On Wed Sep 15 21:47:30 2010, XMPP Extensions Editor wrote:
The XMPP Extensions Editor has received a proposal for a new XEP.

Title: Spim Markers and Reports

Abstract: This document defines an XMPP protocol extension that enables XMPP entities to interact with spim filters by marking unsolicited or suspicious XMPP stanzas.

URL: http://www.xmpp.org/extensions/inbox/spim.html

This looks basically sound.

A couple of minor niggles:

1) The <mark/> element's text would be more usefully enclosed within a <comment/> element or some such, since that makes it substantially easier to extend later.

2) I'd rather that the <query/> element in the complaint reporting protocol was actually a <report/> element containing <mark/> element, and otherwise mirrored the elements used by filters precisely. This allows simplistic reporting as well as more complex cases, such as reporting a false positive, if the filter allows it.

3) It's not entirely clear to me how multiple filters would work, but I assume that they are all trusted by the home server. In this instance, a server supporting spin-marker should be able to strip all spim-marker elements on input over S2S. Also, it seems generally likely to me that you'd want to push a report to a uniform set of filters.

My gut feel - and I may be way off the mark - is that filtering really ought to be largely a black box to clients that exposes a (form based?) configuration interface.

This means that to the client, there is typically one filtering entity - the server. If there is an additional one (such as a border-guard), then the server - if it's aware - will have to be configured to know about it - any other markings will need to be stripped. It seems sensible that the server would use the external spim filter as input data to its own, however, and then simply strip out the old markings.

Then any message can be reported as spim or not - in general, anyway - to just the server, which would fan-out reports to filters.

So in practise, I think the deployment patterns for this would end up very close to the deployment patterns for XEP-0258, and I think it's worthwhile optimizing the protocol for that. Furthermore, I think this reduces or eliminates most of the security concerns. (Which, BTW, are very well thought through).

Dave.
--
Dave Cridland - mailto:[email protected] - xmpp:[email protected]
 - acap://acap.dave.cridland.net/byowner/user/dwd/bookmarks/
 - http://dave.cridland.net/
Infotrope Polymer - ACAP, IMAP, ESMTP, and Lemonade

Reply via email to