just as well make the room members-only (since *this* step is simple).

  290. Tobias

    i wish there were a XEP for taht

  291. Tobias

    *that

  292. Holger

    For what?

  293. Ge0rG

    Holger: for creating a members-only private MUC, I suppose

  294. Ge0rG

    I'm going to add that to yaxim soon, and write it down in the process. I'm interested in such an XEP as well

  295. Ge0rG

    Sufficiently interested to actually write it, if nobdy else *cough*daniel*cough* jumps in.

  296. Ge0rG

    https://wiki.xmpp.org/web/Easy_Group_Chats is the first iteration

  297. Ge0rG

    I've had another crazy idea: to use the "long description" of the MUC to store a link to an http-uploaded avatar

  298. Holger

    I think it's all in 0045 even though it wasn't written with that use-case in mind.

  299. Ge0rG

    Holger: you must be talking of https://xmpp.org/extensions/xep-0045.html#createroom-instant

  300. Holger

    (Except for an option to enable MUC MAM for servers who want to make this configurable.)

  301. Holger

    Ge0rG, no I wasn't suggesting an instant room. Maybe I'm missing something but what I have in mind is simply using a plain members-only room with MAM for private/presence-less group chat.

  302. Ge0rG

    Holger: and where is that written down in the XEP?

  303. Ge0rG

    I'm not quite sure what the use case of the 0045 "instant room" is, except for being comparably bad to instant soup.

  304. Holger

    Only the building blocks are there of course. It doesn't say "to create a private group chat, do this and that".

  305. Ge0rG

    Holger: but I want it to be in there.

  306. Ge0rG

    Holger: your statement is comparable to "all the building blocks for a group chat are in rfc 6120+21" :P

  307. Holger

    Ge0rG: I don't think that's comparable; 0045 adds protocol on top of the RFCs while my point is that you don't really need anything on top of 0045. But I see how a document explaining how to use 0045 to implement group chat would be useful.

  308. Ge0rG

    Holger: I would even 1-up that and say that 0045 should contain it

  309. Ge0rG

    maybe the council will not be strictly opposed to adding a new informational section to 0045

  310. Holger

    Sounds good to me.

  311. Ge0rG

    But first, I need to sort out #418 and #436

  312. Bunneh

    Ge0rG: XEP-0280: Add 'Usability Considerations' section #418 https://github.com/xsf/xeps/pull/418

  313. Holger

    And maybe #204 should be sorted out first as well :-)

  314. Bunneh

    Holger: XEP-0045: Define option name for enabling/disabling MAM #204 https://github.com/xsf/xeps/pull/204

  315. Ge0rG

    Holger: btw, being a server developer. Would you rather prefer more rules in 0280 clarifying what to do with [xep 0184] acks and [xep 0333] states, or have those two contain explicit <copy> hints?

  316. Holger

    I think adding more rules to 0280 modules is wrong.

  317. Zash

    +1

  318. MattJ

    +2

  319. jonasw

    https://xkcd.com/1810/ is sad.

  320. intosi

    +3

  321. Ge0rG

    case in point: 0184 does not mandate to use type=chat

  322. Holger

    Indeed. I use local patches that add rules to fix such things :-/

  323. Ge0rG

    but Kev said that we shall not rely on remote clients telling us what to do

  324. Holger

    And I disagree, at least when it comes to addressing accounts vs. individual devices.

  325. SamWhited

    Does anyone here have any idea how communication with IANA should work? I've been googling things like "IANA registration procedure" and "IANA expert review rules" and so far everyting is completely undocumented and worthless as usual⁢… *grumble, grumble*

  326. Zash

    Email someone. ???, PROFIT!

  327. SamWhited

    I found one old document that explicitly said that IANA procedures were currently not documented, so I'm just about ready to assume taht's still right, everything is tribal knowledge, and then just start spamming people until someone updaets the registry.

  328. Guus

    hargh - the US went to/from DST?

  329. intosi

    Yup.

  330. SamWhited

    Guus: Yup; be warned, everyone on this side of the pond is confused and grumpty today (actually, that's most days, but *more so* today)

  331. Guus

    Which explains why this meet is pretty empty...

  332. intosi

    They probably measure DST in furlongs per fortnight or something.

  333. Guus

    It's bad enough that we have DST in the first place - but everyone having a different date when it kicks in does not help either...

  334. intosi

    DST: collectively tricking your employers into accepting it's okay to start and leave an hour earlier.

  335. Ge0rG

    on a slightly related note, I'd really love board meetings to be one hour earlier.

  336. SamWhited

    Oh typical, and the IANA contact apparently doesn't work for Cisco anymore so the only email listed is broken.

  337. SamWhited

    Found a personal email; let's try that.

  338. SamWhited

    Oh no, matt already forwarded it. Convenient.

  339. efrit

    https://xkcd.com/1810/

  340. moparisthebest

    SamWhited: sorry, I can't help but feel this is all my fault :-)