On Jul 27, 2009, at 3:19 AM, Pedro Melo wrote:

Hi,

On 2009/07/23, at 23:29, XMPP Extensions Editor wrote:

Version 0.4 of XEP-0258 (Security Labels in XMPP) has been released.

Abstract: This document describes the use of security labels in XMPP. The document specifies how security label metadata is carried in XMPP, when this metadata should or should not be provided, and how the metadata is to be processed.

Changelog: Update label catalogs to include user input selector. (kdz)

Diff: 
http://svn.xmpp.org:18080/browse/XMPP/trunk/extensions/xep-0258.xml?r1=2911&r2=3336

URL: http://xmpp.org/extensions/xep-0258.html

Section 3:

"The <label/> and <equivalentlabel/> elements each require a type= attribute."

The examples lack the `type` attribute though.


This text needs some updating. The <label/> and <equivalentlabel/> elements can contain a single element whose name/namespace indicates the type of the label (as in the examples). I remove the text about the type= attribute.




Section 4:

the definition of the <label> in the catalog shows something like this: <label>"|"]*<label>

That's the ABNF description of a selector attribute value syntax. (Looks kind of like XML, but isn't.) I'll clarify in the text.


It doesn't seem right nor consistent with the text that follows. Maybe there was an escaping problem?


In example 8, the 'to' attribute is misplaced, should be in the top level <iq> stanza. Also present in example 9, maybe it should be a from there?

No. The client is requesting its server return the catalog for example.com. Moving the to= to the <iq> stanza would imply the client is requesting example.com return its catalog.

One thing that's not clear in the XEP is the expectation that clients are to generally ask their server for catalogs (even of remote jids). This is done for a couple of reasons. One, it allows their local server to translate the remote catalog into the local policy. Second, it allows the local server to filter the remote catalog based upon the requestor's clearance (the remote server is unlikely to know what clearance the remote (to them) has). I'll try to add some text here.




Section 5:

"Otherwise, the clearance input is the nil clearance. The nil clearance is a clearance for which the ACDF always returns Deny when given as the clearance input"

Isn't this mandating policy trough a XEP?

No.  The policy can define default clearances/labels.

Shouldn't this be left to each particular installation? I could decide to allow 'nil' clearance if the current message label is unclassified or missing.

That would be done through defining defaults in the policy.

This text answers the question of what should an implementation do if the policy does not specify defaults.

The same situation in the next paragraph: "The nil label is a label for which the ACDF always returns Deny when given as the label input".

Best regards,

Reply via email to