[Standards] Re: Remove requirement to send disco#info feature in XEP-0030

2024-03-11 Thread Tedd Sterr
>From XEP-0001, regarding Final XEPs, "limited modifications may be made as 
>long as they are optional, backwards-compatible extensions rather than 
>modifications to the core protocol itself."

XEP-0030 requires that entities return "one or more  elements and 
one or more  elements", so the otherwise redundant 'disco#info' 
feature ensures this will always be the case, even in the (seemingly unlikely) 
situation where an entity somehow supports disco#info without supporting any 
additional features. So, is removing the requirement for this feature an 
optional, backwards-compatible extension?

An obvious, and maybe more realistic, retort is "but will it break anything?" 
So, would it cause problems for implementations if they were to receive a reply 
containing zero features (since they were originally implemented expecting 
there will always be at least one)? Equally, would implementations have 
problems calculating the caps hash (XEP-0115) with zero features (the algorithm 
doesn't explicitly account for this)?

It's also worth considering whether leaving it as-is causes harm. It's nice 
(desirable, even) to clean things and remove 'warts' like this, and there are 
likely many more scattered throughout the protocol, so it's worth noting for 
XMPP 2.0, but this has been the status quo for 22 years without being an issue.

As for benefits: many implementations would now be 'correct' for not 
complaining when the feature isn't present (if implementations don't follow the 
specification, just change the specification); and there is a minor reduction 
in data transferred from having one less feature, though that's less notable 
where XEP-0115 is used (and there may be an initial increase caused by most 
hashes now being unknown, until that settles.)

(Semi-relevant: https://github.com/xsf/xeps/pull/961 )

___
Standards mailing list -- standards@xmpp.org
To unsubscribe send an email to standards-le...@xmpp.org


[Standards] Re: Escape characters in XEP-0393: Message Styling

2024-01-23 Thread Tedd Sterr
Hi Werner,

This is not specific to the '\' character - any non-whitespace character will 
have the same effect (e.g. "this text*is not bold* "); as specified in section 
6.2:

"… The opening styling directive MUST be located at the beginning of the parent 
block, after a whitespace character, or after a different opening styling 
directive. …"

So there is no styling because the '*' is not immediately after a whitespace 
character.

However, the inclusion of a formal grammar would make implementing a parser 
easier and help to clarify cases like this.



(The reason for escaping with '\' comes from the C language, where it was 
useful to be able to represent ASCII control characters using printable 
characters, specifically "\n" to produce a line-feed, plus others; but then 
comes the need to represent a literal '\' character that is not an escape, and 
thus "\\" escapes a literal '\'. Escaping characters in the context of 
human-to-human communication seems less appropriate.)

___
Standards mailing list -- standards@xmpp.org
To unsubscribe send an email to standards-le...@xmpp.org


Re: [Standards] XEP-0359: Unique and Stable Stanza IDs, PR#1272 Add security consideration and

2023-02-25 Thread Tedd Sterr
In my imaginary world where all stanzas have UUIDs there would be no need for 
anyone else to add their own id because every stanza already has a unique id 
which is suitable for referencing in various archives (and the risk of 
collisions is acceptably close to zero.) Of course, that depends on trusting 
that everybody else is both competent and not malicious; while that is true 
most of the time, we still have to cover for the few times that it's not.

So, everyone adds their own id because they can't trust anyone else's ids, 
though those are still useful for referencing with the entities who added them. 
We should still aim to limit revealing ids to places where they are relevant, 
rather than piling multiple ids everywhere just because someone in the chain 
wanted one for their own purposes. I don't care what id you're using to store 
messages in your local archive, I could not use that information even if I 
wanted to, and arguably it's a data leak.


If I send a message to the MUC:


  ...


Then I should receive back:


  ...
  
  


I can cross-reference with the original message I sent using origin-id 
(uuid_001) because that is the id I used.
I can reference a message in the MUC by using stanza-id (uuid_002) because that 
is the id the MUC used.
If I want to reference a message in my server's archive, I can use message.id 
(uuid_003) because that is the id my server used; if there is no server archive 
then stanza-id.id will be the same as message.id (and stanza-id is duplication, 
but included for simplicity.)

And you should receive:


  ...
  


You can't reference the original message I sent, and there is no legitimate 
reason you should.
To reference a message in the MUC, you can use stanza-id (uuid_002).
And to reference a message in your server's archive, use message.id (uuid_004).

Each endpoint should add its own new uuid into message.id, since that's the one 
it recognises for referencing; and stanza-id is added to provide the id used by 
the original sender (the muc), rather than trying to use the same id in two 
different places for different purposes. If you like, there is an implicit 'by' 
on the stanza-id with the value equal to message.from (minus nick.)


Is the above something we can move towards, or are there practical reasons that 
it's not possible/realistic?
And is there a need for yet more ids to be exposed to genuinely interested 
parties?

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] XEP-0359: Unique and Stable Stanza IDs, PR#1272 Add security consideration and

2023-02-24 Thread Tedd Sterr
I think there may be some confusion and we're not even disagreeing about the 
same things; so, I'll state my thoughts more clearly.

The original sender of a message stanza SHOULD give it id=UUID. Unfortunately, 
this wasn't a requirement in the RFCs, so now we have various hacks to try to 
deal with that because we can't just fix the problem while maintaining 
compatibility.

In the case of MUC messages, the original sender IS the MUC, and not the 
client. The client sends its message to the MUC, and that message SHOULD have 
its own unique id, but the message which the MUC forwards to participants 
SHOULD be a new message with its own new unique id. But the client wants to 
cross-reference the message it sent with the one it receives, and so the MUC 
SHOULD also insert an origin-id with the client's original message id (only in 
the message it forwards to that client.)

Now, the above SHOULDs are my own preferences for an ideal world where we could 
have nice things, whereas in reality we maintain compatibility and add 'just 
one more' id in the hope it solves things.

In the above ideal world, MUC message ids can't be spoofed because they are 
assigned by the MUC itself. The MUC doesn't even need to care what id a client 
used because it assigns its own new id to any messages it sends - if a client 
does duplicate one then it only confuses itself in the origin-id (and nobody 
else sees that.) I understand that is effectively what you're trying to address 
with stanza-id, and it is a valid solution.

What I'm less sure of is the benefit 'by' actually brings in practice. If there 
are multiple stanza-ids then it obviously serves to differentiate them, but why 
the need for multiple? The client's id is the origin-id (so it can 
cross-reference with its archive) and the MUC's id is the stanza-id (so it can 
be referenced for reactions, etc.) Carbons shouldn't need yet another id.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] XEP-0359: Unique and Stable Stanza IDs, PR#1272 Add security consideration and

2023-02-22 Thread Tedd Sterr
> …this is the line of thought that neglects that we are working on a
> federated  system where we can not assume that every actor is faithful.
> ID assigned by the sending entity can potentially be observed by another
> malicious actor and be reproduced ("spoofed").
There is nothing stopping me from reproducing your stanza ids elsewhere, but 
that causes no problem unless there is interaction with an entity who already 
received a stanza with such an id - which it should be checking for anyway, 
regardless of 'by' value.

> Referencing messages via such IDs is hence worrisome at best, or simply
> insecure at worst.
Referencing messages by any non-encrypted value (or even message content, for 
that matter) is simply insecure; there is no way around that in a publicly 
federated network where any hop could potentially alter a message.

>  tries to mitigate this by the 'by' attribute, which denotes
> the entity that assigned the ID, for example a MUC. If the MUC behaves
> standard compliant, then it will reject (or at least sanitize) incoming
> messages containing a  with a 'by' attribute denoting its
> from the MUC.
Let's assume that every hop appends its own  because you can never 
fully trust that the previous one wasn't altered - which stanza-id does a 
recipient use? The only stanza-id you can reliably trust to be 'real' is the 
one you received the stanza from, and so all previous stanza-ids should be 
ignored, in which case each hop may as well strip and replace them with its 
own. In that case, you already know who the stanza-id is 'by' and it is the 
only one.

> Yes, MUCs could also spoof IDs, but at least you only have to trust the
> MUC and not everyone in the federated network to behave nice.
The MUC is the originator of the stanza in this case, so it should assign its 
own unique message id. The original sender, who directed the MUC to forward the 
message to room participants, will want to match up its sent message with the 
one it receives from the MUC - so then it's useful for the MUC to inform (only) 
the original sender "this was the id you used when you sent me this message" in 
the same forwarded message.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] XEP-0359: Unique and Stable Stanza IDs, PR#1272 Add security consideration and

2023-02-22 Thread Tedd Sterr
> > There is a very obvious solution to this which everyone seems to be
> > overlooking: we need a new element with a guaranteed unique, non-spoofed
> > UUID; should a server feel the need to do bad things, it can set the
> > 'spoofed' attribute to true and then clients can act accordingly.
> what entity would set that element? the sending client? the server of that
> client? the server of the receiving client?

It was meant to be a joke about the number of stanza id mechanisms - clearly, 
the solution is another stanza id mechanism! (I'd hoped the 'spoofed' attribute 
made it obvious I wasn't serious.)

But, being serious: the issue is that both clients and servers need an id for 
referring to stanzas, and if that id is dependably unique then it solves a 
number of difficulties; the reason we have problems is that the original 
RFC-defined 'id' attribute had no such requirements, and so id can't be 
depended upon.

So, if the originator of a stanza (sending client, usually) guarantees that its 
id is unique (and you also trust that guarantee) then there should be no reason 
for anyone else to add their own id mechanism - both the client and server can 
use the id for referencing (servers can still use their own internal ids for 
indexing and such, but the 'long' id is for all public-facing referencing), and 
then there's no need for the client to check which id the server gave the 
stanza (it's the same.)

XEP-0359 attempts to do exactly this, but it only works dependably if everyone 
uses it, and legacy clients don't/can't.

If a server does spoof ids for malicious purposes, there is no protection 
against this (without resorting to cryptographic signatures, which brings its 
own difficulties) and no amount of additional ids would help (it could spoof 
those too.)

XMPP 2.0 will solve all of these problems, of course.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] XEP-0359: Unique and Stable Stanza IDs, PR#1272 Add security consideration and

2023-02-22 Thread Tedd Sterr
There is a very obvious solution to this which everyone seems to be 
overlooking: we need a new element with a guaranteed unique, non-spoofed UUID; 
should a server feel the need to do bad things, it can set the 'spoofed' 
attribute to true and then clients can act accordingly.

Something like: 

Or in the case of server interference: 

Simple 


The informational guidance XEP is a good idea too.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] Proposed XMPP Extension: XMPP Compliance Suites 2023

2023-02-08 Thread Tedd Sterr
Without trying to delay this, considering the 'already late date'…

A few quick fixes:
- "A/V Calling" should be added to the list "(Core, Web, IM, and Mobile)" in 
both the Abstract and Introduction;
- 'Changes since …' is nice, but will eventually become longer than the main 
content; keep the most recent, and put the rest in an appendix.

And a few less quick fixes (if only so I can point to them again next year):
- most of my comments from the previous year [1] still stand;
- once upon a time, there was an idea [2] for moving away from yearly 
Compliance Suites to 'living documents' (one for current state and another for 
future); it maybe worth revisiting.


[1] https://mail.jabber.org/pipermail/standards/2021-September/038582.html
[2] https://mail.jabber.org/pipermail/standards/2019-April/036074.html

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] XEP-0444 update: restrict reactions

2023-01-08 Thread Tedd Sterr
> The other part this PR tries to address is to specify how clients should
> behave when they receive an error in reply to a reactions payload. I
> think that without clarification, the clients should "revert to the
> previous reaction state", but I proposed to make "empty my reactions for
> this message". Any feedback about this?

Removing all reactions just because a user unwittingly adds one too many seems 
like a bad experience; rejecting the extra(s) makes the most sense. A user then 
has the option of deciding whether the new reaction is important enough to 
warrant removing any (and which) of their previous reactions to fit it in.
0444 already provides a way to remove all reactions (send an empty 'reactions' 
element), so clients should already be able to do that if necessary.
The obvious omission is removing an individual reaction (where there are 
multiple), though this can be simulated by removing all and then adding back 
the wanted reactions (as ugly as that is.)

[Correction: new reactions replace all previous ones, so removing one or 
replacing one with another is simply a matter of sending the required list of 
reactions to replace the previous list.]

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] XEP-0444 update: restrict reactions

2023-01-08 Thread Tedd Sterr
> The other part this PR tries to address is to specify how clients should
> behave when they receive an error in reply to a reactions payload. I
> think that without clarification, the clients should "revert to the
> previous reaction state", but I proposed to make "empty my reactions for
> this message". Any feedback about this?

Removing all reactions just because a user unwittingly adds one too many seems 
like a bad experience; rejecting the extra(s) makes the most sense. A user then 
has the option of deciding whether the new reaction is important enough to 
warrant removing any (and which) of their previous reactions to fit it in.
0444 already provides a way to remove all reactions (send an empty 'reactions' 
element), so clients should already be able to do that if necessary.
The obvious omission is removing an individual reaction (where there are 
multiple), though this can be simulated by removing all and then adding back 
the wanted reactions (as ugly as that is.)

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] Proposed XMPP Extension: PubSub Social Feed

2022-11-02 Thread Tedd Sterr
> - what is this "Gallery profile" thing ? It looks like a terrible way to do
> photo galleries, ignoring all the work done by stuff like XEP-0447. Please, I
> see no good reason to have this.

I think people are misunderstanding the intention of this based purely on the 
name - it's not intended as a way to do a "photo gallery" but for providing a 
'gallery' of posts, each of which has an associated picture. The feature itself 
is useful and this is an adequate way to do it. While 'gallery' is an 
appropriate name for it, if it leads to misguided expectations of its purpose, 
maybe a different name would be preferable, e.g. showcase, or exhibition.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] The Editor intends to resign

2022-10-13 Thread Tedd Sterr
Jonas has had enough of Editor work is resigning - good!

If the rest of you reading this are feeling outraged that I would say such a 
thing - GOOD!

Now, before anyone jumps on me to say "How dare you say this! Jonas has worked 
tirelessly and done a superb job, and we'd be lucky to find anyone half as 
good," you are absolutely correct - he has and we would. Jonas has been 
extremely diligent, done amazing work, and put in far more time than he should 
have while doing what is largely a thankless task, even if the end result is 
appreciated. So, I have no doubt that I speak for everyone when I say thank you 
very much for everything. However, that doesn't change my point.

The Process (Editor or otherwise) should not fall apart because one person 
needs to take a break. Everybody needs a break from time-to-time, everybody 
_should_ take a break from time-to-time, and they should not have the guilt of 
'allowing' things to fail just because they need a change of scenery. No single 
person should be carrying all of that responsibility. The Editor process has 
been broken for some time and, despite repeated calls for help and "can we fix 
this?", little has changed. Jonas has covered up many of these deficiencies 
with manual work which he really shouldn't have even had to waste time doing; 
somebody else stepping up to sacrifice themselves on the same altar will not 
fix this. It needs to change.

So, Jonas, please take a break. Please walk away. Things will break - they 
should break. And you should not feel any guilt, shame, or remorse. This is a 
good thing that needs to happen because it won't get fixed until it's broken 
and causes inconvenience; while it can still be patched up with a little spit 
and manual work, it will, and so the problem persists.

Jonas has provided a convenient list of issues in need of solutions; I suggest 
anyone concerned by the impending doom should direct some effort towards 
remedying the situation. Anybody with strong opinions on automating a process 
who is not involved in maintaining that process can shut up.

We all have other responsibilities and this is voluntary for most of us, so the 
usual "I don't have spare time for that" will apply, but where does Jonas 
magically get all of this extra spare time to continue covering for the issues 
that the rest of us don't have the time to fix? It benefits us all, so we can 
all spare a little time to get it fixed.


P.S. For anyone else feeling burnt-out, please take a break - do something 
else; try a new hobby; go for a walk; stare at the clouds - the things you left 
will be right where you left them when (or if) you decide to return. The past 
few years have been difficult for everyone, for cumulative reasons; even if 
COVID hasn't affected you directly, it has had knock-on effects which most 
likely have - so feel no shame in needing to take the time to step away and 
take a breath until you feel fresh and motivated.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2022-07-27

2022-07-31 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-07-27?p=h#2022-07-27-896db7fe75bc4286

1) Roll Call
Present: Georg, Daniel, Jonas, Travis, Larma

Daniel apologises for missing last week, on account of finally falling victim 
to Covid; apparently, the experience really wasn't that great (0/5 stars; would 
not recommend.)

2) Agenda Bashing
None.

3) Editor's Update
(Repeating from last week)
* Last Call for XEP-0215 (External Service Discovery)
* Published XEP-0467 (XMPP over QUIC)
* Published XEP-0468 (WebSocket S2S)
* Proposed XMPP Extension: Pubsub Attachments
* Proposed XMPP Extension: Bookmark Pinning

Daniel notes that the Last Call for XEP-0215 (External Service Discovery) will 
be voted on next week, so people should read the XEP and leave feedback [1].

4a) Proposed XMPP Extension: Bookmark Pinning - 
https://xmpp.org/extensions/inbox/bookmark-pinning.html
Daniel: +1
Travis: +1
Jonas: +1
Georg: +1
Larma: +1

Georg asks whether this is orthogonal to autojoin - Jonas says it is. Georg 
wants to decorate his bookmarks with emoji.

4b) Proposed XMPP Extension: Pubsub Attachments - 
https://xmpp.org/extensions/inbox/pubsub-attachments.html
Daniel: +1
Travis: +1 (s/6\. discovering support/6. Discovering Support/)
Jonas: +1
Georg: [on-list]
Larma: +1

5) Pending Votes
None.

6) Date of Next
2022-08-03 1500 UTC

7) AOB
None.

8) Close
Thank you all. Thanks Daniel.


[1] https://mail.jabber.org/pipermail/standards/2022-July/038889.html

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2022-07-20

2022-07-21 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-07-20?p=h#2022-07-20-800b3c244c74f67c

1) Roll Call
Present: Travis, Jonas, Larma, Georg
Absconding: Daniel

2) Agenda Bashing
With no agenda and no Chair, Jonas proposes postponing the meeting, while also 
suggesting that everyone takes a look at the latest batch of Editor emails.

3) Editor's Update
* Last Call for XEP-0215 (External Service Discovery)
* Published XEP-0467 (XMPP over QUIC)
* Published XEP-0468 (WebSocket S2S)
* Proposed XMPP Extension: Pubsub Attachments
* Proposed XMPP Extension: Bookmark Pinning

4) Date of Next
2022-07-27 1500 UTC

5) Close

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2022-07-13

2022-07-14 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-07-13?p=h#2022-07-13-195925c6f401ec4c

1) Roll Call
Present: Georg, Larma, Daniel, Jonas
Idle: Travis

2) Agenda Bashing
None.

3) Editor's Update
None (Editor is currently working to publish stuff.)

4) Items for Voting
None.

5) Pending Votes
None.

6) Date of Next
2022-07-20 1500 UTC

7) AOB
None.

8) Close
Thank you everyone. Thanks Daniel.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2022-07-06

2022-07-07 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-07-06?p=h#2022-07-06-4c0b142619b1b6c0

1) Roll Call
Present: Travis, Daniel, Larma, Jonas
Apologies: Georg

2) Agenda Bashing
None.

3) Editor's Update
None.

Daniel mutters something cryptic about a last call and the number 215.

4) Items for Voting
None.

5) Pending Votes
Larma voted +1 on both "XMPP over QUIC" and "WebSocket S2S".

6) Date of Next
2022-07-13 1500 UTC

Larma is upgrading to a shiny new superfast fibre connection next week, which 
possibly means the only (barely) working connection for the rest of the month 
will be the mobile network.

7) AOB
Travis now needs to find the time to write the XEP to discover QUIC and 
WebSocket S2S - donations of spare time are invited [1].

8) Close
Thank you all. Thanks Daniel and all. Thanks all!


[1] https://www.buymeaminute.com/moparisthebest

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2022-06-29

2022-07-05 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-06-29?p=h#2022-06-29-aca5df0aa0c484ce

1) Roll Call
Present: Jonas, Travis, Daniel, Larma
Apologies: Georg

2) Agenda Bashing
None.

3) Editor's Update
None this week (Editor was sleepy.)

4) Items for Voting
None.

5) Pending Votes
(Georg voted on-list [1].)
Larma, on XMPP over QUIC; Daniel, Jonas, and Larma, on WebSocket S2S.

Daniel asks whether Travis would be willing to take up Peter's offer [2] of 
guidance through the tribulations of the RFC process - he would, though would 
prefer to keep them as XEPs in the short-term.

WebSocket S2S:
Jonas: -0 (should probably be an RFC; can't bring myself to vote *for* the 
concept of websocket s2s)
Daniel: -0 (should be an rfc)

Jonas won't veto if Council wants to develop this in Experimental before it 
moves to an RFC.
Daniel notes that this won't pass unless Larma specifically votes in favour.

Jonas seconds Georg's comments [1] on XMPP over QUIC, in particular the port 
numbers - Travis disagrees on changing the default ports and gestures towards 
ALPN (why reveal we are doing XMPP instead of HTTPS) - Jonas thinks a 
registration should be sought regardless, as it makes sense for non-multiplexed 
use cases.

6) Date of Next
2022-07-06 1500 UTC

Daniel is in a busy phase, but will try to make it.

7) AOB
None.

8) Close
Thank you all. Thanks all!


