flowpep.> I find the current experimental XEP updating flow a bit weird.
Yep, it is not ideal that some big changes to experimental XEPs get merged without asking for feedback first
archas left
archas joined
jonas’why?
jonas’experimental XEPs shouldn’t be deployed either way :>
flowdoesn't matter, gathering feedback prior merge is still sensible as it potentially improves the XEP while avoiding frequent namespace bumps
jonas’versions are cheap if nothing is deployed :)
flowno they are not
NeustradamusThere is a problem to with inbox folder, there are not redirection to official XEPs...
jonas’Neustradamus, Thanks! Now make a PR to fix it.
flowI also question the sentiment that experimental XEPs shouldn't get deployed, at least for certain definitions of deployed. you obviously want to have them deployed in experimental setups
jubalhhas joined
NeustradamusIt is not up-to-date but I have listed here: https://github.com/xsf/xmpp.org/issues/421
xeckshas joined
stpeterhas joined
stpeterhas left
contrapunctushas joined
jonas’Neustradamus, that’s an issue, not a PR.
archas left
Neustradamusjonas’: I have said, I have listed ;)
jonas’and I said we need a PR to fix it
jonas’not an issue
jonas’issues are worthless if there’s no one working on it.
jubalhhas left
contrapunctushas left
contrapunctushas joined
contrapunctushas left
sonnyhas left
contrapunctushas joined
stpeterhas joined
stpeterhas left
j.rhas left
nycohas left
nycohas joined
govanifyhas left
robertooohas joined
j.rhas joined
rionhas left
emushas joined
j.rhas left
j.rhas joined
eevvoorhas joined
rionhas joined
Maxhas left
Maxhas joined
goffihas joined
goffihas left
stpeterhas joined
stpeterhas left
goffihas joined
Steve Killehas left
Kevhas left
Steve Killehas joined
Kevhas joined
LNJhas left
sonnyhas joined
kevinhas joined
Danielhas left
Danielhas joined
stpeterhas joined
stpeterhas left
Maxhas left
Maxhas joined
eevvoorhas left
eevvoorhas joined
eevvoorhas left
jubalhhas joined
goffihas left
goffihas joined
kevinhas left
stpeterhas joined
stpeterhas left
jubalhhas left
eevvoorhas joined
alexishas left
alexishas joined
lovetoxhas left
stpeterhas joined
stpeterhas left
pep.flow: I wasn't talking about namespace bumps, even though I disagree about jonas’' “nothing gets deployed”, it's really all just a waste of time for editors not to leave a short period of time here for authors to hear/incorporate feedback :(
mukt2has left
marcMattJ: are you interested in the 401 discussion?
Zashhttps://xmpp.org/extensions/xep-0191.html#example-9
This error you should get when you send a stanza to a JID you yourself have blocked, it should have an error/@by attribute of the account, right?
flowpep., I know that you didn't talk about namespace bump, I just mentioned it as consequence of this. To be fair, even if editors would keep PRs open for longer period of time to gather feedback, your process does not make it easy to review the proposed changes
flowZash, I think there is no reason it couldn't have the 'by' attribute. I haven't read the spec if it is required thoguh✎
flowZash, I think there is no reason it couldn't have the 'by' attribute. I haven't read the spec if it is required though ✏
pep.flow: agreed about the reviews
flowpep., \o/ ;)
lskdjfhas joined
lskdjfhas left
krauqhas left
lovetoxhas joined
lskdjfhas joined
krauqhas joined
MattJmarc [11:21]:
> MattJ: are you interested in the 401 discussion?
For sure!
pep.if that's a public discussion I'll definitely read it :)
etacan you use chat markers in MUC?
etaI tried and the clients I'm using don't seem to care about the markers
marcMattJ: didn't you get the invitation?
MattJMaybe, MUC invitation?
