Extensible Messaging and Presence Protocol (XMPP): Core
draft-ietf-xmpp-core-24
Revision differences
Document history
| Date | Rev. | By | Action |
|---|---|---|---|
|
2012-08-22
|
24 | (System) | post-migration administrative database adjustment to the No Objection position for Allison Mankin |
|
2012-08-22
|
24 | (System) | post-migration administrative database adjustment to the No Objection position for Steven Bellovin |
|
2012-08-22
|
24 | (System) | post-migration administrative database adjustment to the No Objection position for Russ Housley |
|
2004-05-12
|
24 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
|
2004-05-11
|
24 | Amy Vezza | IESG state changed to Approved-announcement sent |
|
2004-05-11
|
24 | Amy Vezza | IESG has approved the document |
|
2004-05-11
|
24 | Amy Vezza | Closed "Approve" ballot |
|
2004-05-11
|
24 | Scott Hollenbeck | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Scott Hollenbeck |
|
2004-05-11
|
24 | Allison Mankin | [Ballot comment] This is my comment from December: Note that this draft has xmpp-im-20 appended to it within the same file. My noob is just … [Ballot comment] This is my comment from December: Note that this draft has xmpp-im-20 appended to it within the same file. My noob is just to xmpp-core. A comment related to -23 Because -22 won't be archived, I think it would be a good idea for the diffs of 22 to 23 to be posted to the mailing list rather than placed on an ephemeral website. There should be a longer term record of the WG process for these changes at this point in the document. A comment on -24 I had a Discuss due to text added during RFC processing which appeared to allow server implementations of change normative handling of stanzas if they were different applications. It was stated this was for conformance testing, even of -im, but not clear to me what in -im was non-compliant with -core. The WG removed the added text and I cleared my Discuss. |
|
2004-05-11
|
24 | Allison Mankin | [Ballot Position Update] Position for Allison Mankin has been changed to No Objection from Discuss by Allison Mankin |
|
2004-05-10
|
24 | (System) | New version available: draft-ietf-xmpp-core-24.txt |
|
2004-04-30
|
24 | (System) | Removed from agenda for telechat - 2004-04-29 |
|
2004-04-29
|
24 | Allison Mankin | [Ballot discuss] I spent quite a while reviewing this document, because it would have been better if the revisions made in AUTH48 were just clarifications, … [Ballot discuss] I spent quite a while reviewing this document, because it would have been better if the revisions made in AUTH48 were just clarifications, or small conflicts that the Working Group could arbitrate. I found that to be the case with the changes proposed for draft-ietf-xmpp-im. But one of the changes in -core-23 is not just a cleanup or clarification, but a problem that would affect implementation, new text which I think needs to be removed again: Here's the diff that I block this document on, text added at the beginning of Section 10, Server Rules for Handling XML Stanzas. 22: ... The following rules apply: 23: ... The following rules apply to a "mere" XMPP server, but MAY be further specified or overridden by a particular class of application servers (e.g., an instant messaging and presence server as defined in [XMPP-IM]): Section 10 specifies many SHOULDs and MUSTs. The text as written for revision -23 gives a free rein to changing the rules and the normative levels. Giving the benefit of the doubt, this is by future specification, but not only by the specifications, but also by implementations of particular classes of servers (again, as written). Even for the specification case, there's a concern, because the normative rules in Section 10 include a number that were part of a discussion of my original Discuss on Server handling of XML stanzas related to IM interoperability. I don't see changes in the XMPP-IM specification that override these rules, so perhaps this text is about allowing -IM server implementations leeway to ignore SHOULDs. Anyway, this is not appropriate standards text. If a future spec needs to modify a rule from CORE, it can state: "This rule changes CORE as follows for x reason." Core should not contain an open door like this. So, bottom line: remove the new text. |
|