[1] https://mail.jabber.org/pipermail/standards/2022-June/038862.html
[2] https://mail.jabber.org/pipermail/standards/2022-June/038863.html

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2022-06-22

2022-07-05 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-06-22?p=h#2022-06-22-09b8686af2f96171

1) Roll Call
Present: Georg, Daniel, Jonas, Travis
Apologies: Larma

2) Agenda Bashing
None.

3) Editor's Update
* Proposed XMPP Extension: XMPP over QUIC
* Proposed XMPP Extension: WebSocket S2S

Daniel takes the opportunity to remind Editor of the XEP-0215 Last Call (no 
rush.)

4b) Proposed XMPP Extension: XMPP over QUIC - 
https://xmpp.org/extensions/inbox/xmpp-over-quic.html
Travis: +1 (as author)
Georg: [on-list]
Jonas: +1 (I like the idea)
Daniel: +1
Larma: [pending]

4a) Proposed XMPP Extension: WebSocket S2S - 
https://xmpp.org/extensions/inbox/websocket-s2s.html
As a developer, Daniel understands "just do everything rfc xyz is doing 
except…" in the Requirements, but isn't sure this is the correct form - the 
author, Travis, didn't want the risk of copying the wrong part or missing 
something. Jonas has ethical concerns and needs to ponder, though a proper 
section on 'Motivation' may convince him (noting this is currently entirely 
missing) - the author thinks that's covered in Use Cases.
Daniel asks whether anyone else feels that this belongs in an update of RFC 
7395 [1] - Jonas does too - the author expects both belong in RFCs, but is 
unfamiliar with that process. Daniel suggests Informational XEP as a cheap 
alternative; also notes the illegal use of an IETF namespace - Jonas suggests 
using 'urn:xmpp:…'.
The author points to RFC 7858 [2] as a prior art for "just do what RFC X says" 
- Daniel will have to read up on that before voting.
Daniel doesn't think creating an RFC is particularly hard, which seems like a 
better way to handle it - the author will have to look into that.
Daniel doesn't want to be the only one blocking this - Jonas is happy to be a 
second blocker, if needed.

Travis: +1 (as author)
Jonas: [on-list]
Georg: [on-list]
Daniel: [on-list]
Larma: [pending]

5) Pending Votes
None.

6) Date of Next
2022-06-29 1500 UTC

7) AOB
None.

8) Close
Thank you all. Thanks Daniel. Thanks all!


Kev notes that various things have, in the past, migrated from XEP to RFC and 
back again; doesn't think that starting as XEP and migrating to RFC would be 
the end of the world, unless Council/XSF lacks the ability to review sensibly 
(as is sometimes the case with security things.)


[1] https://datatracker.ietf.org/doc/html/rfc7395
[2] https://datatracker.ietf.org/doc/html/rfc7858

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2022-06-15

2022-07-05 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-06-15?p=h#2022-06-15-0abb68040a373c63

Tedd returns from the undead and starts burying Georg under a pile of old 
meeting minutes.

1) Roll Call
Present: Jonas, Daniel
Apologies: Travis, Georg, Larma

Daniel postpones the meeting due to lack of quorum; but still votes +1 on the 
XEP-0215 Last Call, and is willing to process feedback (with reference to 
Georg's blocking conditional vote.)

6) Date of Next
2022-06-22 1500 UTC

Jonas may lose all sense of time and could need extensive pinging.

8) Close
See you all next week.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2022-06-01

2022-07-05 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-06-01?p=h#2022-06-01-cbb53285137d9a07

1) Roll Call
Present: Travis, Jonas, Larma, Georg
Vacation: Daniel

2) Agenda Bashing
Nothing, apparently.

3) Editor's Update
None (a proto-XEP is in the pipeline.)

4) Last Call: XEP-0215 (External Service Discovery) - 
https://xmpp.org/extensions/xep-0215.html
Georg asks if there is a nominated Shepherd - Jonas suggest that as Daniel 
brought it up then it can be his problem.

Jonas: +1
Travis: +1
Larma: +1
Georg: +1 (on the condition that Daniel or somebody else volunteers to actually 
incorporate LC feedback)
Daniel: [pending]

Jonas questions Georg whether it's necessary to block just because nobody is 
incorporating the feedback immediately - Georg thinks feedback is best served 
fresh, and nobody will remember what was needed or why in two years - Jonas 
hopes those would be recorded in a mailing list thread. Georg starts scaring 
the younglings with stories of an XEP that once went through six Last Calls - 
Zash runs away screaming.

5) Date of Next
Jonas will be busy in Berlin [1], Daniel will still be on vacation, and Larma 
is uncertain - Jonas proposes skipping next week - Travis and Georg will be 
away the following week.

2022-06-15 1500 UTC

6) AOB
Georg wonders if anyone has seen the Board in recent weeks - Jonas thought they 
had a meeting last week, though there seems to be no trace. Georg wanted to put 
something onto their agenda - Jonas suggests writing an email.

7) Close
Thanks everyone. Thank you, Jonas.

Georg suddenly remembers an AOB item.

6.1) AOB Again
Georg hasn't seen any meeting minutes in a very long time - thinks it's time to 
ask for a volunteer - Jonas would participate in a rotating schedule between 
all Council members; since the others have already left, Jonas will try to 
remember to bring it up at the next meeting.

7.1) Close Again
Thanks, it was nice.


[1] https://openinfra.dev/summit/

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2022-05-25

2022-07-05 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-05-25?p=h#2022-05-25-d33f19e7a9f11f8f

1) Roll Call
Present: Jonas, Travis, Larma, Georg, Daniel

2) Agenda Bashing
None this week.

3) Editor's Update
None this week.

4) Items for Voting
None this week.

5) Pending Votes
None this week.

6) Date of Next
2022-06-01 1500 UTC

Jonas will be at the OpenInfra Summit [1] the week after and likely to be busy 
doing fearless stuff. Daniel will be on vacation for the next two weeks. Travis 
will be unavailable for the 15th. Larma has no idea where he will be for the 
next four weeks.
Daniel doesn't expect it will be busy - asks Jonas to chair next week, and 
possibly skip the week after - Jonas can probably do that; Daniel suggests 
deciding next week whether to skip the following meeting - Jonas can probably 
do that too. Daniel will send the agenda and a reminder to Jonas - Jonas thinks 
that would be excellent.

7) AOB
Daniel wants eventually to start a Last Call for XEP-0215 (External Service 
Discovery), but it's not urgent.

8) Close
Thanks Daniel.


[1] https://openinfra.dev/summit/

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2022-05-18

2022-07-05 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-05-18?p=h#2022-05-18-cfc2980836a99b54

1) Roll Call
Daniel, Georg, Jonas, Larma, Travis

2) Agenda Bashing
Georg is happy to see that there is an agenda.

3) Editor's Update
* Updated XEP-0365 (Server to Server communication over STANAG 5066 ARQ)
* Published XEP-0465 (Pubsub Public Subscriptions)
* Published XEP-0466 (Ephemeral Messages)

4) Items for Voting
Nothing new this week.

5) Pending Votes
None.

6) Date of Next
2022-05-25 1500 UTC

7) AOB
None.

8) Close
Thank you all. Thanks Daniel.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2022-05-11

2022-07-05 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-05-11?p=h#2022-05-11-0e82607eaf36d12f

Travis nudges Daniel to update the Security Considerations in XEP-0363 (HTTP 
File Upload); Travis still has four XEPs he'd like to write himself; Zash also 
has many to write, and others to fix; nobody knows when such miracles will 
happen.

1) Roll Call
Present: Georg, Travis, Larma, Jonas, Daniel

Daniel notes the very full non-existent agenda, consisting of no new votes and 
no pending votes.

2) AOB
None.

3) Date of Next
2022-05-18 1500 UTC

4) Close
Everyone thanks each other, hands are shaken, backs are patted, in the distance 
there is a small cheer; everyone leaves feeling satisfied at a job well done.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2022-05-04

2022-07-05 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-05-04?p=h#2022-05-04-dfbc8534490a72df

1) Roll Call
Present: Travis, Jonas, Daniel, Larma, Georg

2) Agenda Bashing
None.

3) Editor's Update
* Proposed XMPP Extension: Ephemeral Messages

4) Proposed XMPP Extension: Ephemeral Messages - 
https://xmpp.org/extensions/inbox/ephemeral-messages-v2.html
Travis thinks the author, Pep, said he was going to update it and change the 
name - Editor hasn't seen an update in the queue; Daniel would be fine with it 
being updated after the vote.

Jonas: +1 (good enough to move to experimental, even though it contains at 
least one error)
Georg: +1 (many questions, but none of them are blocking)
Daniel: +1
Travis: +1
Larma: +1 (to get it rolling)

5) Pending Votes
None.

6) Date of Next
2022-05-11 1500 UTC

7) AOB
None.

8) Close
Thank you all. Thanks Daniel. Thanks Daniel.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2022-04-27

2022-06-30 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-04-27?p=h#2022-04-27-3eba5833f9745303

1) Roll Call
Present: Larma, Daniel, Travis, Jonas
Apologies: Georg

Daniel proposes postponing, unless someone feels strongly about starting the 
vote on Ephemeral Messages today - Travis and Jonas would be on-list anyway.

2) Date of Next
2022-05-04 1500 UTC

Larma will be travelling, but can (try to) join.

3) Close

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2022-04-20

2022-06-30 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-04-20?p=h#2022-04-20-36d8ce0c7468bf92

1) Roll Call
Present: Jonas, Daniel, Travis, Larma
Apologies: Georg

2) Date of Next
2022-04-27 1500 UTC

7) AOB
Editor queries ideas for what to do with PR #1177 (Ephemeral messages -- Take 
2) - it's updating a rejected Proto-XEP for resubmission; asks whether there 
are objections to treating it as entirely new and letting it go through the 
process - Daniel and Travis (and Jonas) think that seems fine.

8) Close
Thanks!

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2022-04-13

2022-06-30 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-04-13?p=h#2022-04-13-e6a322ccadb5d94b

1) Roll Call
Present: Georg, Travis, Larma, Jonas, Daniel

2) Agenda Bashing
No bashing today.

3) Editor's Update
* Published Cookies as XEP-0464
* Updated XEP-0356 (Privileged Entity)
* Proposed XMPP Extension: Pubsub Public Subscriptions

4) Proposed XMPP Extension: Pubsub Public Subscriptions - 
https://xmpp.org/extensions/inbox/pubsub-public-subscriptions.html
Daniel: +1
Georg: +1
Larma: +1
Travis: +1 (lacking important security considerations, really need those added 
first thing after acceptance)
Jonas: +1 (what Travis said)

5) Pending Votes
None.

6) Date of Next
2022-04-20 1500 UTC

Larma might be on a train next week (unreliable connectivity expected.)

7) AOB
None.

8) Close
Thank you everyone. Thanks Daniel. Thanks Daniel. Thanks Daniel.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Delayed Council Minutes 2022-04-06

2022-06-30 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-04-06?p=h#2022-04-06-ce569d7ee164f613

Daniel notes that there is nothing on the non-existent agenda today.

1) Roll Call
Present: Travis, Daniel, Georg, Jonas
Late: Larma

2) Date of Next
2022-04-13 1500 UTC

Next week's agenda may even have actual content!

3) AOB
Travis suggests that Someone™ should update the Security Considerations in 
XEP-0363 (HTTP File Upload) - Daniel thinks he might be that someone.

4) Close
Thanks!

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Delayed Council Minutes 2022-03-30

2022-06-30 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-03-30?p=h#2022-03-30-6b5f019ea634050c

1) Roll Call
Present: Jonas, Travis, Daniel, Larma
Apologies: Georg

2) Agenda Bashing
Jonas possibly has something for AOB.

3) Editor's Update
None this week.

4) Items for Voting
None this week.

5) Pending Votes
None this week.

6) Date of Next
2022-04-06 1500 UTC

Jonas will be somewhat unavailable for the next seven days due to business 
stuff.

7) AOB
Jonas suggests asking for more XEPs to advance, and maybe review what's left of 
the previous shortlist.

8) Close
Thank you everyone. Thanks! Thanks!!!

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Delayed Council Minutes 2022-03-23

2022-06-30 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-03-23?p=h#2022-03-23-798e24a8b6dfe6e6

1) Roll Call
Present: Jonas, Travis, Daniel
Half-present: Georg
Non-present: Larma

Daniel notes the lack of Editor updates, new votes, and pending votes.

2) Date of Next
2022-03-30 1500 UTC

[Note the time change, as Europe will be on DST, technically making the meeting 
time one hour earlier for those outside of the change (thus back to 'normal' 
for those who changed earlier.)]

3) AOB
None.

4) Close
Thank you everyone.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Delayed Council Minutes 2022-03-16

2022-06-30 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-03-16?p=h#2022-03-16-5ed16d7b34810b0f

1) Roll Call
Present: Jonas, Larma, Daniel, Travis, Georg

2) Agenda Bashing
Nothing to bash.

3) Editor's Update
None this week.

4) Items for Voting
Georg made four PRs as a result of last week's discussion - everyone agrees 
they look editorial and to vote on them all at once; Georg considers them 
editorial too, but would really like to hear from implementers of 'sipub', if 
they exist.

4a) PR #1169 (XEP-0406: fix xmlns in example) - 
https://github.com/xsf/xeps/pull/1169
4b) PR #1170 (XEP-0087: fix xmlns in example) - 
https://github.com/xsf/xeps/pull/1170
4c) PR #1171 (XEP-0109: fix xmlns in example) - 
https://github.com/xsf/xeps/pull/1171
4d) PR #1172 (XEP-0072, XEP-0096, XEP-0214: fix xmlns in sipub examples) - 
https://github.com/xsf/xeps/pull/1172
Jonas: +1 (to me they're fine as editorial)
Travis: +1 (they look editorial)
Larma: +1
Daniel: +1
Georg: +1

5) Pending Votes
None.

6) Date of Next
2022-03-23 1600 UTC

[Note: DST is now in effect in North America, causing the meeting time to 
appear one hour later than normal; European DST will begin on the 27th.]

7) AOB
None.

7') Close
Thanks Daniel!
Thanks Daniel!
Thanks Daniel!
Thanks Daniel!

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Delayed Council Minutes 2022-03-09

2022-06-30 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-03-09?p=h#2022-03-09-f3d53928d1465034

1) Roll Call
Present: Travis, Georg, Jonas, Daniel, Larma

2) Agenda Bashing
lua: meeting.lua:9: attempt to get length of a nil value (global 'agenda')
stack traceback:
meeting.lua:9: in main chunk
[C]: in ?

3) Editor's Update
* Obsoleted XEP-0008 (IQ-Based Avatars)
* Obsoleted XEP-0038 (Icon Styles)
* Obsoleted XEP-0051 (Connection Transfer)
* Obsoleted XEP-0138 (Stream Compression)
* Obsoleted XEP-0229 (Stream Compression with LZW)
* Updated XEP-0115 (Entity Capabilities)
* Updated XEP-0156 (Discovering Alternative XMPP Connection Methods)
* Published PubSub Type Filtering as XEP-0462
* Published MUC Affiliations Versioning as XEP-0463

Jonas notes that some of the changes were due to security issues, so 
implementers should consider looking into them.

4) Items for Voting
Nothing new this week.

5) Pending Votes
None.

6) Date of Next
2022-03-16 1600 UTC

[Note: DST will be in effect in North America, causing the meeting time to 
appear one hour later than normal; European DST will begin on the 27th.]

7) AOB
Georg has been poking around XEPs and investigating namespaces, and found some 
inconsistencies (mostly in examples) - isn't sure if they're editorial or 
normative - Daniel says examples are never normative; Larma thinks the 
namespaces in examples should still be proper - Daniel agrees, but they can 
simply be fixed, so it's editorial.
Georg can prepare a PR, but would like to escalate each one to the respective 
XEP authors - which is what he wanted to discuss with Council - Daniel will add 
it to next week's agenda, but it just seems like fixing typos in examples and 
doesn't really need to go through Council. Georg checks whether Editor would 
prefer one big PR or seven million tiny ones - Editor prefers individual ones.

8) Close
Thanks Daniel. Thanks all.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Delayed Council Minutes 2022-03-02

2022-06-30 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-03-02?p=h#2022-03-02-f00da261ce36d367

1) Roll Call
Present: Travis, Jonas, Georg
Apologies: Daniel, Larma

2) Agenda Bashing
Nothing, apparently.

3) Editor's Update
Nada.

4) Items for Voting
{}

5) Pending Votes
Georg, on all the things.

PR #1163:
Georg: +1 (looks like the 0045 editorial f'up has been cleaned up)

MUC Affiliations Versioning:
Georg: +1 (looks good enough for experimental, but I'd rename "since" to 
"after" to make it less confusable with timestamps)

Jonas suggests raising that feedback on-list.
Georg would also prefer a sub-element of the 'x' element over namespace 
attributes.

PR #1168:
Georg asks if there is a CVE for XEP-0115 - Jonas doesn't think CVEs are for 
protocol vulnerabilities.
Georg: +1

PR #1158:
Georg: +1

PR #1159:
Georg: +1

6) Date of Next
2022-03-09 1600 UTC

7) AOB
Jonas would still like to discuss A/V Council meetings, but will postpone that 
until everyone is present.

8) Close
Thanks all. Thanks Jonas!

Georg is glad his interrogation is over.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Delayed Council Minutes 2022-02-23

2022-06-30 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-02-23?p=h#2022-02-23-315035328bad573b

1) Roll Call
Present: Jonas, Daniel, Larma, Travis
Driving-responsibly: Georg

2) Agenda Bashing
Travis adds his updated PRs from last week.

3) Editor's Update
None.

4a) PR #1168 (XEP-0115: mention the pre-image attacks in the XEP) - 
https://github.com/xsf/xeps/pull/1168
Daniel: +1
Travis: +1
Jonas: +1
Larma: +1
Georg: [pending]

4b) PR #1158 (Remove _xmppconnect DNS method from XEP-0156 and add warnings) - 
https://github.com/xsf/xeps/pull/1158
Travis: +1 (as author)
Daniel: +1
Larma: +1
Jonas: +1
Georg: [pending]

4c) PR #1159 (Obsolete and update Security Considerations for XEP-0138 and 
XEP-0229) - https://github.com/xsf/xeps/pull/1159
Travis: +1 (as author)
Daniel: +1
Larma: +1
Jonas: +1
Georg: [pending]

5) Pending Votes
Everyone, on PR #1163:
Daniel: +1
Travis: +1
Jonas: +1
Larma: +1

Daniel, on obsoleting 0008, 0038, and 0051: +1 to all three.
Jonas, on obsoleting 0038: +1

Georg, Jonas, and Travis, on MUC Affiliations Versioning:
Jonas: +1 (worth exploring in experimental)
Travis: +1 (still unsure about namespaced attributes but that's what 
experimental is for)

6) Council Meetings via A/V
Continuing the subject from last week.

Jonas thinks a regular high-bandwidth call would be nice, though it may not 
suit everyone, and there are concerns about transparency; also agrees that 
doing it for every meeting would be problematic. Given that Georg was the 
strongest opponent, it doesn't make sense to discuss this without his presence.

7) Date of Next
2022-03-02 1600 UTC

Daniel will be on vacation - will send an agenda, but ask if Jonas can chair - 
Jonas accepts.
Larma will also be travelling, but might still make it.

8) AOB
None.

9) Close
Thank you everyone. Thanks.

Travis thanks Sam for updating the Security Considerations (in PR #1168).

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Delayed Council Minutes 2022-02-16

2022-06-30 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-02-16?p=h#2022-02-16-be3c28ae5ed36ed4

1) Roll Call
Present: Travis, Georg, Daniel, Jonas, Larma

2) Agenda Bashing
Jonas checks whether Larma got any reply regarding taking ownership of XEP-0272 
(Multiparty Jingle (Muji)) - Larma hasn't yet posted to the Standards List, as 
was agreed last week.

3) Editor's Update
* Updated XEP-0004 (Data Forms)
* Updated XEP-0060 (Publish-Subscribe)
* Proposed XMPP Extension: MUC Affiliations Versioning

4a) PR #1158 (Obsolete XEP-0156 and add warnings) - 
https://github.com/xsf/xeps/pull/1158
Daniel checks that this will essentially make BOSH obsolete as it would no 
longer be discoverable - the author, Travis, notes that it does remove BOSH, 
but he also has an alternative proposal to remove everything else, while adding 
BOSH.

Travis: +0 (this removes bosh, so my alternate proposal is remove everything 
else but adding bosh)
Jonas: -1 (we should keep BOSH discoverable)
Georg: -1 (because of BOSH)
Daniel: -1 (i'm on board with getting rid of dns and getting rid of http, but i 
do think we need to keep bosh)
Larma: -1 (don't think we need to keep BOSH forever, but probably still need it 
today)

Travis intends to rework the PR for next week.

Daniel thinks that it's interesting W3C EventSource is still around, even 
though WebSocket exists, but that's probably a discussion for another day.