ZashI tried sending you one too
MattJNot sure if yaxim supports them
MattJOr maybe my firewall rules
ZashGe0rG, fix it
pep.eta: I think it's done in some conditions. I merged MattJ 's PR re 0333 in MUC. waiting for iteam to pull the updates
marcMattJ: I tried to reinvite you :-/
etapep., oh right, apparently you might need to include the 'id' field in the <displayed/> element
etathat's odd
etaoh wait, nvm, you always do that
etapep., is there a link to that PR?
pep.eta, https://xmpp.org/extensions/xep-0333.html#appendix-revs it's live now :)
pep.https://github.com/xsf/xeps/pull/927 PR
etapep., oh, you need unique and stable stanza IDs
Ge0rGthere should be a way to pay the unicode consortium to add *new* characters.
adiaholic_has joined
DanielI'm sure there is
pep.bribery?
pep.lobbying?
DanielLittle bit of both
Ge0rGnah, they demand proof of importance or somesuch
pep.Ge0rG, "My brand is very important!"
Ge0rGkinda-sorta
goffihas left
YagizaIt seems all the mentions about message type are removed. But section 8.1 says that "Only Messages that can be displayed in a chat SHOULD be markable".
serge90has left
serge90has joined
YagizaDoes that mean that I should not set "type" attribute for a chat marker Message and if my client displays Normal message not in a chat but in a separate windows, I should no make Normal messages markable?
bearhas left
bearhas joined
BlueThat's actually a very sad thing about proof of importance. The wikipedia is into removing the article in russian about fediverse due to the lack of importance
mukt2has left
andyhas left
serge90has left
stpeterhas joined
stpeterhas left
serge90has joined
Jeybehas left
Jeybehas joined
Neustradamushas left
Neustradamushas joined
serge90has left
serge90has joined
jubalhhas left
andyhas joined
Jeybehas left
Jeybehas joined
serge90has left
serge90has joined
Jeybehas left
Jeybehas joined
serge90has left
serge90has joined
Jeybehas left
Jeybehas joined
serge90has left
vanitasvitaehas left
serge90has joined
MattJYagiza, I'm not sure I understand. I made the last update to the XEP, I didn't remove anything, I only added.
YagizaMattJ, I know. It seems that part was removed before your last update.
jubalhhas joined
mukt2has joined
MattJYagiza, I don't see any such changes
MattJIt looks like it has all been typo fixes and state changes since 2013
serge90has left
eevvoorhas joined
serge90has joined
MattJYagiza, hmm. Are you maybe confusing it with XEP-0085: Chat State Notifications?
MattJThat one discusses types
vanitasvitaehas joined
serge90has left
Jeybehas left
serge90has joined
Jeybehas joined
Maxhas left
SamWhitedhas joined
Maxhas joined
SamWhitedQuick question to get an overview of what people here think: When writing https://xmpp.org/extensions/inbox/password-storage.html I specified that SCRAM should be used because RFC 6120 mandates it anyways. However, I tend to think it would be better to start phasing it out and just using PLAIN, so maybe it's best if I don't add requirements for SCRAM-SHA-256. What do people think?
HolgerI'm all for it but am not sure you'll easily get a consensus on that 😉
serge90has left
serge90has joined
jonas’SamWhited, I think this should be an RFC
SamWhitedThe main reasons I consider PLAIN to be a better option are that it makes the password hash more agile (it's easy to update it to use a new hash, or a higher workfactor on login), it makes it so that server policy can contain password requirements like a minimum length and have a blacklist of common passwords (eg. it can reject "passw0rd", etc.)
jonas’not a XEP
ZashCan an Informational XEP even make such demands?
jonas’it’s not really specific to XMPP, is it?
SamWhitedjonas’: I disagree, those are too hard for us to update regularly.
Jeybehas left
SamWhitedZash: it's just recommendations. I did feel that RFC 2119 language was important to distinguish the importance of various bits of the XEP, but at the end of the day it is informational
Zash> start phasing [SCRAM] out and just using PLAIN
Strongly disagree
stpeterhas joined
stpeterhas left
HolgerOne downside is that hash recalculation is expensive so more prone to DoS.
ZashI'd rather get rid of PLAIN and use only SCRAM
andyhas left
SamWhitedZash: why? As far as I can tell PLAIN is much better in all the ways that really matter (eg. in terms of common attacks that can be prevented). The property of not sending the actual password to the server is kind of nice, but also that isn't where passwords are normally attacked
SamWhitedHolger: that's a fair point, but then again web servers always seem to manage to do it okay
ZashSo strong is my disagreement that I can't put it into words
ZashSamWhited, you mean we should switch to OAuth?