2004-04-29
|
24 | Scott Hollenbeck | [Ballot Position Update] New position, Yes, has been recorded for Scott Hollenbeck by Scott Hollenbeck |
|
2004-04-29
|
24 | Allison Mankin | [Ballot comment] This is my comment from December: Note that this draft has xmpp-im-20 appended to it within the same file. My noob is just … [Ballot comment] This is my comment from December: Note that this draft has xmpp-im-20 appended to it within the same file. My noob is just to xmpp-core. A comment related to -23 Because -22 won't be archived, I think it would be a good idea for the diffs of 22 to 23 to be posted to the mailing list rather than placed on an ephemeral website. There should be a longer term record of the WG process for these changes at this point in the document. |
|
2004-04-29
|
24 | Allison Mankin | [Ballot discuss] I spent quite a while reviewing this document, because it would have been better if the revisions made in AUTH48 were just clarifications, … [Ballot discuss] I spent quite a while reviewing this document, because it would have been better if the revisions made in AUTH48 were just clarifications, or small conflicts that the Working Group could arbitrate. I found that to be the case with the changes proposed for draft-ietf-xmpp-im. But one of the changes in -core-23 is not just a cleanup or clarification, but a problem that would affect implementation, new text which I think needs to be removed again: Here's the diff that I block this document on, text added at the beginning of Section 10, Server Rules for Handling XML Stanzas. 22: ... The following rules apply: 23: ... The following rules apply to a "mere" XMPP server, but MAY be further specified or overridden by a particular class of application servers (e.g., an instant messaging and presence server as defined in [XMPP-IM]): Section 10 specifies many SHOULDs and MUSTs. The text as written for revision -23 gives a free rein to changing the rules and the normative levels. Giving the benefit of the doubt, this is by future specification, but not only by the specifications, but also by implementations of particular classes of servers (again, as written). Even for the specification case, there's a concern, because the normative rules in Section 10 include a number that were part of a discussion of my original Discuss on Server handling of XML stanzas related to IM interoperability. I don't see changes in the XMPP-IM specification that override these rules, so perhaps this text is about allowing -IM server implementations leeway to ignore SHOULDs. Anyway, this is not appropriate standards text. If a future spec needs to modify a rule from CORE, it can state: "This rule changes CORE as follows for x reason." Core should not contain an open door like this. |
|
2004-04-27
|
24 | Allison Mankin | [Ballot discuss] This is a Discuss for the revisions of the document following IESG approval (from version 22 to version 23) - the diffs were … [Ballot discuss] This is a Discuss for the revisions of the document following IESG approval (from version 22 to version 23) - the diffs were placed on a website rather than archived on the xmpp mailing list. I think they should probably be archived. [More coming...my systems are down] |
|
2004-04-27
|
24 | Allison Mankin | [Ballot Position Update] Position for Allison Mankin has been changed to Discuss from No Objection by Allison Mankin |
|
2004-04-15
|
24 | David Kessens | [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens |
|
2004-04-15
|
24 | David Kessens | Created "Approve" ballot |
|
2004-04-15
|
24 | Scott Hollenbeck | Placed on agenda for telechat - 2004-04-29 by Scott Hollenbeck |
|
2004-04-15
|
24 | Scott Hollenbeck | State Changes to IESG Evaluation::AD Followup from RFC Ed Queue by Scott Hollenbeck |
|
2004-04-15
|
24 | Scott Hollenbeck | State Change Notice email list have been change to presnick@qualcomm.com,lisa@xythos.com,stpeter@jabber.org from , |
|
2004-04-15
|
24 | Scott Hollenbeck | Shepherding AD has been changed to Scott Hollenbeck from Ted Hardie |
|
2004-04-13
|
23 | (System) | New version available: draft-ietf-xmpp-core-23.txt |
|
2004-01-30
|
24 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
|
2004-01-29
|
24 | Amy Vezza | IESG state changed to Approved-announcement sent |
|
2004-01-29
|