4b) PR #1159 (Obsolete and update Security Considerations for XEP-0138 and 
XEP-0229) - https://github.com/xsf/xeps/pull/1159
Jonas would like to point out that writing a MUST NOT in an Obsolete document 
seems pointless.
Georg agrees with obsoleting, but says that "this method is deemed insecure and 
MUST NOT be used" is a normative change and policy must not be enforced with 
protocol.
Sam understands the reasoning, but has also deployed it on large projects and 
found it to be extremely beneficial - Travis notes that lots of insecure things 
are useful.
Jonas would be happier if, instead of changing the normative text, a huge 
security notice were added at the top of the document and in the place where 
the normative text would've been changed, otherwise the "MUST NOT" part seems 
obsolete - the author, Travis, explains that the "MUST NOT" is targeted at the 
method specifically, as he expects a new compression method may be used with 
the negotiation being resurrected - Jonas still thinks it seems off.
Georg would be okay with obsoleting and adding a big red warning in the 
Security Considerations - Jonas agrees - Travis is happy to change it and will 
prepare an update for next week.

Travis: +1 (as author)
Larma: +1
Georg: -1 (because of the MUST NOT)
Daniel: -1 (either just obsolete it or just add a security warning)
Jonas: -1 (what Georg says)

Sam has a brainwave: maybe there could be a non-normative "Editorial Notes" 
section at the top of XEPs which doesn't require a version update since it's 
not actually part of the XEP - Jonas thinks that such things should definitely 
be versioned - Sam says it would still be versioned in Git, and could be 
updated by Editor or Council.

4c) PR #1163 (XEP-0045: Remove some more mentions of GC 1.0) - 
https://github.com/xsf/xeps/pull/1163
Georg doesn't think that "[citation needed]" is appropriate in a XEP - Editor 
will leave a note.

Daniel: [on-list] (probably fine, just want to double check later)
Georg: [on-list]
Larma: [on-list] (same as Daniel)
Jonas: [on-list]
Travis: [on-list] (would be be +1 if not for [citation needed])

4d) PR #727 (Obsolete some deferred XEPs) - https://github.com/xsf/xeps/pull/727
This PR moves three currently Deferred XEPs to Obsolete; Jonas suggests voting 
for each XEP separately - Daniel agrees.

4d i) Obsolete XEP-0008 (IQ-Based Avatars) - 
https://xmpp.org/extensions/xep-0008.html
Jonas: +1
Georg: +1
Daniel: [on-list]
Larma: +1
Travis: +1

4d ii) Obsolete XEP-0038 (Icon Styles) - 
https://xmpp.org/extensions/xep-0038.html
Larma: +1
Jonas: [on-list]
Travis: +1
Georg: +1
Daniel: [on-list]

Georg would still like a XEP for mapping the ASCII smiley to Unicode - Jonas 
thinks that's better suited to ModernXMPP - Pep suggests using 'jabber:x:data'.

4d iii) Obsolete XEP-0051 (Connection Transfer) - 
https://xmpp.org/extensions/xep-0051.html
Larma: +1
Travis: +1 (with prejudice because it needs major security considerations)
Jonas: +1 (think this is best addressed with  stream error in 
RFC 6120, which also talks about the corresponding security considerations)
Daniel: [on-list]
Georg: +1 (given )

Georg notes that it's been Deferred for over a decade, and asks if anybody is 
using it - Travis hopes not, or at least that they're using it in a secure way.

4e) Proposed XMPP Extension: MUC Affiliations Versioning - 
https://xmpp.org/extensions/inbox/muc-affiliations-versioning.html
Daniel asks about using attribute namespaces - remembers there was a huge 
debate, but not the outcome - Jonas says the outcome was that some people are 
using XML libraries that can't handle 

[Standards] Delayed Council Minutes 2022-02-09

2022-06-30 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-02-09?p=h#2022-02-09-b64bbd1ecbbd946f

1) Roll Call
Present: Georg, Larma, Daniel, Jonas, Travis

Georg is welcomed back.

2) Agenda Bashing
None.

3) Editor's Update
* Updated XEP-0060 (Publish-Subscribe)
* Proposed XMPP Extension: PubSub Type Filtering

4a) Proposed XMPP Extension: PubSub Type Filtering - 
https://xmpp.org/extensions/inbox/pubsub-filter.html
Daniel: +1 (lgtm)
Travis: +1 (not sure discovery is even necessary, but good to go)
Larma: +1
Jonas: +1
Georg: [on-list]

5) Pending Votes
Daniel notes there was some list discussion on PR #1153.

With PR #1154 depending on the outcome of #1153, people start voting on that 
too (noted separately for clarity.)

Everyone, on PR #1153:
Travis: +1
Daniel: +1
Larma: +1
Georg: +1 (the added content sounds like a banality, but it's probably good to 
explicitly write it out)
Jonas: +0 (this is a normative change which just happens to align with the 
implementations we asked)

Additionally, Georg votes on PR #1152: +1 (it's also semi-normative)

4b) PR #1154 (XEP-0060: Release version 1.23.1) - 
https://github.com/xsf/xeps/pull/1154
Travis: +1
Daniel: +1
Larma: +1
Georg: +1
Jonas: +0 (because it depends on the '4 one)

6) Date of Next
2022-02-16 1600 UTC

Larma may not be able to make it, but will try.

7) AOB
Larma has attempted to contact the authors of XEP-0272 (Multiparty Jingle 
(Muji)), but received no response after a month, and the authors don't appear 
to be involved in XMPP any more - Jonas would be happy to vote in favour of 
granting Larma ownership, given his current conferencing work.
Daniel agrees with Jonas's sentiment, but wonders whether the correct approach 
might be to leave feedback on the Standards List before declaring it abandoned 
- others agree. Daniel requests that Larma posts on-list first - it's probably 
interesting, additionally to ensure they're not subscribed with a different 
email address and/or stopped caring.

8) Close
Thank you all. Thanks, Daniel. Thanks. Thanks Daniel!

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Delayed Council Minutes 2022-02-02

2022-06-30 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-02-02?p=h#2022-02-02-cb9f4f481ab01572

1) Roll Call
Present: Jonas, Larma, Travis, Daniel
Holiday: Georg

2) Items for Voting
None.

3) Pending Votes
Georg, on PR #1152; everyone, on PR #1153.

Daniel points out that everyone was waiting for the on-list discussion about PR 
#1153, which has yet to materialise - Daniel will post something [1] after the 
meeting.

4) Date of Next
2022-02-09 1600 UTC

5) AOB
None.

6) Close
Thank you all. Thanks.


Jonas doesn't guarantee that next week will be better.


[1] https://mail.jabber.org/pipermail/standards/2022-February/038736.html

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Delayed Council Minutes 2022-01-26

2022-06-24 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-01-26?p=h#2022-01-26-4b609e3fdface235

1) Roll Call
Present: Larma, Travis, Daniel, Jonas
Holiday: Georg

2) Agenda Bashing
No changes.

3) Editor's Update
* Deprecated XEP-0256 (Last Activity in Presence)
* Message Replies accepted as XEP-0461
* Deprecated and Obsoleted XEP-0443 (XMPP Compliance Suites 2021)

4a) PR #1152 (XEP-0060: Release version 1.23.0) - 
https://github.com/xsf/xeps/pull/1152
Daniel finds the MUST a bit problematic - what about services that support it 
but don't advertise - Travis thinks that means they effectively don't support 
it; Jonas thinks it's okay.

Travis: +1 (seems editorial)
Jonas: +1
Daniel: +1
Larma: +1
Georg: [pending]

4b) PR #1153 (XEP-0004: Release version 2.13.0) - 
https://github.com/xsf/xeps/pull/1153
Travis questions whether this actually helps, as a client still can't rely on 
it; the MUST helped, but 'broke protocol', although known implementations 
already did it.
Larma isn't entirely convinced on the wording of "…only process (e.g., apply) 
the submitted fields."
Daniel would have preferred this to have been posted to the List before being 
brought to Council; there was already some discussion on it - Travis thinks 
further on-list discussion would help.
Travis also notes that 4c won't be possible unless this is accepted (and is 
editorial if it is.)

Daniel: [on-list]
Larma: [on-list]
Travis: [on-list]
Jonas: [on-list]
Georg: [pending]

4c) PR #1154 (XEP-0060: Release version 1.23.1) - 
https://github.com/xsf/xeps/pull/1154
Skipped, as Travis noted.

5) Pending Votes
Daniel votes on PR #1148: +1

6) Date of Next
2022-02-02 1600 UTC

7) AOB
None.

8) Close
Thank you everyone. Thanks everyone. Thanks! Thanks all.


Travis suggests deprecating XEP-0138 (Stream Compression) and XEP-0274 (Design 
Considerations for Digital Signatures in XMPP) [presumably XEP-0229 (Stream 
Compression with LZW) was meant] - if not the negotiation, at least the two 
methods [ZLIB and LZW]; minimally, CRIME/BREACH [1] should be mentioned in the 
Security Considerations - Jonas thinks the negotiation may be useful.


[1] 
https://blog.thijsalkema.de/blog/2014/08/07/https-attacks-and-xmpp-2-crime-and-breach/

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Delayed Council Minutes 2022-01-19

2022-06-24 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-01-19?p=h#2022-01-19-7d46738f10328167

Georg wishes to add an AOB item to talk about the proposed XEPs before he votes 
on them; a huge discussion erupts [1], causing hours of mayhem.

1) Roll Call
Present: Travis, Jonas, Georg, Larma, Daniel

2) Agenda Bashing
Daniel notes Georg's earlier desire to add an AOB item, but since it affects 
pending votes (which would come before AOB) then it should be discussed now - 
Georg thinks the monster discussion already covered most of it, but would like 
to give a summary of his thoughts.

Georg notes that three of the proposed XEPs from two weeks ago covered ground 
already proposed/implemented in other XEPs. "Message Replies" is yet another 
mechanism to reference messages, in addition to References, Fastening, and so 
on, but Georg thinks it adds UX value and will probably play well with some 
kind of revised fallback, so is generally in favour, though slightly hesitant 
due to the message referencing mess. "Compatibility Fallbacks" provides 
additional semantics to XEP-0428 (Fallback Indication) with a similar title - 
with Dave's agreement on merging the two and dealing with security 
considerations along the way, Georg thinks it's better to reject this one. 
"Call Invites" overlaps XEP-0353 (Jingle Message Initiation) very much and it 
wasn't made clear why that couldn't be used; the discussion clarified the 
points and reinforced Georg's feeling that it should be merged into 0353 to 
focus on calls (both one-to-one and groups) and not have a dedicated wire 
protocol for the same UX semantics.
Georg thanks everybody for the productive discussion and helping to make up his 
mind.

Daniel agrees with Georg's criticism, but notes that "no special criteria 
(other than acceptance by the Approving Body and minimal formatting compliance) 
need to be met in order for a XEP to be granted a status of Experimental."
Travis understood there to be very different UX between generic Jingle invites 
and call invites - Jonas took it to mean that this may be true in theory, but 
in practice 0353 is mostly used for calls, while a push notification for a file 
transfer offer might be undesirable.

Georg will reject the current proposal because it lacks a rationale that 
clearly describes how 0353 is unsuitable - the author, Larma, thinks the 
Introduction already has a decent explanation of why it's different.

3) Editor's Update
Nothing new.

4a) PR #1148 (XEP-0060: Specify pubsub#type to reflect semantic info) - 
https://github.com/xsf/xeps/pull/1148
Jonas: +1
Travis: +1
Georg: +1 (looks rather editorial to me)
Daniel: [on-list]
Larma: +1

4b) PR #1149 (XEP-0256: Deprecate in favour of XEP-0319) - 
https://github.com/xsf/xeps/pull/1149
Daniel has implemented XEP-0319 (Last User Interaction in Presence) and thought 
it was lacking in some areas - Jonas asks what's lacking, as they look pretty 
much the same - Daniel isn't saying that it's better or worse, just that it 
didn't feel ready, and it feels wrong to Deprecate in favour of something that 
isn't ready yet.
Georg wonders whether XEP-0319 should be included in the Compliance Suites; 
Jonas has an agenda item about this year's Compliance Suites.
Larma thinks that XEP-0319 lacks the functionality to indicate that a timestamp 
is purposely inaccurate, e.g. rounded to the next hour for privacy - Travis 
thinks that should be covered in Security Considerations. Daniel has a bunch of 
issues with 0319, but this isn't the right venue, and it's orthogonal to 
Deprecating XEP-0256 (Last Activity in Presence).

Travis: +1
Georg: +1
Jonas: +1
Daniel: +0
Larma: +1 (on getting rid of 256 so we don't have a duplicate)

5) Pending Votes
Georg on the four proposed XEPs…
Message Replies: +0 (I like the idea and the UX, but I dislike the mess we are 
in regarding message reference mechanisms)
Compatibility Fallbacks: -1 (needs to be merged into 0428)
Call Invites: -1 (should be merged into 0353 unless this merging fails, in 
which case it needs a better description of why 0353 is not sufficient - the 
one it has is inadequate as it lacks depth)
PubSub Namespaces: -1 (as discussed before, this needs to go into pubsub#type)

Everyone on PR #1145…
Georg: -1 (removes too much from 0030; see [2] for feedback)
Jonas: -1 (supporting the reasons on-list: it is well suited in the PEP 
add-ons. I like Dave's reasoning that "otherwise trusted" should be taken for 
that as an escape hatch)
Travis: -1 (we shouldn't allow it to become useable for harvesting JIDs)
Daniel: -1 (see [3])
Larma: -1 (same reasoning as Travis; also don't think it's needed that you can 
disco to fetch the pep node)

Travis thinks the XEPs that make harvesting JIDs useable need to be fixed, not 
expanded.

6) Date of Next
2022-01-26 1600 UTC

Georg will be on vacation for the next two weeks.

7) AOB
Daniel checks that everyone has time for Jonas's urgent agenda item - nobody 
protests.

Jonas suggests that XEP-0459 (XMPP Compliance Suites 2022) 

[Standards] Delayed Council Minutes 2022-01-12

2022-06-24 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-01-12?p=h#2022-01-12-9ebd16c0ff0be31a

Travis apologises for last week's absence, and tries to use the old 'my alarm 
didn't go off' excuse.

1) Roll Call
Present: Jonas, Larma, Georg, Daniel, Travis

Daniel runs off quicksy to grab a coffee.

2) Agenda Bashing
There is a late addition, courtesy of Pep and Jonas.

3) Editor's Update
* Updated XEP-0353 (Jingle Message Initiation)

Daniel thanks Thilo for writing that up.

4a) PR #1140 (XEP-0363: notes) - https://github.com/xsf/xeps/pull/1140
Daniel thinks there is a normative change, technically - Jonas says that's why 
it goes through Council first.
Larm votes +1; Jonas also votes +1, saying that any other behaviour doesn't 
make sense; Daniel thinks it's fine because what else would you do with those 
headers, and votes +1.
Travis thinks some HTTP libraries don't allow specifying the header order - 
Jonas notes that it should be the header values, not the headers themselves. 
Jonas realises that the wording is confusing in this respect and changes his 
vote to -1. Georg adds that it's not clear which are the headers that MUST be 
included in the PUT request.
Jonas hijacks the PR to improve the wording - everyone now votes on Jonas's 
patched version.

Travis: +1
Jonas: +1
Larma: +1
Georg: +1
Daniel: +1

4b) PR #1145 (XEP-0030: remove security considerations preventing requests on a 
bare JID) - https://github.com/xsf/xeps/pull/1145
Jonas notes that there is already an on-list thread about this [1].

Daniel: [on-list]
Jonas: [on-list] (haven't gotten around to read it yet)
Travis: [on-list] (worries me a bit)
Georg: [on-list]
Larma: [on-list]

5) Pending Votes
Georg and Travis on all four of last week's proposed XEPs, and Larma on PubSub 
Namespaces.

Travis votes +1 on the first three, but -1 on PubSub Namespaces.
Jonas says that the discussion has confirmed his perception that it should be 
-1 until fixed up as discussed on-list.
Georg still needs time to deliberate.
Larma votes on PubSub Namespaces: 0 (feel there is need for clarification, but 
this is not how it should be)

Jonas requests the link to the current Spreadsheet of Doom, as it's useful for 
Editor work - Travis obliges [2].

6) Date of Next
2022-01-19 1600 UTC

Georg will be on vacation for the two weeks after next.

7) AOB
None.

8) Close
Thank you everyone. Thanks Daniel. Thanks Daniel. Thanks.


Travis compliments Larma on all of the new XEPs with actual code behind them, 
which he thinks is infinitely better than 'in theory' XEPs.

Pep grants Jonas retroactive permission to hijack his PR.


[1] https://mail.jabber.org/pipermail/standards/2022-January/038702.html
[2] 
https://docs.google.com/spreadsheets/d/1aA6tQJ8XJ_UjCKrcJ6CyG-l3L5xETSlBrPRR-37Z_1E/edit#gid=0

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Delayed Council Minutes 2022-01-05

2022-06-24 Thread Tedd Sterr
https://logs.xmpp.org/council/2022-01-05?p=h#2022-01-05-bb4956c3043a4dfa

Happy new year, Council!

1) Roll Call
Present: Larma, Jonas, Daniel, Georg
Absent: Travis

2) Agenda Bashing
Daniel notes some additions to the agenda, as Editor published a few new 
proposals after it was already sent out - doesn't expect people to vote yet, 
given they haven't had time to read them; at least one looks like it may become 
an interesting discussion [1], which could decide Jonas's vote. Georg is 
pleased to have more discussion.

3) Editor's Update
* Last Call on XEP-0424 expired
* Last Call on XEP-0425 expired
* Proposed XMPP Extension: Compatibility Fallbacks
* Proposed XMPP Extension: PubSub Namespaces
* Proposed XMPP Extension: Call Invites
* Proposed XMPP Extension: Message Replies

4a) Advance XEP-0424 (Message Retraction) - 
https://xmpp.org/extensions/xep-0424.html
Jonas: -1 (depends on a bunch of experimental XEPs the future of which is 
unclear)
Daniel: -1 (agree with Jonas)
Georg: -1 (we need to sort out the message referencing mechanism first; also 
dislike the amount of boilerplate in both [this and 0425])
Larma: -1 (same here; also goes for 0425)
Travis: [pending]

4b) Advance XEP-0425 (Message Moderation) - 
https://xmpp.org/extensions/xep-0425.html
Daniel: -1
Georg: -1
Jonas: -1 (same reasoning as for 0424)
Larma: -1
Travis: [pending]

Daniel notes that even though the following four votes are starting now, not 
everyone is necessarily expected to be ready to vote yet.

4c) Proposed XMPP Extension: Compatibility Fallbacks - 
https://xmpp.org/extensions/inbox/compatibility-fallback.html
Georg: [on-list]
Larma: +1 (I submitted it, so would be weird to be against)
Daniel: +1
Jonas: +1 (good enough to play with; note it misses a Requirements section)
Travis: [pending]

4d) Proposed XMPP Extension: Call Invites - 
https://xmpp.org/extensions/inbox/call-invites.html
Daniel: +1
Larma: +1
Jonas: +1 (looks sensible)
Georg: [on-list]
Travis: [pending]

The author, Larma, notes that this will become useful with PR #1139 [2] applied.
Jonas suggests improving the wording on where to send the 'left' element.

4e) Proposed XMPP Extension: Message Replies - 
https://xmpp.org/extensions/inbox/replies.html
Daniel thinks this must be the third or fourth XEP dealing with replies - Larma 
(as author) hopes it will be the first to stick.
Jonas isn't sure this should be accepted without a Design Considerations 
section detailing why the other mechanisms aren't workable; this feels like 
duplication ('thread', References, and Fastening already exist), so some 
rationale in the document would be appreciated before acceptance - Larma says 
those others don't specifically deal with replies. It's not immediately obvious 
to Jonas why 'thread' wouldn't work here, as a reply could always fork off a 
fresh thread - Larma explains that this only works if the original message has 
a thread-id - Jonas has a realisation. Georg is glad that this doesn't depend 
on 'origin-id'.
Daniel doesn't really see threads as a fitting example, but does see overlap 
with References and Fastening. Jonas remembers Message Attaching as another 
example. Larma doesn't agree they are very similar, but sees the need for a 
section in the XEP to explain why it's different.

Daniel: +1
Larma: +1
Georg: [on-list]
Jonas: -0 (desperately needs a Design Considerations section to explain why the 
other four standards are not an option to achieve the goal)
Travis: [pending]

4f) Proposed XMPP Extension: PubSub Namespaces - 
https://xmpp.org/extensions/inbox/pubsub-ns.html
Jonas: -1 (until there's a good explanation for why pubsub#type isn't an option)
Daniel: 0 (don't know enough about pubsub to make a good call)
Georg: [on-list]
Larma: [on-list]
Travis: [pending]

Larma notes that PR #986 [3] has an explanation for 'pubsub#type' - Jonas says 
it should be in the document.

5) Pending Votes
Everyone but Jonas on PR #1126.
Daniel: -1 (should go into 0004; should ask editor to cherry pick the editorial 
/ non controversial bits from that PR)
Larma: -1 (not sure if 0004 is the right place either, but the proposal 
definitely shouldn't go as is)
Georg: -1 (with the PR as-is, maybe a better non-normative wording can be 
proposed if we fail to update 0004)

Jonas wonders how such an integration with XEP-0004 would look, as being Final 
makes it tricky - Daniel thinks there was some discussion on how that could 
still be done in a compatible way, but also thinks it could be done with a new 
XEP.

6) Date of Next
2022-01-12 1600 UTC

7) AOB
None.

8) Close
Thank you everyone. Thanks Daniel. Thanks Daniel!


Kev, as References author, doesn't think References is a reason to block 
Message Replies, but agrees that some explanation would be worthwhile - does 
think References would work for the use case, but being stuck on URIs is a bit 
unfortunate.