YagizaMattJ, yes, maybe
Ge0rGSending passwords to the server requires storing them on the client though, and this is a very common stealing vector.
SamWhitedGe0rG: also a good point, adding that to my pros/cons list
Zash"The web does it" is not an argument that's going to work on me.
ZashNot unless it's "bring back XHTML-IM"
Ge0rGOTOH, you need to store _something_ on the client, and that will be usable to login to xmpp. However, it won't be usable to login into your Gmail
jonas’but surely everyone uses separate credentials for all the things!!k
ZashSCRAM lets you store some magic hash on the client and login with that.
SamWhitedIt's not an argument for "we should do it because we need to do what the web does", it's a counterpoint that it doesn't seem to lead to DOS' in practice
ZashWithout doing the *expensive* PBKDF2 operation again
ZashAnd without the server doing that either
Ge0rGMmmhmmm! Magic hash!
ZashJust like 5 hash operations and some XOR magic and you're golden
ZashEven if you set the iteration count to a larger number than I'll bother typing out
serge90has left
serge90has joined
vanitasvitaehas left
L29Ahhas joined
vanitasvitaehas joined
SamWhitedSo rehashing may be expensive, and that's sad, but it's not a security issue so I'm not sure how much I care (unless there were literally no other common security issues to worry about). Requiring plaintext on the client is one, so I guess the question is: is that more common than not being able to set a password policy on the server or passwords being broken because SCRAm provides no agility for hashes and work factors
andyhas joined
serge90has left
serge90has joined
SamWhitedMy guess is that the latter are much more common. In particular, letting servers define a blacklist (no "passw0rd", "aaaa", a dump downloaded from a recent <common web service> breach, etc.) is probably the biggest single way people break into accounts
ZashThis is why we need SASL2, which was supposed to provide credential upgrades and the like.
SamWhitedYah, if we could at least get that problem solved it would be good. Not being able to set server policy seems much more dangerous than anything else though, and I think that's just not solvable with SCRAM.
SamWhitedI suppose I could mandate that clients all have a policy for disallowing common passwords and what not ("mandate" meaning "if you're following this XEPs advice, do this please", of course)
SamWhitedBut that feels wrong and less likely to be widely adopted.
ZashIt's not solvable with SCRAM doesn't mean SCRAM needs to go.
ZashIt's not like you send SCRAM hashes from the client to register or change password, all that's by sending the plain text already.
SamWhitedAhh, that's a good point that I was stupidly forgetting.
SamWhitedOkay, so maybe it's just the agility thing and promoting SASL2 is the way to go
ZashThe pains with upgrading to SCRAM-SHA-256 is more implementation issue and that you need the plain text password again
Ge0rGZash: did you just say PLAIN auth? :D
Zashno
andyhas left
andyhas joined
ZashI mean Corporate Enterprise Mandatory Password Change Policy
SamWhitedOkay, thanks, that's what I needed to get out of this. I'm convinced for now; leaving it as is. Thanks for sanity checking me (and finding me insane)
serge90has left
j.rhas left
SamWhitedI should re-read SASL2. Did an experimental implementation of it when it came out, but I don't recall the details.
serge90has joined
jonas’I still need convincing that this is a thing concerning XMPP specifically
SamWhitedDoes it provide a way to force reset passwords? That seems like the most important thing to me
SamWhitedjonas’: it's not concerning XMPP specifically
jonas’why is this a XEP then?
jonas’an XMPP Extension Proposal document
ZashYou need some signal to say "hey, password change time", if you receive the password encoded in SASL PLAIN doesn't matter
ZashWithout letting clients fall victim to MITM
SamWhitedjonas’: because the XSF is in a position to make recommendations for the public jabber network and it's much better if people can get them in one place instead of all over the place and specific bits of it may be specific and common problems when implementing things for the Jabber network, eg. how to handle PLAIN alongside SCRAM-SHA-1 which are both mandated by RFC 6120)
SamWhitedthat's not true, PLAIN isn't mandated by 6120 IIRC, but it's common to implement in Jabber alongside SCRAM-SHA-1 for compatibility with the widest range of clients, so having a recommendation for how to do that is good.