24 | Amy Vezza | IESG has approved the document |
|
2004-01-29
|
24 | Amy Vezza | Closed "Approve" ballot |
|
2004-01-29
|
24 | Amy Vezza | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza |
|
2004-01-22
|
24 | Steven Bellovin | [Ballot Position Update] Position for Steve Bellovin has been changed to No Objection from Discuss by Steve Bellovin |
|
2004-01-21
|
22 | (System) | New version available: draft-ietf-xmpp-core-22.txt |
|
2004-01-08
|
24 | Amy Vezza | Removed from agenda for telechat - 2004-01-08 by Amy Vezza |
|
2004-01-08
|
24 | Amy Vezza | State Changes to IESG Evaluation::AD Followup from IESG Evaluation - Defer by Amy Vezza |
|
2004-01-08
|
24 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley |
|
2004-01-08
|
24 | Steven Bellovin | [Ballot discuss] 4.2.1: The new text says to do a numerical comparison on version numbers. Is that correct, to treat the numbers as decimals, so … [Ballot discuss] 4.2.1: The new text says to do a numerical comparison on version numbers. Is that correct, to treat the numbers as decimals, so that 4.11 is older than 4.2? I have no problem with that choice, but it's different enough from common usage that some clarification is needed, for either choice. 6.2: The relationship between SASL and TLS "names" and JIDs is not clear, and needs to be spelled out explicitly. For example, how is a JID represented in a client-side certificate? You note that the user-typed domain name is what needs to be verified in the TLS certificate; in precisely what field? What about SASL user names? Are resources part of the authentication name? |
|
2004-01-08
|
24 | Ned Freed | [Ballot comment] These are both generally excellent specifications; clear, easy to follow, and the unusually large number of examples it contains makes it easy to … [Ballot comment] These are both generally excellent specifications; clear, easy to follow, and the unusually large number of examples it contains makes it easy to see how things are supposed to work. That said, I have a number of comments: The diagrams in sections 2.1, 4.1, 8.2, etc. aren't correctly aligned in the HTML version; they are fine in the text version. (I guess this doesn't matter since the RFC Editor only deals in the text version but I thought I'd mention it.) The term "TCP sockect" used in sections 2.3, 2.5, 4.1 and probably elsewhere seems unnecessarily UNIX-y; how about "TCP connection" instead? (I looked at a bunch of other RFCs and the general trend seems to be to use the term "TCP socket" when talking about network socket APIs.) Section 4.2 requires that ids be nonrepeating and unpredictable. Perhaps an informative reference to RFC 1750 would be appropriate? Section 4.6.2: It might be worthwhile to mention that the xml:lang element could be used to select an appropriate language for clauses in s. Section 5.3 and 5.4: "Step 5: Server informs client to proceed:" -> "Step 5: Server informs client that it is OK to proceed:" This document makes frequent use of the capitalized term "NOT REQUIRED". This is not one of the terms RFC 2119 defines. I believe these are equivalent to MAY or OPTIONAL and the text should be modified accordingly. Alternately, a sentence saying how "NOT REQUIRED" is to be interpreted could be added to section 1.2. |
|
2004-01-08
|
24 | Ned Freed | [Ballot Position Update] New position, Yes, has been recorded for Ned Freed by Ned Freed |
|
2004-01-08
|
24 | Allison Mankin | [Ballot comment] Note that this draft has xmpp-im-20 appended to it within the same file. My noob is just to xmpp-core. |
|
2004-01-08
|
24 | Allison Mankin | [Ballot Position Update] New position, No Objection, has been recorded for Allison Mankin by Allison Mankin |
|
2004-01-07
|
21 | (System) | New version available: draft-ietf-xmpp-core-21.txt |
|
2004-01-06
|
(System) | Posted related IPR disclosure: Jabber, Inc. and Jabber Software Foundation's Joint Statement About IPR Claimed in Specifications Produced by the XMPP WG | |
|
2003-12-18
|
24 | Harald Alvestrand | [Ballot Position Update] New position, No Objection, has been recorded for by Harald Alvestrand |
|
2003-12-18
|
24 | Bill Fenner | [Ballot Position Update] New position, No Objection, has been recorded for by Bill Fenner |
|
2003-12-18
|
24 | Ned Freed | State Changes to IESG Evaluation - Defer from IESG Evaluation by Ned Freed |