[1] https://mail.jabber.org/pipermail/standards/2022-January/038695.html
[2] https://github.com/xsf/xeps/pull/1139
[3] 

[Standards] Delayed Council Minutes 2021-12-15

2022-06-21 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-12-15?p=h#2021-12-15-2b00496e0cf0ae2c

1) Roll call
Present: Georg, Travis, Daniel, Larma
Apologies: Jonas

2) Agenda Bashing
No changes.

3) Editor's Update
None, but keep in the mind the Last Calls expiring on January 4th.

4) Pending Votes
Everyone but Jonas is pending on PR #1126 - thanks Travis for starting the List 
discussion [1].
Daniel is strongly leaning towards -1; as is Travis, and thinks that seems to 
be the List consensus.
Daniel thinks this is too big a change for a Stable XEP; also, that it belongs 
in XEP-0004 (Data Forms) since many XEPs could benefit from partial 
configuration submission - Georg notes that XEP-0004 is Final - Daniel thinks 
it might be possible with some kind of external flag; regardless, XEP-0004 
being Final doesn't negate this change not belonging in XEP-0060. Larma is also 
unhappy with this, and would rather delay voting until after the List 
discussion ends.
Travis thinks it would be fine, or even just editorial, with the partial 
submission part removed - Daniel thinks Editor could be instructed to apply 
just the editorial parts.
Daniel recommends delaying voting until after the holiday, though with a few 
already indicating -1, he suspects he knows how it will go. Georg suggests 
Somebody™ should submit a proposed XEP-0004 wording.

5) Date of Next
Daniel proposes taking the next two weeks off and meeting again after the 
holiday - all are in agreement.

2022-01-05 1600 UTC

6) AOB
None.

7) Close
Thanks Daniel. Thank you everyone - have nice holidays and enjoy the time off. 
Stay safe and healthy!


[1] https://mail.jabber.org/pipermail/standards/2021-December/038676.html


Regarding PR #1126, Kev thinks the change belongs in XEP-0004 and doesn't need 
to be phrased as a breaking change - all that's needed is to say that "People 
might submit partial forms. This has been unspecified in the past, but the 
expected meaning is 'I'm only trying to change what I submit'" - doesn't think 
it needs to be normative. Peter thinks this makes sense.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Delayed Council Minutes 2021-12-08

2022-06-21 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-12-08?p=h#2021-12-08-2831ac1e3aa545cc

1) Roll Call
Present: Jonas, Travis, Georg, Daniel, Larma

2) Agenda Bashing
Daniel has two things from Editor which weren't on the original agenda.

3) Editor's Update
* Last Call for XEP-0424 (Message Retraction)
* Last Call for XEP-0425 (Message Moderation)

Editor notes that these will expire after the holiday, in January, rather than 
the minimum two weeks.

4a) PR #1129 (XEP-0459: Replace deprecated XEP-0411 with XEP-0402) - 
https://github.com/xsf/xeps/pull/1129
Jonas is generally for the change, but thinks there's an editorial mistake. 
Daniel asks whether changes have been made before to the Compliance Suites 
after they became Draft/Stable, but generally agrees on the change. Georg is a 
bit lost with all of the Bookmarks formats. Jonas thinks the goal should be 
pushing the Compliance Suites towards Final for the beginning of the next year. 
Georg agrees with making useful changes. Jonas thinks it's an obvious oversight 
because recommending a Deprecated protocol doesn't make sense.

Georg: +1
Travis: +1
Daniel: +1
Jonas: +1
Larma: +1

Jonas and Daniel attempt to set up a new Spreadsheet of Doom.

4b) PR #1126 (XEP-0060: Release version 1.23.0) - 
https://github.com/xsf/xeps/pull/1126
Daniel thinks this is probably just editorial, but voting doesn't hurt.
Travis notices that part of the change adds a MUST, but it appears to make 
sense and seems like the correct thing, and maybe implementations already do it 
this way - Jonas thinks it was previously undefined, and has seen some 
discussion suggesting it's not how all implementations work today. Larma hasn't 
thought it through completely, but expects a SHOULD might be more sensible - 
Travis thinks the MUST is necessary, otherwise you can't be sure what will 
happen.
Jonas suggests Editor should inform the author that this should be put to the 
List first.
Travis thinks there are two sensible options: either a full form is fetched and 
submitted, with no ambiguity over what was filled, or if a partial form is 
submitted then the service MUST change only those fields (and not others) - 
prefers the latter, but only if it doesn't make implementations non-compliant; 
Jonas notes that as this removes some implementation defined behaviour, it 
probably will make some implementation non-compliant. Daniel thinks this needs 
List discussion to see how implementations currently handle it. Travis will 
write something to the List.

Jonas: +1
Daniel: [on-list]
Georg: [on-list]
Travis: [on-list]
Larma: [pending]

5) Pending Votes
None so far.

6) Date of Next
2021-12-15 1600 UTC

Travis should be able to make it, but is starting a new job.
Daniel thinks it might be the last meeting before the holiday, but that can be 
decided next week.

7) AOB
None.

8) Close
Thanks everyone, Daniel, Daniel, all, Daniel.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Delayed Council Minutes 2021-12-01

2022-06-21 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-12-01?p=h#2021-12-01-2f4806998261b0ce

New Council Time!

1) Roll Call
Present: Daniel, Jonas, Travis, Georg
Delayed: Larma

2) Welcome
Jonas welcomes Travis (moparisthebest) and Larma as fresh faces to Council.

3) Chair Election
Council is required to have a chairperson to act as head of the committee, and 
to prepare an agenda for meetings and to lead them; the Chair should also 
ensure a replacement in cases of expected absence. Jonas asks for volunteers - 
Daniel says that Jonas did an excellent job for the previous term and would 
happily vote for him should he volunteer again, but will step forward himself 
if not - Jonas would prefer less responsibility this term. Travis and Georg 
compliment Jonas's exceptional management - Jonas graciously accepts the 
praise. Georg wishes he could spare the time and commitment, but is too 
familiar with reality.
With a lack of other volunteers, and in true democratic style, everybody votes 
for Daniel as the one and only option - Daniel humbly accepts the honour. Jonas 
is happy to aid in a peaceful transition where needed, and offers to continue 
chairing this meeting as Daniel is likely unprepared - Daniel approves.

4) Board Liaison
Jonas notes that someone should act as liaison with Board, which includes being 
subscribed to their mailing list and attending their meetings - Jonas is happy 
to continue in this role, but will step aside should anybody else want it - 
Daniel could take over this task as well, but is happy to leave it with Jonas. 
Everyone votes for Jonas.

5) Meeting Schedule
Jonas is happy with the current slot (Wednesdays, 1600 UTC; following European 
DST) and checks that still works for everyone else - there are no objections.

[Date of next: 2021-12-08 1600 UTC]

6) AOB
Jonas will poke iTeam regarding room affiliations; has sent an email to the 
Council mailing list - everyone should check they receive it, and complain (to 
iTeam) if there are problems.

Jonas (Council) will poke Jonas (Editor) to take a look at pending Last Calls; 
one is already queued, which should start before the next meeting.

7) Close
Thanks everyone, Jonas, Jonas, thanks much.

Jonas recommends that Daniel arrange a new Spreadsheet of Doom.


Kev notes that Board Liaison was originally the Council Chair, not a selected 
person, but doubts anyone cares too much.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Lost Council Minutes 2021-07-14

2022-06-20 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-07-14?p=h#2021-07-14-389c0dc05f245f96

1) Roll Call
Present: Zash, Daniel, Jonas, Dave, Georg

2) Agenda Bashing
None.

3) Editor's Update
* Deferrals have been executed and will be disseminated to the list in a few 
days to not drown out other updates. Thanks Sam for the reminder.
* LCs for XEP-0429 and XEP-0381 have expired last year and Council never voted 
on it apparently.
* Moved 2.0 vs 1.0 will be taken care of by the Editor and MattJ.

4) Items for voting
Jonas notes that PR #1064 has been updated yet again during the voting period 
in order to incorporate list feedback - on behalf of Council, Jonas accepts 
responsibility as a result of not adhering to the "only vote on it after list 
discussion has settled down" policy accepted some time ago; this time, Council 
shall wait for list feedback before voting for a third and (hopefully) final 
time.

4a) Advance XEP-0381 (Internet of Things Special Interest Group (IoT SIG)) - 
https://xmpp.org/extensions/xep-0381.html
Jonas notes that this had a Last Call in December [1], which was probably 
missed due to the ensuing holiday.
Georg asks whether the IoT Working Group is still functional - Jonas says that 
Debacle indicated interest, and there are a number of people in the IoT MUC. 
Zash mentions that were a number of related XEPs in the past, but most have 
been Retracted [2].
Jonas wonders whether there are measures in place to keep track of SIG members, 
if only to know where to address questions about deliverables being met; 
additionally, Jonas asks whether the SIG should be ignored unless there's a 
problem or if anything is required from Council.

Georg: +1
Jonas: +1
Zash: +1
Daniel: +1
Dave: +1

4b) Advance XEP-0429 (Special Interests Group End to End Encryption) - 
https://xmpp.org/extensions/xep-0429.html
Jonas thinks this is in a similar situation [3], though without resources 
allocated to it (mailing list, MUC, etc.)

Jonas: +1
Zash: +1
Georg: +1
Daniel: +1
Dave: +1

5) Pending Votes
The vote on PR #1064 has been cancelled.

6) Date of Next
2021-07-21 1500 UTC

7) AOB
None.

8) Close
Thanks everyone.


Dave appears after everybody has already left and votes (noted inline.)


[1] https://mail.jabber.org/pipermail/standards/2020-December/037940.html
[2] Retracted: XEP-0323, XEP-0324, XEP-0325, XEP-0326; Deferred: XEP-0347
[3] https://mail.jabber.org/pipermail/standards/2020-December/037941.html

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Lost Council Minutes 2021-07-07

2022-06-20 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-07-07?p=h#2021-07-07-cd234d320f4e1065

1) Roll Call
Present: Jonas, Daniel, Georg, Zash, Dave

2) Agenda Bashing
The author of XEP-0283 (Moved) has consented to ceding authorship, and MattJ is 
fine with "Moved 2.0" being merged into XEP-0283 and with taking control.

3) Editor's Update
* Nothing

4) Add MattJ as author of XEP-0283 (Moved) - 
https://xmpp.org/extensions/xep-0283.html
Jonas: +1
Dave: +1
Zash: +1
Daniel: +0 (if it's not a real change but more a completely new xep it should 
have been a new number (possibly obsoleting the old one) but I won't block it)
Georg: +1

5) Pending Votes
Jonas votes on the proposed "Moved 2.0": -1 (under the assumption that it'll be 
handled in '283 from here on);
Dave also votes: -1 (on the basis of [what Jonas said]).

Georg is still pending on PR #1064, but would prefer to take more time to catch 
up.

6) Date of Next
2021-07-14 1500 UTC

7) AOB
Jonas says that the Council MUC needs an avatar, and asks for suggestions - 
Zash suggests the XMPP logo with an additional something; Dave posts an 
incomplete link to an image and is disappointed when it doesn't work. Georg 
suggests an antique scroll with the word "standard" written in some dead 
language [like XML?] Dave posts a better link to the "Grey Council" from 
Babylon 5. Jonas thinks it would be great if someone came up with a PNG or SVG 
that can be used, but further deliberation on the content can occur outside of 
the meeting.

8) Close
Thanks everyone! Thanks Jonas, all.

Zash thanks a cat for the company.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Lost Council Minutes 2021-06-30

2022-06-17 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-06-30?p=h#2021-06-30-a6804355d0b6978b

1) Roll Call
Present: Zash, Dave, Jonas, Daniel
Late: Georg

2) Agenda Bashing
Zash would like to add tacos to the agenda - Jonas thinks that would be nice, 
but doesn't have any.

3) Editor's Update
* Proposed XMPP Extension: Moved 2

4a) PR #1064 (XEP-0227: New revision 1.1) - 
https://github.com/xsf/xeps/pull/1064
Jonas notes that there was a minor change during the voting period, so a new 
vote must be started.

Jonas: +1
Dave: +1
Daniel: +1
Zash: +1 (but see my post to the list [1])
Georg: [pending]

Jonas mentions that there has been some feedback to include PEP affiliations 
and stuff, but feels that can be done in a future update, with newly namespaced 
elements - Zash agrees.

4b) Proposed XMPP Extension: Moved 2 - 
https://xmpp.org/extensions/inbox/moved2.html
Jonas has contacted the author of XEP-0283 (Moved), but hasn't heard back yet. 
Daniel doesn't see any benefits to taking over 0283 - Jonas would prefer 
merging into the existing one over creating a fresh one, especially since it's 
really similar - Georg and Dave second that; Zash is neutral. Georg thinks 
there are already too many ways to do one thing; Dave would be happier just 
changing the existing one, and doesn't think there's a lot of implementation of 
0283. Jonas would prefer overwriting 0283 and granting authorship to MattJ, but 
would like to wait another week for the original author to respond.

Daniel: +1
Georg: +1
Zash: +1
Jonas: [pending] (don't want to vote on accepting as Experimental before that 
reply)
Dave: [pending] (happy to wait to find out if updating XEP-0283 is a sensible 
option)

5) Pending Votes
None.

6) Date of Next
2021-07-07 1500 UTC

Georg offers no guarantee on next week.

7) AOB
None [Georg must be busy.]

8) Close
Thanks everyone, Jonas, all.


[1] https://mail.jabber.org/pipermail/standards/2021-June/038397.html

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Lost Council Minutes 2021-06-23

2022-06-17 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-06-23?p=h#2021-06-23-cbe6c0e418e34c85

1) Roll Call
Present: Jonas, Daniel, Zash
Late: Dave
Absent: Georg

2) Agenda Bashing
Jonas recommends random outbursts during the meeting.

3) Editor's Update
* Compliance Suites 2022 accepted as XEP-0459

4) Items for voting
None.

5) Pending Votes
Georg, Dave, and Zash, on PR #1064;
Dave voted on-list, earlier [1], on Deprecate and Obsolete XEP-0423 (XMPP 
Compliance Suites 2020): +1 (definitely deprecate, and absolutely obsolete)

Dave notes that PR #1064 has been updated in response to his feedback - Zash 
ponders the legality of updating a PR during the voting period - Jonas thinks 
it would technically need another vote. Dave would like the PR to be discussed 
on-list to see other server developers' opinions - Jonas notes that it was 
already posted to the list [2], but nobody seemed to care, so is unsure what 
can be improved.

6) Date of Next
2021-06-30 1500 UTC

5') Pending Votes (PR #1064 Discussion)
Jonas presumes that Dave will veto the old version, so there can be another 
vote, but should list discussion be encouraged (again) first - Dave doesn't 
think there's much more to do be done when it was already posted on-list, but 
wonders whether that means people care either way. Dave suspects the PR is 
fine, but isn't sure that encouraging the plaintext password field is going to 
annoy other server developers, or maybe they don't care, or even welcome the 
changes.
Jonas is sure that Prosody will get an implementation, so if nobody else cares 
then having MattJ taking care of that seems sensible. Daniel doesn't think the 
PR sounds very controversial - Dave asks what would happen with another 
server's implementation - Jonas thinks a namespace bump is the right tool for 
that; Zash thinks the namespace has already changed many times.
Dave isn't against the PR, but has no feel for what the Community feels as a 
whole - Jonas says feedback can't be forced, but known server developers could 
be poked - Dave agrees that it can't be forced, but it would be nice to get 
some support for changing a Draft XEP. Daniel explains that such changes are 
welcome and overdue; conversations.im considered offering import/export to 
users, but it was held back by XEP-0227 (Portable Import/Export Format for 
XMPP-IM Servers) not being modern enough, and this PR fixes exactly those 
problems - Jonas thinks that would have been great as feedback.
Jonas prefers an unopposed and unsupported change on a Draft XEP to yet another 
Experimental rewrite XEP - as does Dave, but support from other server 
developers would be great - Jonas thinks they can be poked, and a re-vote is 
needed anyway.
Dave has poked Guus (for Openfire); Jonas has poked Holger (for ejabberd.)

7) AOB
Sam has poked Editor for a Last Call on XEP-0292 (vCard4 Over XMPP).

Sam also requests that Council will Obsolete XEP-0072 (SOAP Over XMPP) at their 
earliest convenience - Dave thinks soap is still quite important, given the 
COVID situation.

8) Close
Thanks everyone.


[1] https://mail.jabber.org/pipermail/standards/2021-June/038384.html
[2] https://mail.jabber.org/pipermail/standards/2021-June/038338.html

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Lost Council Minutes 2021-06-16

2022-06-17 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-06-16?p=h#2021-06-16-e86bc4db397159b0

Sam points Council to the still Draft "XMPP Compliance Suites 2020" and 
requests it be fixed - Zash feels this should be an automatic thing, though 
XEP-0001 states that happens upon advancing to Final (also, Draft lasts a 
minimum of six months, which doesn't suit yearly Compliance Suites.) Sam 
suggests they could be Informational instead, as they seem to define "best 
practices for implementation or deployment of an existing protocol" - Zash 
notes that, as it's defined in XEP-0001, it is up to Board. Zash suggests 
poking someone to advance CS-2021 to Final, which will automatically Obsolete 
CS-2020. Sam has no strong preference for Informational, but that seems 
semantically correct, though the change to process isn't worth the paperwork.
Sam discovers that XEPs can be assigned expiration dates.

1) Roll Call
Present: Jonas, Zash, Daniel, Georg, Dave

2) Agenda Bashing
Jonas heard somewhere that something needs to done about CS-2020 still being 
Draft, but isn't sure how to handle it - Sam suggests they be Obsoleted; Georg 
suggests burning them with fire. Jonas will add a vote for Obsoleting, but 
considers a CFE for CS-2021 would just be additional noise that nobody is 
really interested in.

3) Editor's Update
* Proposed XMPP Extension: Pre-auth Registration Key Generation and Validation

4a) PR #1064 (XEP-0227: New revision 1.1) - 
https://github.com/xsf/xeps/pull/1064
Jonas: +1
Daniel: +1
Georg: [on-list]
Zash: [on-list]
Dave: [pending]

4b) Deprecate and Obsolete XEP-0423 (XMPP Compliance Suites 2020) - 
https://xmpp.org/extensions/xep-0423.html
Jonas explains that the sacred process graph in XEP-0001 requires that a 
Standards Track XEP first goes through Deprecated on its way to Obsolete.

Jonas: +1
Zash: +1
Daniel: +1
Georg: +1
Dave: [pending]

5) Pending Votes
Daniel dutifully votes on PR #1066: +1

6) Date of Next
2021-06-23 1500 UTC

Daniel might not be able to make it; Georg thinks he will make it.

7) AOB
Jonas makes note of the shiny new "Community Code of Conduct" (XEP-0458 [1]), 
just in case anyone missed it, since it mentions Board and Council members 
specifically, so it's probably worth reading and discussing; note that it's 
still Experimental, not Active as some seem to believe.

8) Close
Thanks everyone, Tedd, Zash, Jonas, Georg, Zash.


[1] https://xmpp.org/extensions/xep-0458.html

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Lost Council Minutes 2021-06-09

2022-06-17 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-06-09?p=h#2021-06-09-84a3023f959cd037

Anticipating a scheduling conflict, Georg sends apologies and advance 
voting/comments (noted inline.)

1) Roll Call
Present: Zash, Jonas, Daniel
Late: Dave
Apologies: Georg

2) Agenda Bashing
To everyone's surprise, there is stuff on the agenda.

3) Editor's Update
* Two ancient PRs merged

4a) PR #1066 (XEP-0124: Fix incorrect attribute name in text) - 
https://github.com/xsf/xeps/pull/1066
Georg: +0 (looks reasonable and makes sense, but I'm no server dev)
Jonas: +1 (I trust MattJ sufficiently to do the due diligence)
Zash: +1
Daniel: [on-list]
Dave: +1

4b) PR #1062 (XEP-0045 - Fix typo missed in rev. 1.25) - 
https://github.com/xsf/xeps/pull/1062
Zash mentioned that this is going to be changed soon, so there would be no 
point voting on it.
Georg suggested adding a note about the now-removed 'none' value, as it was 
formerly valid and may still exist in the wild.

5) Pending Votes
Dave makes an appearance and votes on "XMPP Compliance Suites 2022" at the very 
last minute: +1 (to adopt that and give it a nunber)

6) Date of Next
2021-06-16 1500 UTC

7) AOB
None [Georg isn't here.]

8) Close
Thanks everyone! Thanks Jonas, all.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Lost Council Minutes 2021-06-02

2022-06-17 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-06-02?p=h#2021-06-02-182e2155c3bb7d49

1) Roll Call
Present: Zash, Daniel, Jonas, Georg
Absent: Dave

2) Agenda Bashing
None.

3) Editor's Update
Nothing special.

4) Items for Voting
None.

5) Pending Votes
Dave, on XMPP Compliance Suites 2022.

6) Date of Next
2021-06-09 1500 UTC

7) AOB
Jonas notes that there was a lot of feedback on the "things which need to be 
advanced" request, so he will put that into a new shortlist.

8) Close
Enjoy the Summer [or else!]
Thanks everyone, all, Jonas.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Lost Council Minutes 2021-05-26

2022-06-16 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-05-26?p=h#2021-05-26-f87794dbb18bc6c9

1) Roll Call
Present: Jonas, Georg, Zash, Daniel, Dave

2) Agenda Bashing
No amendments.