SamWhitedAnother example is the PBKDF2 iteration count. Right now most people use 4096 which is rather outdated (NIST and OWASP recommend 10000). If you look around on the web you'll find a mix of recommendations for various numbers, but which one applies to the Jabber network? Is it a low security environment or a high security environment? Should I use 4096, 10k, or 100k?
serge90has left
pep.Zash, any clues of how to use Coporate Enterprise Mandatory Password Change sasl policy without sending PLAIN? or was PLAIN assumed
serge90has joined
SamWhitedThis document clarifies that, even though you're right, technically PBKDF2 iteration count isn't specific to jabber.
pep.I know corporate setups can require password policies, but I'd prefer encouraging SCRAM also fwiw, even during account creation/password change (where it's not used atm)
alexishas left
pep.Ideally I'd use client certs, but for now we all have to deal with passwords..
SamWhitedpep. you can't mandate it during password change or you lose the ability to be agile and then when your password hashing mechanism is broken all your users get their passwords stolen. This is *much* worse than the server getting your password once in a blue moon.
pep.once and for all you mean
pep.Not entirely sure what you mean by not being able to mandate it during password change
SamWhitedYou can't mandate using SCRAM or something during password change, like you were suggesting, I mean.
pep.Ah otherwise I can't rehash myself
alexishas joined
SamWhitedHash and work factor agility is the most important thing, in my mind. Right now we don't have that and it's a major problem.
SamWhitedHowever, if SASL2 provides a way to say "you have to reset your password" or "you need to rehash with this iteration count and HMAC hash" that solves the problem nicely in my mind.
serge90has left
pep.But via requiring another channel I can clear the hash/password altogether and for a reset via that other channel
serge90has joined
SamWhitedpep.: didn't understand that bit about another channel, sorry?
pep.email etc.
ZashIf SASL2 lets you say "reset your password please" *after* you authed, then it's better than forcing PLAIN auth.
alexishas left
SamWhitedZash: right, definitely after auth :)
pep.But yeah I would prefer what Zash just said
ZashThen you can use SCRAM mutual auth magic to be sure you're giving the new password to someone who knew your previous password
Kev*once* knew, I think.
j.rhas joined
SamWhitedAnyways, got what I needed. Ping me via PM or email or something if you have more suggestions for the best practices doc. Thanks again!
pep.SamWhited, questions on IBR2
SamWhitedpep. good timing, I was just about to /part. What do you need?
stpeterhas joined
stpeterhas left
pep.You specify a way to do the register procedure via <iq>, does that mean I can register an account after bind? Or is it specifically for components?
serge90has left
serge90has joined
SamWhitedpep. yah, that all needs to be flushed out a bit more. The idea was to make it compatible with components, but sure, if you're an admin and want to register some accounts for somebody it could be used to make that possible after bind
SamWhitedWe'd probably want to add a discovery mechanism for that though so that servers could decide whether to implement it or not. And it should probably be ad-hoc based instead, but I'm not sure if that should all go in this XEP or a separate one.
pep.ok
SamWhitedBye for real now; thanks again for the discussion on PLAIN v SCRAM!
SamWhitedhas left
serge90has left
serge90has joined
andyhas left
serge90has left
jonas’has left
serge90has joined
jonas’has joined
andyhas joined
alexishas joined
serge90has left
serge90has joined
werdanhas left
serge90has left
serge90has joined
Shellhas left
andyhas left
Maxhas left
Maxhas joined
serge90has left
serge90has joined
andyhas joined
serge90has left
serge90has joined
andrey.ghas left
serge90has left
goffihas joined
serge90has joined
bearhas left
serge90has left
serge90has joined
Jeybehas joined
serge90has left
serge90has joined
serge90has left
serge90has joined
Neustradamushas left
Neustradamushas joined
serge90has left
serge90has joined
Nekithas left
serge90has left
serge90has joined
mukt2has left
eevvoorhas left
adiaholic_has left
adiaholic_has joined
murabitohas left
pdurbinhas joined
serge90has left
serge90has joined
lovetoxhas left
mukt2has joined
adiaholic_has left
adiaholic_has joined
pep.Is there a way to maybe break the fork relation between linkmauve/memberbot and xsf/memberbot?