|
2003-12-18
|
24 | Thomas Narten | [Ballot Position Update] New position, No Objection, has been recorded for by Thomas Narten |
|
2003-12-18
|
24 | Steven Bellovin | [Ballot discuss] Even though I'm voting DISCUSS for now, I want to note that this spec was a pleasure to read -- it's much cleaner … [Ballot discuss] Even though I'm voting DISCUSS for now, I want to note that this spec was a pleasure to read -- it's much cleaner and clearer that most, even to someone with little knowledge of the area. Most of these are nits, except for the ones marked with an asterisk. 1.4: This is not quite compliant with our usual practice. See 3.6 of draft-ietf-ipr-submission-rights-08.txt (which has been approved by the IESG) for details on trademarks. In "Definition of XML Stanza" section: unbalanced close parenthesis *4.2.1: The semantics of version processing, except for exact match, are poorly (and probably inappropriately) defined. Ssee Section 2.5 of draft-ietf-ipsec-ikev2-11.txt for a detailed description of version number processing; in particular, note the difference between major and minor version number. This is an important thing to get right, for future-proofing. 4.7 (and elsewhere): use example.com for domain names 5.3: In the TLS negotiations, is any white space allowed after the token? *6.2: The relationship between SASL and TLS "names" and JIDs is not clear, and needs to be spelled out explicitly. For example, how is a JID represented in a client-side certificate? You note that the user-typed domain name is what needs to be verified in the TLS certificate; in precisely what field? What about SASL user names? Are resources part of the authentication name? *8.3: The Stream ID used here is security-sensitive, and the required properties -- that it be unpredictable and non-repeating -- should be stated explicitly. 9.3: "not unrecoverable" is hard to parse... 9.3.2: -- says /&gr; |
|
2003-12-18
|
24 | Bert Wijnen | [Ballot Position Update] Position for Bert Wijnen has been changed to No Objection from Undefined by Bert Wijnen |
|
2003-12-18
|
24 | Bert Wijnen | [Ballot comment] I think that the reference to RFC2279 should be replaced with ref to RFC 3629 |
|
2003-12-18
|
24 | Bert Wijnen | [Ballot Position Update] New position, Undefined, has been recorded for by Bert Wijnen |
|
2003-12-18
|
24 | Alex Zinin | [Ballot Position Update] New position, No Objection, has been recorded for by Alex Zinin |
|
2003-12-17
|
24 | Margaret Cullen | [Ballot Position Update] New position, No Objection, has been recorded for by Margaret Wasserman |
|
2003-12-17
|
24 | Russ Housley | [Ballot discuss] In section 14.1, 2nd paragraph, the text says: "Entities that communicate with the service SHOULD be configured with the Root CA … [Ballot discuss] In section 14.1, 2nd paragraph, the text says: "Entities that communicate with the service SHOULD be configured with the Root CA certificate rather than the service certificate; this avoids problems associated with simple comparison of service certificates." The practice that is being discouraged is simple, straightforward, and potentially more secure. Further justification for the additional level of indirection is needed. In section 14.1, 2nd paragraph, the text says: "If a self-signed service certificate is used, an entity SHOULD NOT trust it if it is changed to another self-signed certificate or a certificate signed by an unrecognized authority." I do not understand this sentence. The digital signature on a certificate prevents it from being undetectably changed. |
|
2003-12-17
|
24 | Russ Housley | [Ballot comment] Section 1.3 should be deleted prior to publication. In section 5.1, the 7th numbered item is an introductory statement for the … [Ballot comment] Section 1.3 should be deleted prior to publication. In section 5.1, the 7th numbered item is an introductory statement for the two cases listed in the 8th numbered item. They should all be one numbered item. In section 5.3, Step 7 (alt), the text talks about 'Sever2'. Yet, the scenario involves on client and one server. In section 9.2.3, the 2nd numbered item is an introductory statement for the cases listed in the 3rd numbered item. They should all be one numbered item. An informative reference to RFC 3280 is desirable. It will help someone trying to deal with certification path validation for TLS. |