3) Editor's Update
* CVE number things in XEPs
* Compliance Suites 2020 (sic) ProtoXEP published

4a) PR #848 (XEP-0292: Recommend using contact bare JIDs as item IDs) - 
https://github.com/xsf/xeps/pull/848
Jonas noted that this has been idling for a very long time, and pinging Peter 
hasn't helped, so something should be done about it - Kev questions what 
'pinging' actually means, as simply mentioning someone in order to generate a 
notification isn't necessarily effective - Jonas doesn't know if there have 
been any explicit email 'pings.' Jonas is happy to ping via email, but if 
authors aren't listening for pings on their PRs then a better process should be 
found - Kev notes that the process has always been explicit about important 
discussion happening openly, i.e. on-list, not in GitHub. Jonas will ping Peter 
via email.

4b) Proposed XMPP Extension: XMPP Compliance Suites 2022 - 
https://xmpp.org/extensions/inbox/cs-2022.html
Jonas: +1 (let's get this under the roof for proper discussion and further 
development)
Zash: +1
Daniel: +1
Georg: +1
Dave: [pending]

5) Date of Next
2021-06-02 1500 UTC

6) AOB
Georg has something related to XEP-0280 (Message Carbons), but is currently 
busy.

Zash asks whether there are any old XEPs to LC or Deprecate - Jonas has mostly 
cleared his shortlist, except for XEP-0390 (Entity Capabilities 2.0) and 
XEP-0313 (Message Archive Management) - Sam has a list somewhere.
Sam recommends XEP-0054 (vcard-temp) and XEP-0055 (Jabber Search) for the axe.
Jonas will make another on-list request for "things which need to be advanced" 
[1].

7) Close
Thanks everyone, Jonas, Jonas, all.

Sam mentions that the 2020 (and 2021) Compliance Suites are still in Draft - 
Zash mentions they're weird and deserve their own XEP-0001 flow - Sam agrees, 
but changing that sounds like work when they could just be put out on time 
(even if imperfect) and tell the Editor to Deprecate the old ones - Georg 
suggests deprecating CS-2020 and moving CS-2021 to Final - Sam would appreciate 
that.


[1] https://mail.jabber.org/pipermail/standards/2021-June/038332.html

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Lost Council Minutes 2021-05-19

2022-06-16 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-05-19?p=h#2021-05-19-166dd46a385797cb

1) Roll Call
Present: Zash, Jonas, Daniel, Georg
Apologies: Dave

2) Agenda Bashing
The lack of agenda items is making Jonas feel uneasy - Jonas adds something 
into AOB to feel a little better.

3) Editor's Update
Nada.

4) Items for Voting
None.

5) Date of Next
2021-05-26 1500 UTC

6) AOB
On PR #1059 (XEP-0373: Public key and metadata nodes: Recommend 'open' access 
model) [1], Jonas wonders about the security/privacy implications - Zash says 
concerns were raised before about correlating MUC participants, which might 
apply, and something about reuse of a 'normal' PGP key leaking information - 
Jonas thinks this might be worth consulting the all-knowing List. Daniel says a 
lot of OX usage is open to interpretation, creating widely varied security 
implications; for example, reusing the same PGP key already used with your 
email, with an open access model, will leak your identity - but this is 
unclear; doesn't think there are best practices, and would leave it to the 
authors to steer it in their chosen direction. Jonas will ask the authors to 
write a note in the Security Considerations, and maybe point The List at it.

7) Close
Thanks everyone. Thanks Jonas.


[1] https://github.com/xsf/xeps/pull/1059

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Lost Council Minutes 2021-05-12

2022-06-16 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-05-12?p=h#2021-05-12-f7f41fa0ddc26bcf

1) Roll Call
Present: Daniel, Jonas, Zash, Dave
By the pool: Georg

2) Agenda Bashing
The agenda is a little short again, but nobody has complained.

3) Editor's Update
* This space intentionally left blank.

4) Items for Voting
* This space intentionally left blank.

5) Date of next
2021-05-19 1500 UTC

Jonas will be on vacation from work and may lose all sense of time and reality.

6) AOB
Dave notifies everyone, for sake of completeness, of his upcoming change of 
employment - congratulations are given.

7) This item intentionally left blank.

8) Close
Thanks Jonas. Thanks everyone!

Jonas wanders off, talking to a cat.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Lost Council Minutes 2021-05-05

2022-06-16 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-05-05?p=h#2021-05-05-8ba02b6dd5bcdfbf

1) Roll Call
Present: Dave, Jonas, Zash, Daniel
At the beach: Georg

2) Agenda Bashing
The agenda is bare, Georg is taking a break, and Dave is preoccupied and so 
wouldn't mind skipping the meeting - Jonas asks whether anyone is against 
skipping - nobody is opposed.

3) Date of Next
2021-05-12 1500 UTC

4) Close
Thanks everyone!

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] Proposed XEP-0060 Changes

2021-12-15 Thread Tedd Sterr
> The submitted configuration form MAY contain a subset of possible 
> configuration options. In that case, the service MUST only change the 
> submitted configuration options.

Here, the 'MUST' means the service has to change the submitted options (to the 
values given) and only those options (no others). As a 'SHOULD' it would mean 
the service is technically allowed to deviate from that (possibly changing 
other options, or amending values to fit constraints) if it has a good reason 
to do so; if a service has such a need, then submitting the full form won't 
change that need and it could still modify/omit values as it sees fit. (Is 
there a requirement the service MUST change all given options for a full form 
submission? If not, submitting a subset wouldn't change this.)

I think 'SHOULD' is okay in this case.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2021-11-24

2021-11-25 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-11-24?p=h#2021-11-24-153dc4999d1de42b

1) Roll Call
Present: Zash, Jonas, Daniel, Georg
Absent: Dave

2) Agenda Bashing
None.

3) Editor's Update
None.

4) Items for Voting
None.

5) Pending Votes
None.

6) AOB
Jonas considered giving a protracted speech summarising every detail of Council 
business from the past year, but decided not to drag this out unnecessarily 
(and to avoid tears.)
Georg thinks it was a great term, and thanks everybody.
Jonas would like to note that only one of the 40 Council votes expired [2.5%], 
compared with four of the 95 in the previous term [4.2%], which is a slight 
improvement [60% is slight?], so that's nice.
Jonas thanks all for their attendance, insight, and votes; is sorry to see some 
go, but can fully understand it.
Zash thanks Jonas for chairing - Jonas takes a bow, and hopes to find someone 
(else) to do it for the next term.
Georg compliments Jonas on doing a great job as Chair, with structure and 
preparation [as any self-respecting German should appreciate] - it was a great 
pleasure; Georg dreams of providing a similar level of quality someday.

7) Close
Thanks everyone!

Zash now feels obligated to finish the heap of half-done XEPs he started over 
the last few years.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2021-11-17

2021-11-20 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-11-17?p=h#2021-11-17-c6935cd12e25235a

1) Roll Call
Present: Georg, Zash, Jonas, Daniel, Dave

2) Agenda Bashing
JC Brand requested that two XEPs be Last Called, though it's now too late to 
complete that within this Council term, so the Editor will start the LCs at the 
beginning of the next term.

3) Editor's Update
None.

4) Items for Voting
None.

5) Date of Next
2021-11-24 1600 UTC

6) AOB
None.

7) Close
Thanks all!

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2021-11-10

2021-11-16 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-11-10?p=h#2021-11-10-17f68c47ca6c5e4f

1) Roll Call
Present: Jonas, Zash, Dave, Daniel
Apologies: Georg

2) Agenda Bashing
Jonas has an ominous feeling that something was missed.

3) Editor's Update
XEP-0459 (XMPP Compliance Suites 2022) was advanced to Stable.

4) Items for Voting
None.

5) Pending Votes
None.

6) Date of Next
2021-11-17 1600 UTC

Jonas may be enjoying a public holiday and conveniently forget to appear.

7) AOB
Jonas is glad there are at least five candidates for the Council election [1], 
but less happy there are only five; it's nice to see some new names though!

Dave mutters something about 2FA, SASL, and Kittens [2] - people are looking at 
the framework for nested SASL2 disguised as a SASL mechanism Dave put together, 
but are deciding against it [despite it clearly being the best thing since 
cheese on toast!]

Zash is briefly excited enough to Dance [3] (client authentication, as in S2S 
clients and the like) but ran out of energy, och kaffet är kallt.

8) Close
Thanks all and everyone!


[1] https://wiki.xmpp.org/web/Board_and_Council_Elections_2021
[2] https://datatracker.ietf.org/wg/kitten/about/
[3] https://datatracker.ietf.org/group/dance/about/

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2021-11-03

2021-11-07 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-11-03?p=h#2021-11-03-6ad901a0a639fdb2

1) Roll Call
Present: Daniel, Zash, Georg, Jonas, Dave

2) Agenda Bashing
Amendments should be made by yelling random suggestions throughout the meeting.

3) Editor's Update
XEP-0313 (Message Archive Management) is now Stable - congratulations to MattJ, 
Kev, and everyone else involved in this momentous occasion!

4) Advance XEP-0459 (Compliance Suites 2022) - 
https://xmpp.org/extensions/xep-0459.html
Georg: +1 (I don't like the removal of "Core" very much, but not going to die 
on that hill)
Daniel: +1
Jonas: +1
Zash: +1
Dave: +1 (why not)

5) Date of Next
2021-11-10 1600 UTC

[Note the change of time due to DST ending in Europe; North America will also 
have adjusted then.]

6) AOB
Jonas notes the fresh application [1] for Council, which is nice.
Zash debates whether to stand - Dave would feel happier if there were more 
candidates with server experience; wonders whether Holger or Guus could be 
persuaded. Daniel would be happier if there were more candidates; Dave feels 
that elections are better when they're contested.
Zash mentions the idea of an Election Committee, as a group responsible for 
nominating positions with consideration beyond popularity, to produce a group 
who better represents the membership - Daniel thinks there are already enough 
challenges in motivating people, without the additional challenge of motivating 
people to motivate other people.

7) Close
Thanks everyone, Tedd, Jonas, all, Jonas.


[1] https://wiki.xmpp.org/web/Board_and_Council_Elections_2021

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2021-10-27

2021-10-31 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-10-27?p=h#2021-10-27-96dcd73ddbdff0bc

1) Roll Call
Present: Georg, Zash, Jonas, Daniel, Dave

2) Agenda Bashing
There is an agenda and it is a good agenda.

3) Editor's Update
Nothing in particular.

4) Advance XEP-0313 (Message Archive Management) - 
https://xmpp.org/extensions/xep-0313.html
Jonas: +1
Daniel: +1
Zash: +1
Georg: -0 (promised not to block this XEP, and it's an urgently needed thing 
that's widely implemented, but it's still far away from a good XEP)
Dave: +1 (for a terrible XEP, it certainly seems like a lot of people rely on 
it)

Georg is glad parts of his LC feedback were addressed, but wishes all of the 
other loose ends could be tied up.

5) Pending Votes
None.

6) Date of Next
2021-11-03 1600 UTC

Jonas may not be present, but will attempt to prepare (and maybe even send) an 
agenda.

[Note the change of time due to DST ending in Europe, effectively moving the 
meeting time one hour later for those outside of affected regions; North 
America will re-sync next week.]

7) AOB
The author of XEP-0459 (XMPP Compliance Suites 2022) has yet to provide an 
update - Jonas has pinged them. Georg believes there is still enough time 
before The Election, and repeats his offer to act as Shepherd if needed. Jonas 
requests that Georg watches for PRs and pings Jonas if nothing is forthcoming 
by Friday - Georg can manage that and adds a cryptic note to his calendar.

Jonas notes that there are currently no candidates [1] standing for Council; 
will send an email to try to encourage more people to come forward [2].
Jonas intends to run, but wouldn't want to chair again; Georg thinks likewise - 
Dave suggests it might be helpful to put themselves forward now, if that's 
their intention anyway, and that may encourage others once they see that the 
list is growing - Georg and Jonas think that's a great idea and do so. Zash 
suggests adding the entire membership list and let people opt-out - whoever is 
left will find themselves newly elected Council members.

8) Close
Thanks Jonas, everyone, Tedd, Jonas, Jonas, Tedd, and all.


[1] https://wiki.xmpp.org/web/Board_and_Council_Elections_2021
[2] https://mail.jabber.org/pipermail/standards/2021-October/038627.html

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2021-10-20

2021-10-26 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-10-20?p=h#2021-10-20-c02f17c6921ba0e0

1) Roll Call
Present: Georg, Jonas, Zash, Daniel
Invisible: Dave

2) Agenda Bashing
Zash thinks the agenda is too thin - Jonas will try to feed it more.

3) Editor's Update
Nothing in particular.

4) Items for Voting
None.

5) Pending Votes
Also none.

6) Date of Next
2021-10-27 1500 UTC

[DST will end in Europe on the 31st, and in North America on November 7th.]

7) AOB
Kev queries the current state of XEP-0313 (Message Archive Management) - Jonas 
thinks something needs to be done soon and will add it to next week's agenda.

Zash queries the current state of XEP-0459 (XMPP Compliance Suites 2022) - 
Georg volunteers to don his Shepherding costume for Hallowe'en, if necessary; 
the author expects to submit something soon.

Board and Council elections [1] are approaching; if you think you can do a 
better job than these clowns, put yourself forward as a candidate by November 
7th.

8) Close
Thanks everyone.


Georg notes the lack of LC feedback on the Easy Onboarding suite [silence is 
golden, but constructive feedback is still valuable!]
 * XEP-0379 (Pre-Authenticated Roster Subscription) - 
https://mail.jabber.org/pipermail/standards/2021-October/038606.html
 * XEP-0401 (Ad-hoc Account Invitation Generation) - 
https://mail.jabber.org/pipermail/standards/2021-October/038605.html
 * XEP-0445 (Pre-Authenticated In-Band Registration) - 
https://mail.jabber.org/pipermail/standards/2021-October/038604.html


[1] https://mail.jabber.org/pipermail/members/2021-September/009322.html

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2021-10-13

2021-10-18 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-10-13?p=h#2021-10-13-80211e79f898a49f

1) Roll Call
Present: Zash, Jonas, Dave, Daniel
Present-but-also-not: Georg

2) Agenda Bashing
Jonas is pleased the agenda wasn't sent too late this time - nobody else seems 
to have seen it - Jonas specifically remembers composing the agenda.
Apparently, you also have to send emails before others can see them - who knew.

3) Editor's Update
* XEP-0280 advanced to Stable 

4) Items for voting
Nothing.

5) Pending Votes
Jonas has poked Sonny, the author of XEP-0459 (XMPP Compliance Suites 2022) - 
Sonny wishes to incorporate some of the feedback; Jonas suggests cancelling 
this vote and awaiting those changes - nobody objects.

There were no objections to deprecating XEP-0411 (Bookmarks Conversion) 
on-list. (Jonas already voted +1 last week.)
Zash: +1
Daniel: +1
Dave: +1
Georg: +1

6) Date of Next
2021-10-20 1500 UTC

Jonas will have an Important Meeting™, and so may be running late if that runs 
late.

[Advance warning of the traditional European clock fiddling on the 31st, with 
North America joining in a week later.]

7) AOB
None.

8) Close
Praise to the chair, and thanks to all.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] XEP-0392: colour vision deficiency adaptation

2021-10-14 Thread Tedd Sterr
I agree with your reasoning.
Colours should be adjusted through a modified colour-profile for the device 
(screen), which should already be handled by the OS and with the appropriate 
settings by the user.
Though, as Matthew said, it's still worth noting that colour should be 
considered an enhancement, and not be essential for using the interface.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] LAST CALL: XEP-0459 (XMPP Compliance Suites 2022)

2021-09-21 Thread Tedd Sterr
Sorry this is last minute, but here are some thoughts:

1. The Last Call questions aren't really appropriate because 
usual-argument-about-compliance-suites-not-really-belonging-in-standards-track.

2. I know the idea is to get it out of the way before change of Council, but it 
still feels too early.

3. Core Suite, Core Client, Core Server, Core features, core core core core 
core! I think we need another word, if only to make talking about things 
clearer. Given that all of the other suites require and build upon the Core 
Suite as a base, it makes sense to rename it to "Base Compliance Suite" (or 
similar.)

4. The original version (XEP-0242/0243) had two simple categories, Core and 
Advanced, and that was all; later versions just continued with that. The IM 
Suite, especially, is becoming quite top-heavy, so adding a middle level would 
be good - but what to call it? Instead of names, how about simply Level 1, 
Level 2, and Level 3 - right now that would map Core to Level 1 and Advanced to 
Level 3, then a subset of Level 3 could make up Level 2. Note that not all 
Suites require 3 levels (or even 2 in the case of Web). [This also fits nicely 
with a compliance badge design idea I have.]

5. The tables could also be simplified from several columns (particularly if 
organised into levels): as everything in Core (Level 1) is a requirement for 
Advanced (Level 2 or 3), sectioning the tables (thick lines to separate) would 
allow one column for Client and another for Server, with levels increasing for 
each successive section (where additional levels are needed), avoiding the need 
for repetition between Core and Advanced, without making the tables noticeably 
longer (feature rows with two Xs could be omitted.)

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] XEP Advancement Shortlist

2021-06-01 Thread Tedd Sterr
I'll just leave this here…

https://mail.jabber.org/pipermail/standards/2020-January/036918.html



___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2021-03-31

2021-04-13 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-03-31?p=h#2021-03-31-73bb35836fe3ee0d

1) Roll Call
Present: Jonas, Zash, Daniel, Georg
Definitely not attending non-existent secret society meetings: Dave

2) Agenda Bashing
None.

3) Editor's Update
* Published Content Rating Labels as XEP-0456

4) Deprecate XEP-0013 (Flexible Offline Message Retrieval) - 
https://xmpp.org/extensions/xep-0013.html
Last week Sam requested this be Deprecated due to significant overlap with 
XEP-0313 (Message Archive Management).
Georg never liked the XEP-0013 workaround for the MAM use case, but there are 
no recommended alternatives. Zash suddenly notices that XEP-0136 (Message 
Archiving) was deprecated. Daniel believes there are actually very few 
implementations using message purging, though there isn't a mechanism to 
replace it; but is still in favour of deprecating. Kev notes that XEP-0386 
(Bind 2.0) does provide such a replacement. Georg believes 0013 can be 
deprecated, and there doesn't appear to be a great need to replace it. Daniel 
doesn't think the existence of a replacement is a strict requirement for 
deprecation. Zash thinks the underlying problem might be that interaction 
between XEP-0013 and XEP-0313 is unspecified.
Georg wonders whether it would be possible to create something better than 
0013, but not as extensive as XEP-0386. Jonas suggests an option might be to 
insert the message purging part from 0013 into 0313, and then deprecate 0013. 
Georg suggests an alternative could be that a client using MAM on connect would 
have its offline message history dropped.
Sam thinks it would be fine to go straight ahead with deprecation, since it 
shouldn't break anything, and doing so may even encourage efforts towards 
producing a replacement. Daniel thinks moving the purge protocol into 0313 
sounds like a good intermediate solution - Georg is concerned by the many race 
conditions in MAM, without adding 'delete all history now' to the pile - Daniel 
doesn't find MAM to be so terrible, even when combined with dropping history - 
Georg notes that everything works only if the correct rituals are performed in 
exactly the correct order (and the ordering is undocumented, naturally.)
Daniel checks for some agreement that a non-Bind2 alternative to offline 
message history purging is a wanted feature, and whether the MAM authors would 
be okay with adding that before 0013 is deprecated - Georg is ambivalent 
regarding that feature. Zash questions whether it needs to go into 0313, as it 
would no longer be needed once offline messages are no longer in use. Kev would 
also prefer not to add this temporarily into 0313, unless there is no intention 
to advance 0313; it should be put into a new XEP until Bind2 is solved.
Georg suggests "do not deliver offline messages to a MAM client" and "expire 
old messages from offline history if full instead of rejecting new ones" as 
additions to 0313. Kev believes that users are unlikely to care which clients 
have received which messages, and so doesn't see a need for per-client offline 
message storage - Georg thinks users still want to see all messages on all 
clients, not whichever random subset happens to remain. Georg believes there 
would be great benefit to improving the perceived reliability of XMPP for 
legacy clients, such as Pidgin, at a very low cost.
Jonas sees that there are arguments about how MAM catch-up might be improved, 
but those are only tangentially related to whether 0013 should be deprecated.
Kev questions what the proposal is, other than using Bind2 (or something 
similar) to inform the server that you're a MAM capable client and not to send 
offline messages - Georg's proposal was simply not to send offline messages to 
any MAM capable client (using MAM already indicates MAM capability.)

Zash: +1
Georg: +1
Daniel: +1
Jonas: +1
Dave: [pending]

Jonas directs further matters in this enthralling discussion towards the still 
active XEP-0313 Last Call thread [1], or into a separate discussion for Bind2 
design.

5) Pending Votes
None.

6) Date of Next
2021-04-07 1500 UTC

7) AOB
Jonas queries the possibility of moving Council meetings into the XSF MUC, 
given that many discussions start in here and should really be carried over 
into there. Zash isn't opposed - it always seemed weird for Board to hold their 
meetings there, but not Council; Kev sees no reason to do it, and possible 
reasons not to. Jonas thinks it might encourage more non-Council input, though 
also more noise. Georg thought the Council meeting was moved away from the XSF 
MUC precisely to separate it from the additional noise.
Kev thinks the significant advantage to leaving it in here is filtering, as the 
XSF MUC is quite noisy and can safely be ignored most of the time, while 
anything happening in here is expected to be more worthwhile. Daniel isn't a 
fan of Board meetings being held in the XSF MUC, and would prefer Council 
meetings aren't held there either - if only not to interrupt others' 

[Standards] Council Minutes 2021-03-24

2021-03-30 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-03-24?p=h#2021-03-24-6f9e9aac8b614c65

1) Roll Call
Present: Zash, Daniel, Dave, Georg, Jonas

2) Agenda Bashing
None.