pep.So I get suggested by default to PR against xsf/memberbot
serge90has left
pep.And github is sloooooow
serge90has joined
pep."We are investigating degradations to GitHub.com."
flowpep., you can ask github to change the primary repo
flowi've done that in the past
flowsimply write them a mail
pep.you can do that with a simple click in gitlab :/
serge90has left
lovetoxhas joined
serge90has joined
pep.Also I'm no owner of that repo so maybe they will just tell me off
pep.MattJ, ^ (?)
bearhas joined
jonas’I don’t seem to wield power on that repo either.
serge90has left
serge90has joined
Vaulorhas left
Sevehas left
lovetoxhas left
jubalhhas left
serge90has left
serge90has joined
Sevehas joined
Vaulorhas joined
serge90has left
serge90has joined
serge90has left
serge90has joined
Shellhas joined
serge90has left
serge90has joined
serge90has left
serge90has joined
Ge0rG!XSF_Martin [18:51]:
> Why GIF?
The patent has expired. GIF is free now!
Yagizahas left
serge90has left
serge90has joined
Mikaelahas left
Mikaelahas joined
!XSF_Martinhas left
!XSF_Martinhas joined
!XSF_Martinhas left
!XSF_Martinhas joined
serge90has left
serge90has joined
pdurbinhas joined
govanifyhas joined
serge90has left
serge90has joined
pdurbinhas left
serge90has left
serge90has joined
serge90has left
serge90has joined
serge90has left
serge90has joined
debaclehas joined
alexishas left
serge90has left
serge90has joined
lovetoxhas joined
serge90has left
serge90has joined
Shellhas left
Shellhas joined
serge90has left
serge90has joined
LNJhas joined
Marandahas left
Marandahas joined
Shellhas left
xeckshas left
jubalhhas joined
serge90has left
serge90has joined
Shellhas joined
Shellhas left
xeckshas joined
lovetoxhas left
serge90has left
serge90has joined
werdanhas left
serge90has left
serge90has joined
Danielhas left
Danielhas joined
Jeybehas left
Jeybehas joined
Danielhas left
Danielhas joined
Danielhas left
Danielhas joined
serge90has left
Maxhas left
serge90has joined
Maxhas joined
jubalhhas left
serge90has left
serge90has joined
werdanhas joined
serge90has left
serge90has joined
serge90has left
serge90has joined
eevvoorhas joined
serge90has left
serge90has joined
Mikaelahas left
MattJI've sent Github a request
pep.Thanks! :)
serge90has left
serge90has joined
stpeterhas joined
stpeterhas left
mukt2has left
pep.These should be easy changes:
https://github.com/xsf/memberbot/pull/2
https://github.com/xsf/memberbot/pull/3
serge90has left
serge90has joined
yohas joined
mukt2has joined
yohas left
serge90has left
serge90has joined
pdurbinhas joined
serge90has left
serge90has joined
werdanhas left
serge90has left
serge90has joined
jubalhhas joined
lovetoxhas joined
adiaholic_has left
adiaholic_has joined
Danielhas left
Danielhas joined
serge90has left
serge90has joined
pdurbinhas left
Shellhas joined
serge90has left
serge90has joined
mukt2has left
mukt2has joined
Danielhas left
Danielhas joined
Nekithas joined
mukt2has left
Shellhas left
Shellhas joined
mukt2has joined
DebXWoodyhas left
serge90has left
serge90has joined
adiaholic_has left
adiaholic_has joined
Danielhas left
Danielhas joined
serge90has left
serge90has joined
jubalhhas left
Danielhas left
Danielhas joined
robertooohas left
serge90has left
Danielhas left
Danielhas joined
serge90has joined
Danielhas left
Danielhas joined
MattJThat email came out longer than I planned
SyndaceAwesome, thanks!&
Shellhas left
Shellhas joined
serge90has left
SyndaceI'm a little surprised that you don't see a difference between responses and actions, maybe I'm still missing something important. I think the two use-cases of memberbot and and mercurial (:D) bot are already an example of why these two are separate, aren't they? One of them you only want for the last message, the other you want for all (or more) messages. One of them you want with backward compatibility using only plaintext, the other one you want with unique ids so that multiple messages are flexibly possible.
