Re: [Standards] eventlogging xeps

2013-12-11 Thread Teemu Väisänen
Yes, it is better now.

-Teemu

2013/12/10 Peter Waher peter.wa...@clayster.com:
 Hello Teemu

 Thanks for the feedback. The description in §7.3.2 was perhaps a bit 
 minimalistic. I extended it as follows:

 Event messages could be published using Publish-Subscribe. Unless there's 
 absolute control of who can subscribe to the information published in this 
 manner, the information should be considered open and freely available. In 
 such cases extra care should be taken to not publish information of a 
 sensitive nature, or information that can be mined for information, behavior 
 patterns, trends, etc., that can be viewed as being of a sensitive nature. If 
 there's a risk that either absolute control cannot be achieved and 
 information is of a sensitive nature, this pattern should be avoided.

 Ok?

 Best regards,
 Peter Waher


 -Original Message-
 From: Teemu Väisänen [mailto:uol...@gmail.com]
 Sent: den 10 december 2013 14:37
 To: XMPP Standards; Peter Waher
 Subject: Re: [Standards] eventlogging xeps

 Hi Peter.

 Section 7.3.2 Publish/Subscribe describes: Event messages could be published 
 using Publish-Subscribe. But, even more care should be taken to log only 
 information that can be published openly. If there's risk for sensitive 
 information to be logged, the publish/subscribe pattern should be avoided.

 If information is sensitive, the information should not be logged, as said in 
 7.2. Do you mean that if sensitive information is still sent using pubsub, 
 there are more actors (pubsub server, subscribers) that might log and/or leak 
 the sensitive information and because of that the pubsub pattern should be 
 avoided?

 Would it be wise to move the second line But, even more care should be taken 
 to log only information that can be published openly., e.g., to section 7.2. 
 because it relates also to other cases than pubsub?

 Could the last sentence be something more like: If there's risk for 
 sensitive information to be logged, the publish/subscribe pattern should be 
 avoided in systems that contain any not trusted or any uncontrolled actors. 
 That is because we could have a setup where we have a trusted pubsub server 
 and we log (also) sensitive information in several trusted 
 subscribers/loggers.

 BR, Teemu

 -
 No virus found in this message.
 Checked by AVG - www.avg.com
 Version: 2014.0.4259 / Virus Database: 3658/6904 - Release Date: 12/09/13


Re: [Standards] eventlogging xeps

2013-12-10 Thread Teemu Väisänen
Hi Peter.

Section 7.3.2 Publish/Subscribe describes: Event messages could be
published using Publish-Subscribe. But, even more care should be taken
to log only information that can be published openly. If there's risk
for sensitive information to be logged, the publish/subscribe pattern
should be avoided.

If information is sensitive, the information should not be logged, as
said in 7.2. Do you mean that if sensitive information is still sent
using pubsub, there are more actors (pubsub server, subscribers) that
might log and/or leak the sensitive information and because of that
the pubsub pattern should be avoided?

Would it be wise to move the second line But, even more care should
be taken to log only information that can be published openly., e.g.,
to section 7.2. because it relates also to other cases than pubsub?

Could the last sentence be something more like: If there's risk for
sensitive information to be logged, the publish/subscribe pattern
should be avoided in systems that contain any not trusted or any
uncontrolled actors. That is because we could have a setup where we
have a trusted pubsub server and we log (also) sensitive information
in several trusted subscribers/loggers.

BR, Teemu


Re: [Standards] eventlogging xeps

2013-12-10 Thread Peter Waher
Hello Teemu

Thanks for the feedback. The description in §7.3.2 was perhaps a bit 
minimalistic. I extended it as follows:

Event messages could be published using Publish-Subscribe. Unless there's 
absolute control of who can subscribe to the information published in this 
manner, the information should be considered open and freely available. In such 
cases extra care should be taken to not publish information of a sensitive 
nature, or information that can be mined for information, behavior patterns, 
trends, etc., that can be viewed as being of a sensitive nature. If there's a 
risk that either absolute control cannot be achieved and information is of a 
sensitive nature, this pattern should be avoided.

Ok?

Best regards,
Peter Waher


-Original Message-
From: Teemu Väisänen [mailto:uol...@gmail.com] 
Sent: den 10 december 2013 14:37
To: XMPP Standards; Peter Waher
Subject: Re: [Standards] eventlogging xeps

Hi Peter.

Section 7.3.2 Publish/Subscribe describes: Event messages could be published 
using Publish-Subscribe. But, even more care should be taken to log only 
information that can be published openly. If there's risk for sensitive 
information to be logged, the publish/subscribe pattern should be avoided.

If information is sensitive, the information should not be logged, as said in 
7.2. Do you mean that if sensitive information is still sent using pubsub, 
there are more actors (pubsub server, subscribers) that might log and/or leak 
the sensitive information and because of that the pubsub pattern should be 
avoided?

Would it be wise to move the second line But, even more care should be taken 
to log only information that can be published openly., e.g., to section 7.2. 
because it relates also to other cases than pubsub?

Could the last sentence be something more like: If there's risk for sensitive 
information to be logged, the publish/subscribe pattern should be avoided in 
systems that contain any not trusted or any uncontrolled actors. That is 
because we could have a setup where we have a trusted pubsub server and we log 
(also) sensitive information in several trusted subscribers/loggers.

BR, Teemu

-
No virus found in this message.
Checked by AVG - www.avg.com
Version: 2014.0.4259 / Virus Database: 3658/6904 - Release Date: 12/09/13


Re: [Standards] eventlogging xeps

2013-12-09 Thread Waqas Hussain
On Mon, Dec 2, 2013 at 9:58 AM, Peter Waher peter.wa...@clayster.com wrote:
 Hello Philipp

 Thanks for your input. I've updated the according to your comments, and 
 attach a new version.

 Best regards,
 Peter Waher


Hey Peter,

Something which I don't think has been discussed: Encoding. I'm
assuming syslog-to-xmpp bridging is something you wish to enable.
Syslog does recommend UTF-8, but doesn't require it. Data can be
non-UTF-8. Also, syslog messages can be truncated by bytes, which can
lead to invalid UTF-8 at the end of a message (the spec specifically
points this out). And lastly, syslog messages may contain a
byte-order-mark (BOM) at the start of messages to specify encoding.
Also, XML supports a subset of UTF-8, not all UTF-8 characters are
allowed.

What we probably want is some form of escaping to be specified in the
spec. Perhaps as simple as: replace \ with \\ and replace any invalid
XML bytes with \XX, XX being the byte in hex. BOMs should be removed
if available, and data should be converted to UTF-8 if possible.

One thing which looks awkward to me are the 'type' attributes in the
'tag' element. What's a use-case where specifying the data-type would
help the receiver (particularly when this would generally be the same
in every log message sent by the entity)? And while you are using
'xs:*', the 'xs' namespace isn't defined in the XML stream the stanza
is in.

--
Waqas Hussain


Re: [Standards] eventlogging xeps

2013-12-05 Thread Lance Stout
Hi Peter,

This is looking really good!

Minor things I noticed:

- The timestamp attribute. We’ve been using ‘stamp’ as the name for that type 
of attribute.
- The type and level attribute values are currently title cased, but I 
personally prefer lowercase values since that is what is commonly used.

It looks like those were made to match directly with syslog?



There are several places where strict element ordering is mandated. Any 
particular reason why? 


-Lance


signature.asc
Description: Message signed with OpenPGP using GPGMail