|
2003-12-17
|
24 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded for by Russ Housley |
|
2003-12-16
|
24 | Jon Peterson | [Ballot Position Update] New position, Abstain, has been recorded for by Jon Peterson |
|
2003-12-15
|
24 | Steven Bellovin | [Ballot discuss] Even though I'm voting DISCUSS for now, I want to note that this spec was a pleasure to read -- it's much cleaner … [Ballot discuss] Even though I'm voting DISCUSS for now, I want to note that this spec was a pleasure to read -- it's much cleaner and clearer that most, even to someone with little knowledge of the area. Most of these are nits, except for the ones marked with an asterisk. 1.4: This is not quite compliant with our usual practice. See 3.6 of draft-ietf-ipr-submission-rights-08.txt (which has been approved by the IESG) for details on trademarks. In "Definition of XML Stanza" section: unbalanced close parenthesis *4.2.1: The semantics of version processing, except for exact match, are poorly (and probably inappropriately) defined. Ssee Section 2.5 of draft-ietf-ipsec-ikev2-11.txt for a detailed description of version number processing; in particular, note the difference between major and minor version number. This is an important thing to get right, for future-proofing. 4.7 (and elsewhere): use example.com for domain names 5.3: In the TLS negotiations, is any white space allowed after the token? *6.2: The relationship between SASL and TLS "names" and JIDs is not clear, and needs to be spelled out explicitly. For example, how is a JID represented in a client-side certificate? You note that the user-typed domain name is what needs to be verified in the TLS certificate; in precisely what field? What about SASL user names? Are resources part of the authentication name? *8.3: I'm a bit puzzled by the challenge key semantics. As I understand it, the Receiving server is the suspicious party, or it wouldn't be dialing back. But what we see is the Originating serve supplying a key that the authoritative server will verify. Shouldn't that be the other way around? That is, shouldn't the receiving server send a challenge to the originating server, and expect to see it coming back from the authoritative server? Or is this not a security mechanism? (If it is, and TLS isn't used, there's an attack. A malicious originating server sees a key coming from a real originating server for some domain; it steals that key, and sends it to the receiving server. The authoritative server is happy, because it's expecting to see that key.) Note also that for security purposes, some function of the challenge is generally used, rather than simply repeating the challenge. 9.3: "not unrecoverable" is hard to parse... 9.3.2: 9.3.2 -- says /&gr; |
|
2003-12-15
|
24 | Steven Bellovin | [Ballot discuss] Even though I'm voting DISCUSS for now, I want to note that this spec was a pleasure to read -- it's much cleaner … [Ballot discuss] Even though I'm voting DISCUSS for now, I want to note that this spec was a pleasure to read -- it's much cleaner and clearer that most, even to someone with little knowledge of the area. Most of these are nits, except for the ones marked with an asterisk. 1.4: This is not quite compliant with our usual practice. See 3.6 of draft-ietf-ipr-submission-rights-08.txt (which has been approved by the IESG) for details on trademarks. In "Definition of XML Stanza" section: unbalanced close parenthesis *4.2.1: The semantics of version processing, except for exact match, are poorly (and probably inappropriately) defined. Ssee Section 2.5 of draft-ietf-ipsec-ikev2-11.txt for a detailed description of version number processing; in particular, note the difference between major and minor version number. This is an important thing to get right, for future-proofing. 