3) Editor's Update
* Georg Lukas added as author to XEP-0280
* Last Call for XEP-0280 (announcement emails still to be sent)

4) Items for Voting
None.

5) Pending Votes
Georg votes +1 on PR #1044.

Georg votes +1 on Content Rating Labels.

6) Date of Next
2021-03-31 1500 UTC

[Note the time change, as Europe will be on DST, technically making the meeting 
time one hour earlier for those outside of the change (thus back to 'normal' 
for those who changed earlier.)]

7) AOB
Georg mentions the suggestion raised earlier [1] in the XSF MUC, that XEP-0013 
(Flexible Offline Message Retrieval) might be deprecated and/or replaced [with 
a tiny XEP to cover offline message purging], given the prevalence of XEP-0313 
(Message Archive Management) - Jonas thinks this discussion may have happened 
before - Georg thinks it was discussed repeatedly, with the conclusion of 
handling it in XEP-0386 (Bind 2.0) at the next summit (a suggestion repeated 
every year since 2015.)
Kev notes that XEP-0386 does already cover clearing offline messages in the 
presence of MAM - Jonas suggests that a few Bind 2.0 implementations could help 
to iron out the edge cases, which would solve a number of things that really 
need solving - Zash mutters something about SASL2, IBR2, and AllTheThings2 - 
Jonas agrees this should ultimately result in XMPP 2.0 (Zimpy Reloaded). Dave 
notes that usage of (something akin to) XEP-0430 (Inbox) appears to have 
obviated the need for offline messaging.
Jonas suggests that a new RFC might be appropriate - Daniel would like to make 
it RESTful - Georg wonders whether the tribal knowledge of the RFC-writing 
elders has been lost.
Sam, who raised the point earlier, would like this to be discussed properly 
next week as he believes there is real harm in recommending a spec which has 
significant overlap with MAM just for one tiny feature, and little harm in 
deprecating it. Jonas advises reminding him next week to add it to the agenda - 
Sam sets a reminder for himself to send a reminder.

8) Close
Thanks everyone.


[1] https://logs.xmpp.org/xsf/2021-03-24?p=h#2021-03-24-e9834b39af947f41

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2021-03-17

2021-03-24 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-03-17?p=h#2021-03-17-85765ff0a73eae60

1) Roll Call
Present: Jonas, Zash, Georg, Daniel, Dave

2) Agenda Bashing
Georg wishes to guide XEP-0280 through The Process™ on its way to adulthood.

Jonas recommends that people should make their intentions for AOB known through 
random outbursts during the meeting, in the hope of avoiding a prolonged 
silence while everyone looks awkwardly at each other before eventually 
realising there is nothing more; thanks go to Dave for that excellent idea.

3) Editor's Update
* Last Call issued for XEP-0313 (Message Archive Management) - implementers 
should respond [1]

4) Add Georg to the XEP-0280 (Message Carbons) authors - 
https://xmpp.org/extensions/xep-0280.html
Georg notes that this was already discussed on the list [2], and Georg 
graciously volunteered; one of the original authors, Joe Hildebrand, has no 
objections to someone else taking over.

Dave: +1
Jonas: +1
Georg: +1
Zash: +1
Daniel: +1

Jonas directs Georg to make any necessary changes to XEP-0280 and add himself 
as an author.
Georg, as an official author, requests a Last Call - The Editor shall process 
that forthwith.

5) Pending Votes
Votes required on PR #1044 from Dave, Georg, and Jonas - Jonas notes there was 
discussion on-list [3].
Georg thanks Fippo for the feedback, and will read up on that before voting.
Dave votes +1.
Jonas votes +1 (based on the positive feedback, lack of negative feedback, and 
own judgement that it's 'probably fine')

Georg is also missing a vote on Content Rating Labels.

6) Date of Next
2021-03-24 1600 UTC

[Note: DST is now in effect in North America, so the meeting time will appear 
to be one hour later for those affected; European DST begins on the 28th.]

7) AOB
There were no random outbursts during the meeting.

Georg laments the awkward silence.

8) Close
Thanks everyone.


[1] https://mail.jabber.org/pipermail/standards/2021-March/038252.html
[2] https://mail.jabber.org/pipermail/standards/2021-March/038234.html
[3] https://mail.jabber.org/pipermail/standards/2021-March/038232.html

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2021-03-10

2021-03-13 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-03-10?p=h#2021-03-10-46a8e412b5f68829

1) Roll Call
Present: Daniel, Zash, Dave, Jonas, Georg

2) Agenda Bashing
None.

3) Editor's Update
* New ProtoXEP: Content Rating Labels

Sam would like for XEP-0280 (Message Carbons) to be considered for advancement 
again soon - Jonas suggests poking the authors to ask the Editor, as with MAM.

4a) PR #1044 (xep-0294: add mapping for a=extmap-allow-mixed) - 
https://github.com/xsf/xeps/pull/1044
Daniel asks whether there are best practices for adding new elements in the 
same namespace, as there was a similar case for rtcmux recently - Jonas thinks 
the general consensus is "don't"; Dave says that if it's an optional element 
then it's technically breaking XML namespacing rules, but thinks it should be 
fine pragmatically.
Zash ponders whether this ought to have been discussed on the list first - Dave 
was going to raise this too; Jonas had conveniently forgotten that rule, and 
this PR wasn't even originally on the agenda.
Daniel thinks the PR is probably fine and doesn't see it breaking anything in 
practice, though the proper solution should be to put this in a new namespace - 
Dave thinks that's more pedantic than proper (namespace bumps are to prevent 
interoperation failures, which this presumably shouldn't cause - it should be 
safe to omit this element, and to ignore it.) Zash thinks the general principle 
of ignoring unknown elements should make this fine without a namespace bump.
Zash is irked by the (less visible) discussion on GitHub, rather than on the 
list. Jonas thinks raising it on-list would be good, especially as it relates 
to Jingle. Dave is also irked and would prefer it were run past people on-list 
first.

Daniel: +1
Zash: +1 (PR comments are reassuring, and Trust In Fippo®)
Dave: [on-list]
Jonas: [on-list]
Georg: [on-list]

4b) Proposed XMPP Extension: Content Rating Labels - 
https://xmpp.org/extensions/inbox/content-ratings.html
Daniel: +1
Jonas: +1 (author)
Georg: [on-list]
Zash: +1 (noticed some issues, but sure the author will fix them in 
Experimental)
Dave: +1 (seems worth working on)

Zash is particularly impressed by the extensive plain-text compatibility 
conversion algorithm (§4.1) - Dave thought it seemed overly simplistic and even 
misses some key cases.

5) Pending Votes
None.

6) Date of Next
2021-03-17 1600 UTC

Georg will be in a video conference, which may require several seconds of his 
attention.

[Note: North America participates in its bi-annual clock-fiddling on the 14th, 
so the meeting time will appear to be one hour later for those affected, until 
Europeans play the same game on the 28th.]

7) AOB
None.

8) Close
Thanks Jonas, Tedd, all.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2021-03-03

2021-03-10 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-03-03?p=h#2021-03-03-ff70d22f35a5a358

1) Roll Call
Present: Daniel, Zash, Georg, Jonas, Dave

Dave has definitely not just arrived from a secret gathering (which definitely 
did not happen) with a clandestine cabal (with which he definitely has no 
association) in a secret room (which definitely does not exist).

2) Agenda Bashing
Georg hopes it's possible to fit the extensive list of items comfortably into 
half an hour.

3) Editor's Update
Nothing.

4) PR #1041 (Update mix namespace for XEP-0406 and XEP-0408) - 
https://github.com/xsf/xeps/pull/1041
The Editor requests guidance on whether this requires a namespace bump in the 
two XEPs, since it changes which elements are allowed/expected in the affected 
PubSub nodes - Dave thinks this looks like an errata correction, so no. Editor 
ponders the implications for namespace bumping in future modifications of 
XEP-0369 (Mediated Information eXchange (MIX)) - would it propagate through the 
whole stack of MIX XEPs?
Daniel thinks this particular PR is fine, but isn't sure if the same will apply 
to others - Jonas agrees - Daniel adds that since the XEPs are Experimental, 
the authors are free to make radical changes.
Georg asks whether it makes sense to bump all MIX elements together - Jonas 
says that's the ultimate question, and will probably need to be judged per 
case. Georg will just continue to pretend that MIX doesn't exist.
Daniel doesn't expect it will be possible to namespace bump MIX once it's 
widely implemented - Jonas thinks it's useful during Experimental, at least.
The author of the PR, Mathieui, notes that the namespace bumps are primarily to 
help avoid confusing implementers, as MIX has seen increased interest lately.

5) Pending Votes
There are none.

6) Date of Next
2021-03-10 1600 UTC

7) AOB
None.

8) Close
Thanks everyone.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2021-02-24

2021-02-28 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-02-24?p=h#2021-02-24-2af2318de06a7009

1) Roll Call
Present: Zash, Jonas, Daniel, Georg, Dave

2) Agenda Bashing
The very late agenda is woefully empty, but nobody has any better suggestions 
at this moment.

3) Editor's Update
"nada"

4) Updated PR #1032 (Data Forms Clarifications) - 
https://github.com/xsf/xeps/pull/1032
Jonas notes that the author, Flow, approves of the proposed change [1] and 
there was no other feedback.
Georg looks for the exact sequence of changes leading to this version - Jonas 
squashed everything into one update to keep the versioning tidy.

Jonas: +1
Daniel: +1
Zash: +1
Georg: +1
Dave: +1.4 (as before, but this is an improvement, so even more than 1)

Sam decides this would be an appropriate time for Agenda Bashing, and requests 
that XEP-0313 (Message Archive Management) be considered for advancement (to 
Draft) once again - Editor would prefer the request came from one of the 
authors, considering they might have pending updates to apply first.

5) Pending Votes
None (even from today.)

6) Date of Next
2021-03-03 1600 UTC

7) AOB
Dave didn't bring any worms this time.

8) Close
Thanks everyone and all.


[1] https://mail.jabber.org/pipermail/standards/2021-February/038188.html

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2021-02-17

2021-02-24 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-02-17?p=h#2021-02-17-a7279024de1951f7

1) Roll Call
Present: Daniel, Georg, Zash, Jonas, Dave

2) Agenda Bashing
There are no complaints.

3) Editor's Update
Nothing to report.

4) Items for voting
None.

5) Pending Votes
Dave votes on PR #1032: +1 (doing otherwise will break several implementations, 
including anything based on Smack; think this is the original intent [of 
XEP-0004] and early implementations appear to follow it.)
Georg hasn't yet caught up on the really long thread.
Zash thinks the thread appears to have a rough consensus, and votes +1.
Jonas says that the behaviour of aioxmpp on the client side matches what Drew 
described [1] - Dave doesn't think reordering matters much when consuming, but 
does when producing, and seems entirely wrong when forwarding - Jonas agrees 
that forwarding shouldn't reorder things. Kev doesn't think breaking Smack is a 
motivation to do things, but that creating headers after their content is 
probably broken, and hopes any forwarding entity which changes the order is 
only used within a closed deployment.
Daniel doesn't see how the existing text intended for 'reported' to come first, 
nor why it's desirable - Jonas agrees - Kev thinks it seems like the Right 
Thing, but even though it doesn't appear the original text necessarily mandated 
it, it's clear that was the intention (exemplified in §3.4 "…describing the 
data to follow") - Dave agrees that it's not very clear, but the intent is 
there.
Georg verifies that the decision is to break implementations which don't follow 
this - Dave suggests the alternative would be to break implementations which do 
- Georg says they don't have an explicit right to rely on it, rather a vague 
implication. That said, Georg is okay with changing the vague implication to a 
formal requirement.
Jonas is quite reluctant about the 'MUST' because this is Final (less issue if 
it were Draft or Experimental), and thinks this needs a good rationale and text 
content explaining the change - Georg suggests adding a note about earlier 
versions of the XEP not strictly mandating order. Dave would be okay with a 
'SHOULD', though aioxmpp and ejabberd would still need to be fixed.
Georg votes: -1 (as-is, with the MUST; +1 for a MUST with explanatory textbox, 
or just a SHOULD.)
Daniel could be on board with a SHOULD, since this shouldn't be a big deal in 
practice (ignoring those who need to fix their code) - Dave asks why a SHOULD 
is preferred here - Daniel feels it's less bad when changing a Final XEP.
Georg proposes some text to go in a box. Dave thinks the standards list should 
be consulted - Jonas considers the addition of a box as editorial - Dave says 
that means Council don't get to vote, not that the community is bypassed. Kev 
thinks that adding a box is editorial, but adding text about implementations 
and encouraging behaviour certainly isn't (even if that happens to be inside a 
box.) Jonas will put it to the list, but doesn't see the necessity given that 
this PR wouldn't have been discussed there otherwise - Dave thinks that's a 
problem in itself, and prepares a can of worms for AOB. Zash can't handle any 
worms today.
Jonas pushes a patch onto the PR, and plans to vote on the updated version next 
week after possible list feedback [2].
Jonas votes once again: -1 (the new diff looks better considering the current 
state of the world.)

6) Date of Next
2021-02-24 1600 UTC

7) AOB
Dave notes that the Data Forms discussion on-list was very useful, but only 
started once voting had already begun, which feels awkward; it would be better 
to discuss things first, and only add them to the agenda once they have been 
discussed, so Council can just vote - Jonas agrees.
Jonas thinks it would be great if some CI magic could be used to automate 
announcements of PRs tagged with 'Needs List Discussion' and 'Needs Council'.
Dave suggests advising that things don't get added to the agenda until after 
somebody starts the discussion on-list - Jonas doesn't see any significant 
issue with that; Zash approves of subverting the GitHub flow. Jonas continues 
to fantasize about automation, but likes Dave's proposal as a first iteration. 
Dave admits that it pushes extra work onto the submitter, but encourages them 
to add some rationale and convince people. Daniel is somewhat fine with the 
current flow (Council gets to decide on uncontroversial things and refers 
others back to the list), but is also fine with this new suggestion - Dave 
doesn't think Council deciding what is actually controversial is optimal, given 
potential bias and the lack of an appeals process.
Jonas prepares an email explaining the proposed change [3].

8) Close
Thanks Jonas, Tedd, All, Sundry.
Dave apologises for his contribution to the meeting overrun - Jonas thanks Dave 
for the neat idea.


[1] https://mail.jabber.org/pipermail/standards/2021-February/038175.html
[2] 

Re: [Standards] XEP-0393 styling directive logic still incorrect

2021-02-23 Thread Tedd Sterr
Greedy matching means take as many characters as you can while still satisfying 
the condition, i.e. find the longest match.
Lazy matching means take the first match you find, i.e. find the shortest.

In the form of regular expressions, we have:
 * greedy = /\*.+\*/
 * lazy = /\*.+?\*/

The text is already correct.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] Announcing Slummit 2021

2021-02-18 Thread Tedd Sterr
I'd like to say yes, but there doesn't appear to be a lot of active interest.
If enough people are prepared to do talks then that would be great, but if 
there are only two then I'm not sure it's worth wasting those people's time and 
effort.

Maybe I should have made more noise about it and sent frequent reminders and 
encouragement.
I'm also aware that the past year has been draining for many and hasn't 
provided much in the way of motivation - this was partly an attempt to counter 
that by encouraging some engagement, though it also suffers from the same 
effects.

So, how many are willing and able to provide content?
Or shall we postpone it indefinitely, with a vague suggestion of picking it up 
at the end of the Summer?



From: Standards  on behalf of goffi 

Sent: 18 February 2021 16:10
To: XMPP Standards 
Subject: Re: [Standards] Announcing Slummit 2021

Hello, is this virtual summit still at thing? I see that it's supposed
to happen this week-end, but I see no activity either here on on summit@
MUC room.
I was willing to propose a short talk about what I've worked on lastly,
and I can still do it if it's not too late, but I would like to be sure
that it is still happening.

Thanks!
Goffi

P.S.: this should be probably on summit@ mailing list, but the original
thread was here.
___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2021-02-10

2021-02-17 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-02-10?p=h#2021-02-10-f8b1c3d52716488e

1) Roll Call
Present: Daniel, Zash, Jonas, Dave
Apologies: Georg

2) Agenda Bashing
Silence.

3) Editor's Update
* New XEPs:
  - XEP-0455: Service Outage Status

4) Items for voting
None.

5) Pending Votes
Jonas notes the lack of discussion on PR #1032 (Data Forms Clarifications), 
which he did intend to start, but his eventful life had other ideas.

Dave votes on Implicit WebSocket Endpoints: -1 (veto without prejudice, on the 
assumption that a different proposal will emerge; it implies a server default 
of listening on unencrypted sessions, and devalues XEP-0156; expecting 
something closer to a 'suggested defaults' with both test and production 
recommendations.)
Jonas notes a small PR to update the XEP [1].
Daniel is glad Dave is doing the vetoing, so he doesn't have to - Dave suggests 
he still should, in case of other interesting reasoning.
Daniel votes: -1 (a XEP that defines a recommendation for default ports and 
paths is interesting, but this one goes way beyond and tries to influence 
client behaviour, which might lead to poor choices with regard to XEP-0156; 
agree with Dave that starting a fresh XEP is preferable to heavily editing this 
one.)
Jonas votes: -1 (let's not repeat the A/ fallback mistake when there's no 
evidence it's needed for practical interoperability concerns.)
Kev isn't convinced that A/ fallback was a mistake at the time.
Jonas expects '.well-known' will require some IANA interaction.
Dave can see that defaults are nice for ease of testing and deployment, and 
recommendations for production deployment are great too, but that seems like a 
fundamentally different XEP than this one. Kev wonders why production 
deployment recommendations are so great - if a client is doing lookups, isn't 
that entirely the deployment's choice, in which case why is one recommendation 
better than another? Dave thinks that suggesting websockets run on port 443 
over TLS is useful advice, and materially better than 5280 without TLS; Jonas 
suggests that would be an Informational XEP - Zash and Daniel support that 
idea. Kev agrees that TLS is great advice, though is less sure on port 443, but 
can see an argument for it (and any other port recommendation would be a bad 
thing). Kev thinks an XEP saying "always use TLS, and port 443 might be a good 
choice" would likely be less harmful than other possibilities - Zash thinks 
there might already be RFCs saying "always use TLS!"
Jonas asks whether anyone is willing and able to take on the work of making 
this happen - Dave was assuming Flow (the author) or Sonny would want to; Jonas 
thought Sonny looked interested in moving this towards a default recommendation.
Zash votes: -1 (fallbacks bad, TLS good, what everyone else said; try again 
with a new proposal.)

Jonas assumes PR #1032 will be discussed on-list. Daniel doesn't see how it 
wouldn't require a namespace bump - Zash prays to a deity - Dave thought it 
seemed okay - Jonas thinks it's worth going the whole way and also killing the 
'reported' element at the same time. Daniel thinks the usage of "clarifying" 
has been pretty liberal in the past - Jonas would prefer to forbid that word 
from defiling any XEP PRs again.
Dave presumes that either people do care about the ordering, or they don't; a 
fix would be to say "SHOULD send in order" and "MUST accept in any order" - 
Jonas and Daniel could live with that; Daniel queries why anyone would send in 
order if it will always be accepted in any order. Dave accepts this needs 
further discussion.
Jonas sent a reply on-list [2].

6) Date of Next
2021-02-17 1600 UTC

7) AOB
Jonas has a pleasant conversation with his echo, over kaffee und kekse.

8) Close
Thanks all for one, and one for all.


[1] https://github.com/xsf/xeps/pull/1035
[2] https://mail.jabber.org/pipermail/standards/2021-February/038148.html

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2021-02-03

2021-02-10 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-02-03?p=h#2021-02-03-16c5bf8a7f6e3e9d

1) Roll Call
Present: Daniel, Zash, Dave, Georg, Jonas

2) Agenda Bashing
None.