serge90has joined
Danielhas left
Danielhas joined
waqashas joined
Danielhas left
Danielhas joined
mukt2has left
mukt2has joined
lovetoxhas left
Danielhas left
Danielhas joined
SyndaceYou could merge both and then define that responses that define a body may only be available on the most recent message.
lorddavidiiihas left
lorddavidiiihas joined
SyndaceI'd imagine you'd end up with a set of rules that depend on the body to be there or not, essentially splitting the merged element based on that. But that might just be wrong?
serge90has left
serge90has joined
serge90has left
serge90has joined
serge90has left
serge90has joined
Danielhas left
Danielhas joined
Jeybehas left
Jeybehas joined
Danielhas left
Danielhas joined
Danielhas left
Danielhas joined
serge90has left
serge90has joined
serge90has left
etahas left
etahas joined
serge90has joined
serge90has left
MattJI don't think I necessarily agree that actions can't have a body
MattJ"!merge 245" seems like a good example
serge90has joined
emushas left
alexishas joined
pep."merge !245" :p
Zash!merge !245
Zash!merge!!245!!!
pep.hmm I wasn't even picturing "normal" bot commands using this tbh
pep.In general I'd also prefer bots to use ad-hoc I think
Zashin muc?
pep.dunno, it just rejoins my usual rants about semantics in body :P
pep.Even though with a bot you can generally make that more obvious and slightly restricted
serge90has left
serge90has joined
serge90has left
serge90has joined
MattJWhen one of the people proposing forms or ad-hoc commands goes and implements either in one of the mobile clients in a nice way, I'll listen
ZashShall I dig up my Buttons implementation?
ZashHad a working prototype hacked up in JabberCat back when I wrote the protoxep
Syndace> "!merge 245" seems like a good example
It is a good example, there is no reason to forbid this. But how to handle this cleanly. Have an "unique" flag on each <response>, if set allow selecting the response even if it's not the most recent message, if not set limit to the most recent message?
SyndaceOr actually, my argument was that a bot can totally still accept this, just that there is no button for it
serge90has left
serge90has joined
SyndaceThe button would say "merge" and send an <action-selected> with the corresponding id, the bot could obviously still accept a manually written "!merge 45"
MattJSure. But I see no reason to hide the button either
MattJAnd as noted there is UX weirdness if buttons just disappear
SyndaceNo it wouldn't be hidden, just the button would not generate the "!merge 45" output
MattJWhy not?
SyndaceNo hard reason. It probably doesn't have to, because the mercurial bot will send a "45 merged by foo" notification as soon as you click "merge"
ZashMattJ, question about room activity indicators: Is it supposed to only work while the client is online?
MattJYes
MattJWhich is why it uses presence
ZashMhm
serge90has left
serge90has joined
wurstsalathas left
SyndaceMy idea was that the bot knows best when to print stuff and when not to. Thus the action buttons would not print anything, because the bot can just do so with much finer control.
MattJThat's kinda my reasoning for giving it the decision about whether there should be a <body> in the user response
pep.MattJ, I'm not really thinking about mobile right now :)
emushas joined
pep.definitely not my main use-case
MattJpep.: non-mobile is not this protocol's main use case... console users are used to typing ;)
pep.But accepting and having this buttons xep being used does bring "concerns"
pep.As dwd said
MattJ"concerns"
pep.> So I can see that these are useful, but I'm worried they'll end up baking in a data-as-text-body construction which is less than ideal, and tricky to move away from.
Nekithas left
Nekithas joined
ZashSo much text
MattJSorry, but that's what we have today
pep.Yeah and I don't like that either :/
serge90has left
serge90has joined
MattJI know you would like to replace all text messaging with semantic XML
MattJBut users don't care, sorry
pep.Users don't have to know, as usual
SyndaceTake the following scenario: a bot for voting. The votes of some members count double, for whatever reason. Now the bot could decide to only print votes of these double-weighted voters, and hide all single-weighted votes to prevent spam. While a little theoretical, that would only possible if the body isn't fixed in the <response>.