4.7 (and elsewhere): use example.com for domain names 5.3: In the TLS negotiations, is any white space allowed after the token? *6.2: The relationship between SASL and TLS "names" and JIDs is not clear, and needs to be spelled out explicitly. For example, how is a JID represented in a client-side certificate? You note that the user-typed domain name is what needs to be verified in the TLS certificate; in precisely what field? What about SASL user names? Are resources part of the authentication name? *8.3: I'm a bit puzzled by the challenge key semantics. As I understand it, the Receiving server is the suspicious party, or it wouldn't be dialing back. But what we see is the Originating serve supplying a key that the authoritative server will verify. Shouldn't that be the other way around? That is, shouldn't the receiving server send a challenge to the originating server, and expect to see it coming back from the authoritative server? Or is this not a security mechanism? (If it is, and TLS isn't used, there's an attack. A malicious originating server sees a key coming from a real originating server for some domain; it steals that key, and sends it to the receiving server. The authoritative server is happy, because it's expecting to see that key.) Note also that for security purposes, some function of the challenge is generally used, rather than simply repeating the challenge. 9.3: "not unrecoverable" is hard to parse... 9.3.2: 9.3.2 -- says /^gr; |
|
2003-12-15
|
24 | Steven Bellovin | [Ballot Position Update] New position, Discuss, has been recorded for by Steve Bellovin |
|
2003-12-10
|
24 | Ted Hardie | Placed on agenda for telechat - 2003-12-18 by Ted Hardie |
|
2003-12-10
|
24 | Ted Hardie | State Changes to IESG Evaluation from Waiting for Writeup by Ted Hardie |
|
2003-12-10
|
24 | Ted Hardie | [Ballot Position Update] New position, Yes, has been recorded for Ted Hardie |
|
2003-12-10
|
24 | Ted Hardie | Ballot has been issued by Ted Hardie |
|
2003-12-10
|
24 | Ted Hardie | Created "Approve" ballot |
|
2003-11-21
|
20 | (System) | New version available: draft-ietf-xmpp-core-20.txt |
|
2003-10-27
|
19 | (System) | New version available: draft-ietf-xmpp-core-19.txt |
|
2003-10-09
|
24 | (System) | State has been changed to Waiting for Writeup from In Last Call by system |
|
2003-09-25
|
24 | Michael Lee | Last call sent |
|
2003-09-25
|
24 | Michael Lee | State Changes to In Last Call from Last Call Requested by Michael Lee |
|
2003-09-23
|
24 | Ted Hardie | Intended Status has been changed to Proposed Standard from None |
|
2003-09-23
|
24 | Ted Hardie | State Changes to Last Call Requested from Publication Requested by Ted Hardie |
|
2003-09-23
|
24 | Ted Hardie | Last Call was requested by Ted Hardie |
|
2003-09-23
|
24 | (System) | Ballot writeup text was added |
|
2003-09-23
|
24 | (System) | Last call text was added |
|
2003-09-23
|
24 | (System) | Ballot approval text was added |
|
2003-09-08
|
18 | (System) | New version available: draft-ietf-xmpp-core-18.txt |
|
2003-08-25
|
17 | (System) | New version available: draft-ietf-xmpp-core-17.txt |
|
2003-08-22
|
24 | Ted Hardie | State Changes to Publication Requested from AD is watching by Ted Hardie |
|
2003-07-29
|
16 | (System) | New version available: draft-ietf-xmpp-core-16.txt |
|
2003-07-02
|
15 | (System) | New version available: draft-ietf-xmpp-core-15.txt |
|
2003-06-26
|
14 | (System) | New version available: draft-ietf-xmpp-core-14.txt |
|
2003-06-05
|
13 | (System) | New version available: draft-ietf-xmpp-core-13.txt |
|
2003-05-06
|
12 | (System) | New version available: draft-ietf-xmpp-core-12.txt |
|
2003-04-28
|
11 | (System) | New version available: draft-ietf-xmpp-core-11.txt |
|
2003-04-22
|
10 | (System) | New version available: draft-ietf-xmpp-core-10.txt |
|
2003-04-18
|
09 | (System) | New version available: draft-ietf-xmpp-core-09.txt |
|
2003-04-08
|
08 | (System) | New version available: draft-ietf-xmpp-core-08.txt |
|
2003-04-03
|
07 | (System) | New version available: draft-ietf-xmpp-core-07.txt |
|
2003-03-27
|
06 | (System) | New version available: draft-ietf-xmpp-core-06.txt |
|
2003-03-17
|
24 | Ted Hardie | Draft Added by Hardie, Ted |
|
2003-03-06
|
05 | (System) | New version available: draft-ietf-xmpp-core-05.txt |
|
2003-03-03
|
04 | (System) | New version available: draft-ietf-xmpp-core-04.txt |
|
2003-02-24
|
03 | (System) | New version available: draft-ietf-xmpp-core-03.txt |
|
2003-02-03
|
02 | (System) | New version available: draft-ietf-xmpp-core-02.txt |
|
2003-01-20
|
01 | (System) | New version available: draft-ietf-xmpp-core-01.txt |
|
2002-12-09
|
00 | (System) | New version available: draft-ietf-xmpp-core-00.txt |