3) Editor's Update
* Proposed XMPP Extensions:
  - Implicit WebSocket Endpoints

4a) Proposed XMPP Extension: Implicit WebSocket Endpoints - 
https://xmpp.org/extensions/inbox/xep-iwe.html
Daniel isn't the biggest fan - Georg thinks Daniel brought up a good point [1] 
and his own HAProxy deployment seems to agree. Daniel might be less opposed to 
an Informational XEP titled "Recommendation for default port and path for 
websocket connections", which would address Sonny's point [2] - Dave asks 
whether that would mean every XMPP server would need to change its defaults - 
Daniel admits it would, though the current XEP makes an even stronger 
requirement, hence including 'recommendation' in the title.
Dave isn't sure listening on non-TLS websockets should be encouraged these days 
- Daniel agrees. Georg thinks the only reason would be for local development 
and CI/CD, but there are possibly more elegant solutions for those. Zash is 
sceptical and thinks no-SRV fallback seems like a mistake in hindsight, so 
maybe it shouldn't be repeated - Jonas agrees and thinks it causes annoying 
issues.
Zash asks whether it at least qualifies for Experimental - Daniel thinks so, as 
he expressed on-list - Zash agrees. Daniel thinks the Informational XEP might 
be a compromise, as Sonny does have a point.
Dave might veto, but will post an explanation to the list [3] - in summary: 
non-TLS websockets seem bad; 'suck it and see' doesn't seem like an approach to 
be encouraged; and it's highly restrictive having the websocket default to the 
same domain with a different port.
Georg finds that ~6% of client connections to yax.im use the non-SRV fallback - 
Daniel confirms he found ~10% the last time he checked for his server. Jonas 
mentions Pidgin has regularly fallen back to A/ records because SRV lookup 
was failing due to the resolver not being ready - doesn't think that accounts 
for all of those connections, but such issues are a factor; could be addressed 
by abolishing that endpoint and mandating SRV (i.e. retry SRV instead of 
fallback). Georg says that old SOHO router resolvers lack SRV support. Daniel 
agrees that resolving SRV over crap wifi is an issue, but that's not the case 
for XEP-0156 (Discovering Alternative XMPP Connection Methods) over HTTP.
Dave would be amenable to a default path and default port for WSS, as Daniel 
proposes, which should satisfy much of the local development use case.

Jonas: [on-list] (haven't read it yet)
Zash: [on-list]
Georg: [on-list]
Daniel: [on-list] (+0 at best)
Dave: [on-list] (likely to veto)

4b) PR #1032 (Data Forms Clarifications) - https://github.com/xsf/xeps/pull/1032
Jonas sees this as a massive normative change, rather than the clarification it 
claims to be; it introduces a precedent of requiring relative ordering of 
unrelated elements. Dave doesn't think that's actually a new precedent - the 
existing text says the 'reported' element describes the data to follow; also 
recently noticed that SleekXMPP/SliXMPP already assumes an order. Jonas isn't 
sure that imposes a strict ordering requirement, and knows of at least one 
implementation which doesn't guarantee the order and would become non-compliant 
with such a change.
The author, Flow, says that form-field type-aware parsing of data forms becomes 
more complex if the order isn't specified, and it appears to be the norm to 
have 'reported' first because people copy directly from the examples. Daniel 
thought the lack of element ordering was the reason schemas are non-normative - 
Flow says that's why it's specified in the normative text and not the schema.
Jonas still isn't convinced this is a clarification - Flow suggests that any 
change which clarifies a normative requirement that wasn't previously 
explicitly spelled out could be considered a normative change; sees it as a 
trade-off. Flow would tolerate implementations changing the order of 
first-level stanza extensions, but not the order of arbitrary elements while en 
route.
Georg seeks agreement that the updated first commit is indeed a clarification - 
Jonas and Zash agree.
Dave is happy to discuss this further on the list - Jonas will reluctantly 
start a thread.

Jonas: -1
Daniel: [on-list] (too distracted by the bike shed and forgot to read this)
Georg: [on-list]
Dave: [on-list]
Zash: [on-list]

5) Pending Votes
Dave votes on Service Outage Status: +1 (pretty sure the general concept is 
fine.)

6) Date of Next
2021-02-10 1600 UTC

7) AOB
None.

8) Close
Thanks everyone!


[1] https://mail.jabber.org/pipermail/standards/2021-February/038115.html
[2] https://mail.jabber.org/pipermail/standards/2021-February/038117.html
[3] https://mail.jabber.org/pipermail/standards/2021-February/038127.html

___
Standards mailing list
Info: 

[Standards] Council Minutes 2021-01-27

2021-01-30 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-01-27?p=h#2021-01-27-96c9dcda82e34fee

1) Roll Call
Present: Jonas, Daniel, Zash, Dave
Stuckinendlessmeetings: Georg

2) Agenda Bashing
Millions of voices suddenly cried out in silence and were suddenly silenced.

3) Editor's Update
* Accepted as Experimental:
  - XEP-0452 (MUC Mention Notifications)
  - XEP-0453 (DOAP Usage in XMPP)
  - XEP-0454 (OMEMO Media Sharing)

4) Items for voting
public final SortedSet items = new TreeSet();

5) Pending votes
Daniel and Dave are pending on 'Service Outage Status', which expires next week.

6) Date of Next
2021-02-03 1600 UTC

7) AOB
Jonas asks whether anyone knows of initiatives in the community to implement 
interoperable group A/V calls - Daniel says Dino got funding for that - Jonas 
is aware they have something planned [1] - Daniel hopes to join the bandwagon 
once they're successful. Jonas is less impressed by Jitsi's official stance [2].
Dave suggests having these discussions on the mailing list, so relevant people 
can make good contributions.

Daniel checks whether he needs to clarify XEP-0363 (HTTP File Upload) with 
regard to an earlier discussion [3] - Jonas thinks adding extra wording would 
benefit the reader, but isn't strictly necessary; Dave thinks it's clear enough 
and isn't something for Council to worry over, but one can always a start a 
mega-thread on the list.

8) Close
Thanks everyone.

While still knee-deep in patching half the country, Jonas reminds everybody 
else to patch their sudo versions (due to CVE-2021-3156 [4]).


[1] https://dino.im/blog/2020/08/setting-out-for-calls-and-conferences/
[2] https://github.com/jitsi/jitsi-meet/issues/6235#issuecomment-616721373
[3] https://logs.xmpp.org/xsf/2021-01-27?p=h#2021-01-27-8ff21c99fd537374
[4] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] Announcing Slummit 2021

2021-01-30 Thread Tedd Sterr
Due to forseen circumstances, this will be postponed until 20-21 February.

I was trying to fit it into what would have been the usual Summit time, but it 
was obviously a last minute idea and not really enough time for people to 
prepare anything worthwhile. Since there's no strict reason to keep with that 
time, I hope three weeks from now is adequate; 20-21 is also a weekend, which I 
hope is preferable.

I was asked whether content should be aimed at members & devs only - I don't 
think there's any reason to limit it only to members, but I think it's safe to 
assume some familiarity with XMPP. A separate event for a wider, novice 
audience would be good for marketing, but this isn't it.

If anybody wants help, advice, suggestions for content, or "would this be 
okay?" then I'll be available for discussion, brainstorming, and talking 
nonsense.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Slummit 2021 - Talks

2021-01-29 Thread Tedd Sterr
If you'd like to give a talk then record a presentation (e.g. slides/pictures & 
voice-over, or talking in front of the camera) of around 15-20 minutes, save it 
somewhere, and provide a title+link in this thread (to keep them together.)

I'd suggest trying to record it all in one take as if you were doing it live, 
if only to avoid spending too long trying to get it perfect (you can always 
edit out major mistakes afterwards, though too many jump cuts is worse than the 
odd slip-up.)

I will collect them on Wednesday (submissions before then, please!) and 
schedule them for Thursday and Friday. Inevitable late submissions will be 
slotted in somewhere. People may want to watch them beforehand, but I'll 
arrange 30 minutes per talk (20 for the talk and 10 for questions) plus some 
breaks in between.

The sum...@muc.xmpp.org MUC already exists and many of you are already there, 
so it makes sense to use that - talk givers should be present to answer 
questions during and after their talk.

The following week, I'll try to put together a digest of the talks and 
interesting questions for more media noise.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Slummit 2021 - Tales

2021-01-29 Thread Tedd Sterr
Post your tales of projects, developments, and other fascinating XMPP-related 
stories in this thread to keep them all in one place.

Write a few short paragraphs about what you've been working on, participating 
in, any projects you feel others should be made aware of, or anything 
XMPP-related that you think others would find interesting. Add any links to 
related blog posts, dev diaries, project websites, and code repositories at the 
end.

Worry less about getting the perfect wording and more about being enthusiastic 
- your passion will encourage others to be interested in what you're doing.

Next week I will gather them into a nice review for some XMPP Blog posts and 
Newsletter & social media announcements.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] Announcing Slummit 2021

2021-01-28 Thread Tedd Sterr
Alright, short talks it is!

If you'd like to give a talk, record a presentation (slides & voice-over, or 
dancing in front of the camera if you prefer) of around 15-20 minutes, save it 
somewhere, and provide a link.

If for some reason you'd prefer to stream it live, we could arrange that, 
though I expect it's beneficial for people to be able to watch/pause/rewind at 
their leisure and it gives them chance to come up with useful questions.

I'll work out a schedule for Q sessions for each talk (and get 
slum...@muc.xmpp.org setup ..?)

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Announcing Slummit 2021

2021-01-27 Thread Tedd Sterr
In lieu of an official Summit, I invite all interested parties to participate 
in the unofficial Slummit!

Reply in this thread with a few short paragraphs about what you've been working 
on, participating in, any projects you feel others should be made aware of, or 
anything XMPP-related that you think others would find interesting. Feel free 
to include a link to a longer, more detailed description elsewhere, but provide 
a digestible summary first.

It doesn't need to be a well-edited masterpiece, and you don't have to 
apologise for your less-than-perfect English, just get some words out and let 
people know what's going on in the XMPP-world!

Additionally, if there's interest, I was considering organising a few 
voice/video call mini-conferences for groups of 3-7 people (larger groups 
become a communication burden), each focusing on a particular topic. (Dates 3-5 
Feb, times according to participants' availability.)

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2021-01-20

2021-01-22 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-01-20?p=h#2021-01-20-5e7069fcb50ec8c9

1) Roll Call
Present: Georg, Zash, Jonas, Daniel, Dave

2) Agenda Bashing
Georg think it's a good agenda; nobody says otherwise.

3) Editor's Update
* Proposed XMPP Extensions:
  - Service Outage Status
* New XEPs:
  - XEP-0451 (Stanza Multiplexing)

4) Proposed XMPP Extension: Service Outage Status - 
https://xmpp.org/extensions/inbox/service-outage-status.html
Georg: +1
Jonas: +1 (will send a few notes to the list [1])
Daniel: [on-list]
Dave: [on-list]
Zash: [on-list]

Georg has no idea about the PubSub parts; not sure if the part in section 2 
(This information MUST be scoped using a FORM_TYPE of "urn:xmpp:tmp:sos") 
mandates actually implementing that feature.

5) Pending Votes
Jonas votes +1 on 'MUC Mention Notifications', and +1 on 'DOAP usage in XMPP'

Georg asks if there was any news from the Council Process Task Force regarding 
submitting a Historical XEP - Dave thinks people agreed that Historical sounded 
sensible; Jonas says nobody objects. Georg duly votes +1 on 'OMEMO Media 
Sharing'. Jonas awards Georg the Honorary Medal of Zero Pending Votes (the 
others try to conceal their envy.)

Trying to earn his own medal, Dave votes +1 on 'OMEMO Media Sharing', and +1 on 
'DOAP usage in XMPP' (noting that it should be tidied-up, change the namespace, 
etc.) Dave isn't sure he understood the implications of the SupportedXep XML 
blob within RDF - Zash thinks that might just be RDF doing what RDF does best.

6) Date of Next
2021-01-27 1600 UTC

7) AOB
None.

8) Close
Thanks everyone, stay alive and (reasonably) sane. Good night.


[1] https://mail.jabber.org/pipermail/standards/2021-January/038088.html

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2021-01-13

2021-01-19 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-01-13?p=h#2021-01-13-826319346f6c3f7a

1) Roll Call
Present: Daniel, Zash, Jonas, Dave, Georg

2) Agenda Bashing
Item 4c is found to be unnecessary, as an extra vote was overlooked.

3) Editor's Update
* Proposed XMPP Extensions:
  - DOAP usage in XMPP
  - OMEMO Media Sharing

4a) Proposed XMPP Extension: DOAP usage in XMPP - 
https://xmpp.org/extensions/inbox/doap-usage-in-xmpp.html
Jonas: [on-list]
Zash: [on-list]
Georg: +1
Dave: [on-list] (heavily leaning toward +1)
Daniel: +1

Daniel questions whether XEPs are the right format for specifying something 
that isn't a protocol extension - Jonas thinks it might be passable if defining 
how XEPs are to be used or referenced. Dave is happy for this to be an XEP, 
though not sure which track - possibly Procedural; Zash thinks Informational is 
fine; Jonas suggests Informational, as it's not a procedure of the XSF or 
Council.
Jonas consults the wisdom of crowds [1].

4b) Proposed XMPP Extension: OMEMO Media Sharing - 
https://xmpp.org/extensions/inbox/omemo-media-sharing.html
This was previously submitted for the Standards Track, but not accepted; is now 
resubmitted as Historical.
Jonas checks whether Link Mauve has the IPR agreement from Daniel to resubmit 
his work under a different track…
Daniel vaguely remembers his offer to move this to a different track was 
rejected, so accepting now would be overruling a previous Council decision.
Jonas rummages through history and finds the relevant Minutes [2] - thinks the 
gist is that Historical might be acceptable.
Dave feels uneasy about the URI scheme - Georg doesn't think there are 
ambitions to establish 'aesgcm' as a generic URI scheme - Dave expects it would 
still have to be registered - Georg thinks defining a non-standard URI scheme 
for use in a specific, strictly defined context is fair game. Dave will voice 
his concerns on the venerable list.

Georg: [on-list] (waiting for the XEP-0001 Task Force to make a ruling on 
legitimate options)
Zash: [on-list]
Daniel: [on-list]
Jonas: +1 (with any editorial fixes needed; better to have it documented than 
not)
Dave: [on-list]

Daniel would like to fix the example before publishing - Dave is happy to 
accept now and fix examples after. Jonas recommends RFC 7595 (Guidelines and 
Registration Procedures for URI Schemes) [3] as light bed-time reading.

5) Pending Votes
Georg, Jonas, and Zash pending on MUC Mention Notifications, expiring next week.

6) Date of Next
2021-01-20 1600 UTC

7) AOB
Dave asks Daniel whether he has formally given permission to resubmit the 
'OMEMO Media sharing' proto-XEP - he has not; Dave doesn't believe it can be 
accepted unless and until that happens. Daniel hereby officially grants 
permission for Link Mauve to resubmit the proto-XEP.

7) Close
Thanks everyone.

Jonas makes a quick exit.


[1] https://mail.jabber.org/pipermail/standards/2021-January/038057.html
[2] https://mail.jabber.org/pipermail/standards/2018-June/035135.html
[3] https://tools.ietf.org/html/rfc7595

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2021-01-06

2021-01-12 Thread Tedd Sterr
https://logs.xmpp.org/council/2021-01-06?p=h#2021-01-06-750969cd5c94569f

1) Roll Call
Present: Dave, Jonas, Zash, Georg, Daniel

2) Agenda Bashing
Jonas checks whether anyone wishes to mutate the agenda - having enjoyed the 
experience several times already this week, Georg (the masochist) invites 
everyone to spend twenty minutes explaining how they marked the year increment 
- Jonas considers that an appropriate addition to AOB.

3) Editor's Update
* Updated: XEP-0372 (References)
* New ProtoXEP: MUC Mention Notifications

4a) Proposed XMPP Extension: MUC Mention Notifications - 
https://xmpp.org/extensions/inbox/muc-mention-notifications.html
Dave: +1
Daniel: +1
Zash: [on-list]
Georg: [on-list]
Jonas: [on-list]

Georg thinks this should be configurable per member, not just per room by 
admin, otherwise mentioning somebody in all rooms you're present in could serve 
as a DoS redirection vector.
Jonas notes a typo: "… is encapsulated inside a Server IP Check (XEP-0279) [5] 
element" [should be 'Stanza Forwarding (XEP-0297)'.]

5) Pending Votes
Stanza Multiplexing expired during the break.

6) Date of Next
2021-01-13 1600 UTC

7) AOB
Jonas encourages enthralling tales of New Year's Eve; also pokes Dave about a 
certain video call - Dave pretends to know exactly what that means. Apparently, 
most spent their evening watching other people's firework displays.
Daniel suggests a breakout session during Summit - Dave wonders what planning 
has occurred so far in that regard (should ask Board to ask SCAM to keep 
Council informed) - Daniel notes that the FOSDEM date has been fixed (6-7 
February [1]), but SCAM has made no plans as yet. Jonas and Zash question the 
need to stick to the pre-FOSDEM date given the lack of physical presence - 
Daniel expects the date is as good as any other, and organising an alternative 
would be additional overhead [and we're really good at organising video calls!]

8) Close
Thanks all, thanks Tedd, thanks Jonas, thanks all, thanks Jonas.

[1] https://fosdem.org/2021/

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2020-12-16

2020-12-16 Thread Tedd Sterr
https://logs.xmpp.org/council/2020-12-16?p=h#2020-12-16-3e8f4fb185a2515b

1) Roll Call
Present: Zash, Jonas, Georg, Daniel, Dave

2) Agenda Bashing
None.

3) Editor's Update
* XEP-0450: Automatic Trust Management accepted as Experimental

4) Items for Voting
None.

5) Pending Votes
Jonas votes +0 on PR #1014; Georg votes +0 too.
Daniel votes +1 on PR #1008.
Dave votes +1 on PR #1001 (this is an improvement, but it's getting really 
complicated and not sure it lends itself well to a formal grammar)

6) Date of Next
Jonas will be unavailable next week; Dave doesn't expect to be available 
either, possibly for two weeks.
Jonas suggests skipping the next two weeks and meeting fresh-faced and well-fed 
in the new year - all are happy to go along with such a maverick plan.

2021-01-06 1600 UTC

7) AOB
Georg would like to wish everybody a nice and calm holiday season.
Zash wishes everyone a merry whatever and happy new pandemic next year.

Jonas will send a nice email to the standards list in an attempt to excuse 
Council's plans for blatantly neglecting their duties, and some well-wishes.

7) Close
Thanks Jonas, Tedd, and al.


[Wishing everyone happy Yule/Christmas/Hanukkah/Solstice/Festivus/December 
celebrations, and hoping next year will bring better times and good health.]

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2020-12-09

2020-12-10 Thread Tedd Sterr
https://logs.xmpp.org/council/2020-12-09?p=h#2020-12-09-b1b9c3afef6268d5

1) Roll Call
Present: Dave, Jonas, Zash, Georg, Daniel

2) Agenda Bashing
Ook.

3) Editor's Update
* New ProtoXEP: Stanza Multiplexing

4) Proposed XMPP Extension: Stanza Multiplexing - 
https://xmpp.org/extensions/inbox/mux.html
Zash: [on-list]
Daniel: [on-list]
Georg: +1 (liked it, but sure the Montagues and Capulets will never co-host on 
the same server)
Jonas: [on-list]
Dave: +1 (plenty to fix, but nothing preventing Experimental)

Georg notes that the IQ is missing an ID for the domain to be authenticated, 
leading to possible race conditions with multiple parallel muxes.

5) Pending Votes
There are a lot.

Dave votes +1 on PR #1014 (change has been updated); Daniel is also +1; Georg 
was waiting for a list discussion by the International Association of WebRTC 
Greybeards and Enthusiasts - Dave notes that the PR has been updated with a 
conversation.

Georg and Daniel vote +1 on ATM; Dave votes +0 (won't veto). Daniel doesn't 
think it will solve the problems with OMEMO, but is ready to be proven wrong; 
Georg thinks it will solve part of the biggest usability problem - Daniel isn't 
convinced it will, or that there aren't easier solutions. Daniel expects it 
will be implemented regardless, since there is funding, so it's good to get it 
under XSF IPR.

6) Date of Next
2020-12-16 1600 UTC

Jonas will probably not be around for the last two weeks of the year; others 
may follow his excellent example.

7) AOB
Zash is suffering the irony of being so technologically advanced that it limits 
his ability to send email, due to the rest of the world still not managing to 
update to IPv6 - Jonas suggests messaging the wonderful people of iteam.

Dave hasn't yet looked at XEP-0001 regarding Council voting.

8) Close
Oook.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] Proposed XMPP Extension: Character counting in message bodies

2020-12-09 Thread Tedd Sterr
XML is a sequence of characters (not bytes.)

References mark a portion of displayed text which is rendered as a sequence of 
characters (not bytes.)

So it makes perfect sense to define references in terms of bytes.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] Proposed XMPP Extension: Character counting in message bodies

2020-12-09 Thread Tedd Sterr
>> The decoding _should_ be done upfront - that's how you get a valid XML 
>> document.

> I don't think this is true. XML is defined as UTF-8 (in this case),
> which is a collection of bytes. They don't have to be separated out and
> transformed into some higher representation of code points. Just because
> Python et al. convert things into UTF-32 strings first doesn't mean
> everything has to.
>
> Regardless of what language you're using it's trivial to deal with this
> as a UTF-8 byte stream, it is not always trivial to handle this as a UTF-
> 32 integer stream as the example shows.

XML is defined as a sequence of characters, it doesn't specify how those 
character must be encoded (though it does require support for both UTF-8 and 
UTF-16.) UTF-7/8/16/32 are encoding schemes, not character representations - 
people do make the mistake of conflating the two things, but that doesn't mean 
they are the same.

Unicode doesn't specify the size of characters - they don't have a specific 
bit-width, they are as large as required; the encoding scheme is then a method 
to transform characters into a sequence of bytes. It shouldn't matter what 
encoding scheme is used - UTF-8, UTF-16, ISO-8859-9, ISO-2022-JP, Shift_JIS, 
EBCDIC, are all possibilities - because you're supposed to decode the data into 
characters before doing anything it.