Tobiashas left
MattJSure, so it sets unique ids, no body, and echoes whatever it wants whenever it wants
pep.(fwiw, dave's quote here is a borderline argument in favour of XHTML-IM. I note :p)
SyndaceThe bot would decide what goes into the body. So why not just have the bot do the printing itself?
Sevehas left
MattJI think in most cases it will flow nicer if the response comes from the user rather than the bot. But I agree it depends on the use case
etahas left
etahas joined
MattJFeels borderline security-ish too
MattJSeeing Ralph write "+1" in a meeting is more reliable than seeing a not write "Ralph said +1"
SyndaceHaving the bot specify text that appears to be from the user?
MattJNot == bot, my phone refuses to recognise the word
serge90has left
SyndaceOh, I guess both directions can appear borderline security-ish :D
serge90has joined
pep.I'm sure ralph would be able to correct that itself if it happened
SyndaceClicking on "yes" and having "no" appear in the chat because the bot defined it that way is also weird
MattJTrue, that is definitely a consideration
Jeybehas left
Jeybehas joined
MattJAgreed, no UI should send a body the user isn't aware of
Syndaceokay. That's an argument for
a) removing labels from (what is now) <response>
b) not adding a body to (what is now) <action>
MattJBut you have to trust the bot either way
MattJOtherwise it will just echo the "wrong" thing
serge90has left
serge90has joined
Syndaceyes, you'd have to clarify that then followed by kicking the bot from the MUC :P
ZashCould recommend showing it in UI like "Merge (sends "merge #123")" or somesuch.
Zashor something something descriptions
serge90has left
serge90has joined
Jeybehas left
xsfhas joined
SyndaceI'd like to avoid mandating such kinds of UI details, though if you want something like that super hard I won't veto
serge90has left
serge90has joined
SyndaceI think the cleanest thing we can do is:
- Have buttons for plaintext responses display exactly what they will send
- Have buttons that trigger actions display what the action does
ZashYeah, protocol specifications should stay away from UI design, tho offering suggestions is fine.
paulhas left
MattJThere is plenty of precedent for UI requirements in security considerations ("This piece of information MUST be clearly visible to the user")
ZashI'm going to default to "that's silly"
MattJSyndace, makes sense I think
MattJBut we still need to figure out visibility I think
MattJe.g. now if I wanted to make an in-MUC voting bot, and I wanted to make quick responses for +1/-1, I can't detect what they are in response to
serge90has left
MattJThose kinds of buttons would need to be hidden if the bot sent a new voting item
SyndaceI imagined that the (action) buttons would be displayed right with the message they belong to
MattJand then people with clients that don't do actions can't vote?
MattJor they have to manually type +1 now, and we aren't able to offer them quick responses on mobile
Syndacethey could only vote via +1/-1 for the newest vote then, yes
ZashUnless! <delay/> tag something something
MattJLet's keep the awkward <delay/> tag out of it :)
Syndaceoh you're talking about clients that support only the quick response subset of the xep?
Zasheyes `~/src/xeps/origin-timestamps.md`
Syndacei.e. not the actions thing
MattJNo, I'm working on the assumption that clients would implement the whole thing
MattJBut probably not explaining myself well, tired
SyndaceOkay. Then if actions are used for +1/-1, people with supporting clients could also vote for older items. Which the bot would and should probably prevent. People with clients that don't support would have to manually type +1/-1 and have it count only to the most recent vote item
MattJYeah, you're right
serge90has joined
serge90has left
serge90has joined
ZashThat's usually not how voting works tho
goffihas left
SyndaceThere is a third option which is not covered currently: a quick response that is not limited to the most recent messrage, but maybe until it is explicitly ended.
MattJ> !vote
votebot> vote started.
*+1 and -1 quick responses appear for everybody*
someone> +1
anotherone> -1
MattJ> !done
votebot> vote done.
*quick responses disappear for everybody*
mukt2has left
MattJI worry about adding work for clients
MattJBut indeed, that is a possible solution
Syndaceyeah, that would probably be complicated.
Zash`<in-reply to="xmpp:id"/>`
MattJ(removing the merge button after merging a PR would be great)