The fact that you're able to take advantage of the foreknowledge of your data 
being encoded using UTF-8 is purely because XMPP happens to define it that way, 
not because XML is defined using any specific encoding scheme. Basing your 
entire implementation around the expectation of UTF-8 allows you to take some 
convenient short-cuts, but much of that only works because XML markup uses 
ASCII-compatible characters, which conveniently have an equivalent single-byte 
representation when encoded as UTF-8; if it were almost any other encoding then 
it simply wouldn't work without some form of decoding first. If you insist on 
not decoding and then run into difficulties with handling characters because 
you're purposely avoiding handling characters while simultaneously using XML 
which is defined as a sequence of characters, an appropriate response is "what 
did you expect?"

It's not trivial to handle everything as UTF-8 in implementations where the 
application receives already decoded strings (a sequence of characters, not 
bytes) from the XML parser. The most likely approach to dealing with that will 
be to re-encode the already decoded data back into UTF-8 just to deal with the 
offsets, which is precisely the kind of inefficient processing you're 
suggesting should be avoided. And considering the whole purpose of references 
is for marking sequences of characters, those characters are going to be 
decoded at some point; you're trying to avoid decoding early, while still 
validating offsets, so that the decoding can be done later anyway.

Regardless, your argument is still "bytes is more convenient for me, so 
everyone else should do what's best for me." I don't think that's a good 
argument.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] Proposed XMPP Extension: Character counting in message bodies

2020-12-09 Thread Tedd Sterr
Sam, your argument appears to be "I want to handle everything as bytes without 
doing any string decoding, so any other option would be more effort (less 
efficient) for me."

XML is defined as a sequence of characters, not bytes - those characters 
subsequently need to be transformed into bytes for the purpose of 
storage/transmission, and that's defined by the encoding scheme (UTF-8 in this 
case.) Bytes is convenient for you, but not for everyone else using a language 
that does the decoding upfront. The decoding _should_ be done upfront - that's 
how you get a valid XML document.

If you're trying to handle XML without first decoding from UTF-8 so you can 
save a few clock-cycles, that's cool, but you are going to run into awkward 
annoyances when it comes to trying to handle such alien concepts as characters. 
The reason you can mostly get away with not decoding is because the lower half 
of ASCII is represented the same way when using UTF-8, so you can pretend the 
XML tags are encoded as ASCII characters and just treat any Unicode strings as 
opaque binary blobs - but that is only a convenient hack. If everyone else is 
to go along with your convenient hack, that only means they will have to deal 
with their own awkward annoyances because they made the terrible decision to 
decode strings before handling them (as if that's what you're actually supposed 
to do.)

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2020-12-02

2020-12-05 Thread Tedd Sterr
https://logs.xmpp.org/council/2020-12-02?p=h#2020-12-02-a37594276c1a8a41

1) Roll Call
Present: Georg, Zash, Jonas, Daniel, Dave

2) Agenda Bashing
No.

3) Editor's Update
* New ProtoXEP: Automatic Trust Management
* Restart of two LCs which affect Council

4) Items for voting
Jonas checks whether Council members agree to the working agreement that voting 
periods shall end 14 days after the first meeting at which the agenda item is 
discussed, as the website appears to suggest otherwise [1] - Zash thinks it has 
worked well enough thus far; Georg objects that this wasn't on the agenda. 
Georg likes that 14 days gives two Council Meetings to catch up.

4a) PR #1014 (XEP-0176: Improve compatibility with WebRTC clients) - 
https://github.com/xsf/xeps/pull/1014
Daniel: [on-list] (not entirely sure about the implications)
Dave: [on-list] (need to find some WebRTC expertise)
Jonas: [on-list]
Georg: [on-list]
Zash: [on-list]

Zash thought it mostly looked editorial, with only the schema being changed - 
Jonas suggests asking the author, Link Mauve, to add some wording to the 
normative part to tie down the change - Link acknowledges.
Zash wonders if anyone with WebRTC expertise could be dragged into reviewing 
this - Dave is talking to Fippo; Georg thinks it would be great to have WebRTC 
folks' feedback on-list.

4b) PR #1008 (XEP-0047: fix incorrect max sequence number) - 
https://github.com/xsf/xeps/pull/1008
Zash: +1
Daniel: [on-list]
Jonas: +1 (think this is fair enough)
Dave: +1 (just fixing a typo in a parenthetical remark)
Georg: +1

4c) PR #1001 (XEP-0393: clarify rules for span directives) - 
https://github.com/xsf/xeps/pull/1001
Jonas blames Dave for this expiring last time - Dave remains appropriately 
silent.

Jonas: +0 (still)
Daniel: +1
Zash: +0 (again)
Georg: +1
Dave: [on-list] (don't recall this one at all; not sure I understand it)

Dave might have to write this out as ABNF in order to understand it - Jonas and 
Zash think that would be great, and then it could be added to the XEP.

4d) Proposed XMPP Extension: Automatic Trust Management - 
https://xmpp.org/extensions/inbox/automatic-trust-management.html
Jonas: [on-list]
Daniel: [on-list]
Georg: [on-list]
Zash: [on-list]
Dave: [on-list]

Georg bemoans the tradition of XEP authors redefining commonly-used acronyms 
('ATM' in this case.)
Dave thinks this looks somewhat familiar - Zash suggests Dave might be thinking 
of XEP-0434 (Trust Messages (TM)) which is the wire format, while this seems to 
be mostly policy.

5) Pending Votes
None so far, amazingly.

6) Date of Next
2020-12-09 1600 UTC

7) AOB
The current voting policy/system seems to have remained unchanged for years, so 
if it can be adequately codified then Dave will attempt to write it up in 
appropriately cryptic standards-speak and sneak it into XEP-0001; Jonas adds 
that much of it is already codified in the XSF Bylaws [2]. Dave will try to 
come up with some text for next week, but everyone should think about how to 
conduct voting.

8) Close
Thanks everyone.


[1] https://xmpp.org/about/xsf/council-policies-and-procedures
[2] https://xmpp.org/about/xsf/bylaws

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] Proposed XMPP Extension: Character counting in message bodies

2020-12-04 Thread Tedd Sterr

> FWIW I was a big proponent of doing it this way too, but I've changed my
> mind after seeing too many grapheme segmentation implementations be
> broken in small, different, ways. My new position is that we have to
> just count bytes and figure out a sane behavior in case someone sends us
> an invalid offset in the middle of a codepoint or something. This is
> encoding agnostic (not that it matters for XMPP) and makes it very easy
> to count: go to that byte offset, check if we're on any sort of UTF-8
> boundary, if so call it a day, if not do whatever the fallback is.

Codepoints are preferable: 
https://mail.jabber.org/pipermail/standards/2019-October/036589.html
If you're indexing by clusters then you're just asking for trouble.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] Off-by-one error in XEP-372 "References"

2020-12-04 Thread Tedd Sterr
"How to specify character ranges" is a problem that keeps appearing - can we 
resolve this once and for all, and then ensure we're consistent with that in 
all XEPs?

There are only three sensible options:

1. Start = first character (inclusive), end = last character (exclusive);
2. Start = first character (inclusive), end = last character (inclusive);
3. Start = Boundary before first character, end = boundary after last character.

Option 1 is what I presume most are familiar with as that's how indexing works 
in many programming languages, and option 2 makes some sense as you're pointing 
to the first and last characters to be included. The problem with the first two 
options is that it leads to this inclusive/exclusive confusion where the text 
seems to say one thing and the example says another.

Option 3 sidesteps that issue by indexing the positions between characters, 
rather than the characters themselves - so a character is either before or 
after a boundary, and is explicitly included or excluded from a range. 
Numerically, this is actually equivalent to option 1, but by describing it in 
this way, the confusion never arises.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2020-11-25

2020-11-27 Thread Tedd Sterr
https://logs.xmpp.org/council/2020-11-25?p=h#2020-11-25-802c09a26780f647

1) Welcome to our transition meeting
Members of the previous Council are present to ensure a smooth transition of 
responsibilities.
Previous Council: Daniel, Dave, Georg, Jonas, Zash
New Council: Jonas, Daniel, Zash, Dave, Georg

2) Election of Chair
Zash asks Jonas whether he wishes to continue his role as council furniture; 
Dave has already expressed a disinterest; nobody else volunteers.

2a) Confirm Jonas as Chair
Jonas: +1
Daniel: +1
Zash: +1
Dave: +1
Georg: +1

3) Meeting schedule
The duly elected Chair, Jonas, proposes meeting weekly on Wednesdays at 1600 
UTC (subject to DST adjustments) - there are no objections.

Date of Next: 2020-12-02 1600 UTC

4) AOB
Dave wonders whether Jonas will be acting as Board Liaison, which could be 
Chair or possibly delegated - Jonas is happy to bear this great responsibility.

Chair will instruct Editor to check for any votes needing to be restarted for 
collection into the agenda for the next meeting.

5) Close
Thanks everyone.

Georg is glad for the convenient re-use of the meeting time slot.

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2020-11-18

2020-11-21 Thread Tedd Sterr
https://logs.xmpp.org/council/2020-11-18?p=h#2020-11-18-b43c59f0d77acd68

1) Roll Call
Present: Daniel, Zash, Dave, Georg, Jonas

2) Agenda Bashing
None.

3) Editor's Update
* Editors have been very busy.

4a) Proposed XMPP Extension: File metadata element - 
https://xmpp.org/extensions/inbox/file-metadata.html
Dave thinks this already had some on-list discussion, others seem to have 
missed that; at least, Dave thought it looked familiar and so assumed he'd seen 
it before - Zash demands a reference to this clandestine discussion.
It appears to Georg that this is copying the 'file' element from XEP-0234 
(Jingle File Transfer) for the sake of copying the 'file' element from XEP-0234 
- wonders whether he's missing something - Jonas believes the idea is to 
separate it out for use in other XEPs, without necessarily being bound to the 
0234 namespace.

Dave: +1 (seems fine)
Daniel: +1
Jonas: +1 (have remarks, but will suggest those to authors on-list [1])
Zash: +1
Georg: +1 (given that 0234 is deferred, it's worth a try)

Zash isn't entirely convinced that another XEP really fixes anything - Georg 
doesn't disagree, but thinks that smaller, reusable elements in their own XEPs 
are a good idea - Zash doesn't disagree.
Georg questions what will happen if this is ever given the forbidden namespace 
bump - will clients have to send two 'file' elements with different namespaces? 
- Daniel doesn't think the idea is to make it resilient against bumps, but to 
better use it outside of Jingle; Georg assumes making it reusable will make it 
prone to bumping.

4b) Proposed XMPP Extension: Stateless file sharing - 
https://xmpp.org/extensions/inbox/sfs.html
Zash wonders whether this was made in preference to re-authoring SIMS 
(XEP-0385). Dave thinks this is basically SIMs but based around the file 
metadata instead. Georg suggests allowing Marvin, the author, to co-author SIMS 
and make the fixes in there - Dave also considered this. Daniel questions 
whether there has been a clear consensus on the need for such a re-factor of 
SIMS, as SIMS might still be useful for other things - Dave is unsure; Jonas 
questions whether such a consensus is needed before accepting this as 
Experimental. Zash suggests throwing SIMS and SFS into the arena and letting 
them fight to earn their place upon the throne of OOB.
Georg imagines a post-apocalyptic future where clients send multiple different 
'file-attached' elements for compatibility reasons, even though each client 
supports the same set of mechanisms; Dave is impressed by the optimism of 
expecting that any two clients will ever have any file-transfer mechanisms in 
common.
Daniel expects that, with the body fallback, it should be relatively safe to 
drop OOB at some point; Dave hates body fallback [nobody mention XEP-0428.] 
Zash suggests everything will be okay with Fallback Indication (XEP-0428), 
though it is lacking a fallback for itself.

Daniel: +1
Zash: +1
Jonas: +1
Dave: +1 (don't object)
Georg: [on-list]

4c) Proposed XMPP Extension: Encryption for stateless file sharing - 
https://xmpp.org/extensions/inbox/esfs.html
Dave thinks this has issues, but nothing insurmountable, so publish then fix 
(hopefully).
Georg likes the extensive Security Considerations.

Jonas: +1 (feedback on-list [2])
Daniel: +1
Zash: +1
Dave: +1 (unclear if every cipher suite will have/need separate key and IV)
Georg: [on-list]

4d) Proposed XMPP Extension: Stickers - 
https://xmpp.org/extensions/inbox/stickers.html
Jonas thinks the hash calculation looks very reminiscent of XEP-0390 (Entity 
Capabilities 2.0); suggests the author, Marvin, might consider replacing ASCII 
separators (invalid in XML 1.0, but valid in 1.1) with NUL (invalid in both) - 
Marvin would rather enforce that name, desc, and summary should be displayable 
to end-users and not include ASCII separators - Jonas thinks doing both would 
be provide low-cost additional resilience.
Dave admits to possibly being too old to understand what a 'sticker' is - Georg 
suggests "something like a large custom emoji" - Dave asks why they hunt in 
packs.
Daniel wonders whether stickers might be better suited to SIMS rather than 
file-sharing (unsure how stickers work/are used).

Georg: [on-list] (need to think about the technical implications and copyright 
violation issues)
Jonas: [on-list]
Dave: [on-list]
Daniel: +1
Zash: +1

5) Pending Votes
Dave votes +0 on "Advance XEP-0443 (XMPP Compliance Suites 2021)".
Georg votes +1 on "PR #1001 (XEP-0393: clarify rules for span directives)"; 
everyone else is slacking.

Jonas pushes everyone to cast remaining votes on the list.

6) Date of Next
To be decided by the incoming Council.

7) AOB
Georg suggests advancing XEP-0423 (XMPP Compliance Suites 2020) to Final, as 
it's now officially over a year old; hopes it might yield useful input for 
CS-2021 - Jonas is unsure how a CFE would work across council terms.
Zash considers asking Board to add a special Compliance Suite Thing into 
XEP-0001.


[Standards] Council Minutes 2020-11-11

2020-11-16 Thread Tedd Sterr
https://logs.xmpp.org/council/2020-11-11?p=h#2020-11-11-5233da80fee8a079

1) Roll Call
Present: Jonas, Zash, Daniel, Georg
Apologies: Dave

2) Agenda Bashing
None.

3) Editor's Update
* Nothing out of the ordinary.

4) Items for voting
Jonas notes that, as this is the penultimate meeting of this Council, any votes 
started now will run the risk of expiring with the end of the term.

4a) Advance XEP-0443 (XMPP Compliance Suites 2021) - 
https://xmpp.org/extensions/xep-0443.html
Daniel questions whether the feedback was addressed - Jonas notes there was an 
update yesterday [1].
Daniel: +1
Jonas: +1
Zash: +1
Georg: +1
Dave: [pending]

Zash feels there could have been more feedback, though there isn't such a great 
difference from the previous Suites which was obviously accepted. Jonas is glad 
it didn't turn into a huge war of semantics and pedantry this time.

4b) PR #1001 (XEP-0393: clarify rules for span directives) - 
https://github.com/xsf/xeps/pull/1001
See [2] for relevant war of semantics and pedantry discussion.
Jonas: [on-list] (didn't look into it yet)
Daniel: [on-list]
Georg: [on-list]
Zash: [on-list]
Dave: [pending]

Jonas begs for everyone not to let this one expire.

5) Pending Votes
One each for Daniel and Dave on Pre-Authenticated In-Band Registration 
(expiring next week.)

6) Date of Next
2020-11-18 1600 UTC

Jonas may forget about the meeting while repenting next Wednesday, which is a 
public holiday in parts of Germany, but will try hard not to.

7) AOB
Zash wishes everyone good luck in the elections.
Jonas reminds everyone to cast their votes, and thanks Alex for his efforts in 
organising it all.

8) Close
Thanks everyone, Tedd, Alex, and all.


[1] https://gitlab.com/xsf/xeps/-/merge_requests/35/
[2] https://mail.jabber.org/pipermail/standards/2020-November/037859.html

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


[Standards] Council Minutes 2020-11-04

2020-11-10 Thread Tedd Sterr
https://logs.xmpp.org/council/2020-11-04?p=h#2020-11-04-51d2be3786d1879f

1) Roll Call
Present: Jonas, Dave, Daniel, Zash, Georg

2) Agenda Bashing
Georg wanted to add his XEP-0401 (Easy User Onboarding) changes, but they don't 
depend on Council.

3) Editor's Update
* LC ended: XEP-0443 (XMPP Compliance Suites 2021)

4a) MR !29 (XEP-0045: specify use of  in subject message) - 
https://gitlab.com/xsf/xeps/-/merge_requests/29
Jonas: +1
Zash: +1
Dave: +1
Daniel: +1
Georg: +1

4b) Proposed XMPP Extension: Pre-Authenticated In-Band Registration - 
https://xmpp.org/extensions/inbox/ibr-token.html
Georg: +1
Daniel: [on-list]
Jonas: [on-list]
Zash: [on-list]
Dave: [on-list]

The author, Georg, thanks Dave for his review [1] - Dave still needs to think 
about this, given Sam's comments [2]; Georg think's Sam made a very generic 
point that applies to the whole pre-authenticated phase.

4c) Advance XEP-0443 (XMPP Compliance Suites 2021) - 
https://xmpp.org/extensions/xep-0443.html
The author, Georg, notes there was some feedback; Jonas thinks there were 
comments which should be addressed in some way.
The Editor apologises for the automation weirdness that happened with the extra 
announcement email which appeared yesterday.
Jonas doesn't think it makes sense to vote on this until the feedback has been 
addressed; Georg will endeavour to satisfy all interested parties - would also 
like to see even more feedback, e.g. are there any XEPs missing or to be 
removed.

5) Date of Next
2020-11-11 1600 UTC

Dave may or may not make it, in between transporting his vintage beer bottle 
collection between homes.

6a) AOB i: Election Season
Jonas notes there are more applications now [3], which is nice.

6b) AOB ii: Compliance Suite 2021
Georg thanks Daniel very much for his A/V additions, and the LC feedback; is 
looking for specific feedback regarding further XEPs to be added, any to be 
moved from non-normative to normative, and any that might be removed.
MDosch has suggested adding XEP-0425 (Message Moderation) - Georg thinks that 
it might be a good addition for Advanced IM, though it's still Experimental; 
Daniel thinks there's a lack of experience with that, not only because it makes 
use of Fastening - Zash suggests adding it under Future Development.
Georg kindly asks Council to review and consider the XEPs touched in the last 
year for inclusion - Zash requests such a list - Editors will oblige.

6c) AOB iii: XEP-0401 and ibr-token
Zash queries the intended relation between these two and XEP-0379 
(Pre-Authenticated Roster Subscription) - Georg explains that 0379 is the 
roster-adding part, ibr-token is the account-creation part, and 0401 connects 
it all together.
Zash notes there is a conflicting overlap with 0401 - Georg had a slight 
disagreement with 0401's author about its direction, and isn't yet confident 
how to resolve that; Jonas notes MR !33 [4] - Georg adds that this removes 
everything IBR related from 0401.
Zash may have stated before, but would very much like all of this moved into 
IBR2 in The Future™ (once SASL2, IBR2, etc2 are in shape) - Georg says this is 
the intended goal: they will be referenced in 0401 once it's ready; but, until 
then, the status quo is documented in ibr-token and referenced from 0401.

7) Close
Thanks all and everyone.


[1] https://mail.jabber.org/pipermail/standards/2020-November/037846.html
[2] https://mail.jabber.org/pipermail/standards/2020-November/037852.html
[3] https://wiki.xmpp.org/web/Board_and_Council_Elections_2020
[4] https://gitlab.com/xsf/xeps/-/merge_requests/33

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] Need sanity check on an example in XEP-0393: Message Styling

2020-11-09 Thread Tedd Sterr
I'm afraid this might still be a little ambiguous.

"Matches of spans between two styling directives MUST contain some text between 
the two styling directives, otherwise neither directive is valid."
So where does this leave "**text*" as an example?
If 'neither directive is valid' does that mean the second asterisk wouldn't be 
a valid open simply because it wasn't a valid close when paired with the first?

Should the implication be that "neither directive is valid when considering 
this sequence as a span," while still allowing the possibility of the second 
being an open for another span?

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


Re: [Standards] Need sanity check on an example in XEP-0393: Message Styling

2020-11-07 Thread Tedd Sterr
I'd actually be tempted just to change it to explicitly format sequential runs 
of the same directive, and remove the intervening text requirement - i.e. 
{***}, which is how I'd expect it to appear as a user.
It clears everything up nicely, and apparently no implementations have taken 
notice of that anyway.




After a long and productive conversation with Ted, I think I have a
better understanding of this situation and the answer is that it's just
underspecified and there are multiple valid interpretations of "***" and
"" depending on how you build your parser (though I would still very
much love to get other opinions).

This is not likely to matter in the real world, but it's also not ideal.
I've written implementations that work both ways, so I wanted to see
what existing implementations do, and have come up with the following
list (things in square parens are bold, each set of asterisks was sent
as a separate message):

Conversations: ** [***] 
Dino: [**] [***] []
Gajim (not technically message styling): nothing bold
Yaxim: Nothing bold
Converse.js: Nothing bold
Spark: Unsure (does not make styling directives bold at all, just the 
enclosed text)

Interestingly, Converse.js and Dino both do things incorrectly
(regardless of which rules you follow) if you actually send "** ***
" on one line and appear to be able to wind up with unmatched (but
highlighted) directives.

Unfortunately this means that either way I clarify it I'd break some
existing application. I'd be curious if others think one way is better
than another. Luckily this isn't the kind of thing that's likely to be a
problem or confusing in the real world for real users.

—Sam

___
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
___


  1   2   3   4   >