Re: [Standards] XEP-0047 (IBB streams) and acknowledgment

2008-06-13 Thread Fabio Forno
On Wed, Jun 11, 2008 at 7:54 PM, Justin Karneges
[EMAIL PROTECTED] wrote:

 My plan has always been to use XEP-198 for this.  If your server wants you to
 back off, it'll just not ack back to you over the c2s (or s2s) link.
 Similarly, a mobile client that is dying would just not ack back to the
 server.  This way you can do flow control per-hop rather than end-to-end.

Sorry fo the delay. Yep, agree xep-198 solves the saturation problem
of the I/O buffers of clients, which, I think, is most painful for
usability. Imho xep-47 should recommend acks with a SHOULD.

It just remains open the case when the receiving server has more
restrictive policies about IBB than the sending one or the receiving
client is too slow, forcing to buffer a large number of packets.

-- 
Fabio Forno, Ph.D.
Bluendo srl http://www.bluendo.com
jabber id: [EMAIL PROTECTED]


Re: [Standards] XEP-0047 (IBB streams) and acknowledgment

2008-06-13 Thread Fabio Forno
On Wed, Jun 11, 2008 at 5:24 PM, Peter Saint-Andre [EMAIL PROTECTED] wrote:

 I don't know if existing clients and servers are that smart, but it

They will be if people discover that IBB is so good in passing through
firewalls.

-- 
Fabio Forno, Ph.D.
Bluendo srl http://www.bluendo.com
jabber id: [EMAIL PROTECTED]


Re: [Standards] Proposed XMPP Extension: XMPP Transport Layer Security

2008-06-13 Thread Peter Saint-Andre
On 06/09/2008 11:09 AM, Peter Saint-Andre wrote:
 On 06/09/2008 9:50 AM, Dave Cridland wrote:

 However, I got talking to Rob McQueen - there's a certain amount of
 sense in, instead of describing this in terms of IBB, describing it in
 terms of Jingle.

 It's possible - and reasonable - to consider an XMPP stream as content,
 in which case the TLS becomes a transport (or possibly attribute of the
 transport).
 
 Part of the idea behind XTLS is that you might want to use the XTLS
 tunnel for all e2e communications with another party. In particular,
 you might want to use that tunnel so that you don't expose your IP
 addresses during a Jingle negotiation (e.g., if you did XTLS over
 ICE-TCP or SOCKS5). So forcing XTLS to depend on Jingle might defeat the
 purpose. What transport would be used if we described XTLS in terms of
 Jingle, and might you expose personally identifying information in that way?

I just had a chat with Justin Karneges about XTLS. I'm now convinced
that it's best to follow the approach outlined above -- use Jingle to
negotiate an e2e stream that is transported via a reliable transport
mechanism such as SOCKS5 Bytestreams, IBB, reliable UDP, or whatever
else people come up with. I am currently revising the proposal along
those lines and will post to the list when I'm finished with the edits.

Peter

-- 
Peter Saint-Andre
https://stpeter.im/



smime.p7s
Description: S/MIME Cryptographic Signature


Re: [Standards] Proposed XMPP Extension: XMPP Transport Layer Security

2008-06-13 Thread Dirk Meyer
Peter Saint-Andre wrote:
 1. We modify XEP-0174 so it just defines _presence._tcp as a discovery
 mechanism, as a result of which you have an IP address and port that you
 can use for a direct TCP connection that functions as a transport for an
 e2e XML stream.

 2. We split the e2e XML streams stuff out from XEP-0174 into a new
 e2e-streams spec, which defines how you use whatever reliable
 transport is close to hand (direct TCP connection, IBB, SOCKS5, ice-tcp,
 etc.) as the transport for an e2e XML stream (this can be unencrypted as
 all XEP-0174 implementations do now, or upgraded to encrypted using
 STARTTLS, which is what we'd recommend -- but this way it is
 backwards-compatible and enables code reuse).

It should get a note about clientCert requests.

 3. The current XTLS spec morphs into a new Jingle-xmpp spec that
 defines a Jingle application type for an XMPP session (as defined in
 XEP-streams), where that application type can use IBB, SOCKS5, ice-tcp,
 or any other reliable transport.

Sounds ok to me. Funny thing is that XTLS gets closer again to my
first idea (except that I did not used jingle). If you need some help
writing 2. or 3. give me a call. I will be away for the weekend but
could help you out on sunday evening (which will be the whole sunday
in your timezone).


Dirk

P.S.: Too bad I implemented the current XTLS today for testing

-- 
[X] -- nail here for new monitor



Re: [Standards] Proposed XMPP Extension: XMPP Transport Layer Security

2008-06-13 Thread Peter Saint-Andre
On 06/13/2008 3:12 PM, Dirk Meyer wrote:
 Peter Saint-Andre wrote:
 1. We modify XEP-0174 so it just defines _presence._tcp as a discovery
 mechanism, as a result of which you have an IP address and port that you
 can use for a direct TCP connection that functions as a transport for an
 e2e XML stream.

 2. We split the e2e XML streams stuff out from XEP-0174 into a new
 e2e-streams spec, which defines how you use whatever reliable
 transport is close to hand (direct TCP connection, IBB, SOCKS5, ice-tcp,
 etc.) as the transport for an e2e XML stream (this can be unencrypted as
 all XEP-0174 implementations do now, or upgraded to encrypted using
 STARTTLS, which is what we'd recommend -- but this way it is
 backwards-compatible and enables code reuse).
 
 It should get a note about clientCert requests.

Correct.

 3. The current XTLS spec morphs into a new Jingle-xmpp spec that
 defines a Jingle application type for an XMPP session (as defined in
 XEP-streams), where that application type can use IBB, SOCKS5, ice-tcp,
 or any other reliable transport.
 
 Sounds ok to me. Funny thing is that XTLS gets closer again to my
 first idea (except that I did not used jingle). If you need some help
 writing 2. or 3. give me a call. I will be away for the weekend but
 could help you out on sunday evening (which will be the whole sunday
 in your timezone).

I hope to finish the work today, but we'll see if I'm successful...

 P.S.: Too bad I implemented the current XTLS today for testing

Ouch. You are too fast. :(

If we can get this spec'd out soon, perhaps we'll even be able to hold a
bit of an interop event + hackfest at the XMPP Summit July 21 and 22:

http://www.xmpp.org/summit/summit5.shtml

Peter

-- 
Peter Saint-Andre
https://stpeter.im/



smime.p7s
Description: S/MIME Cryptographic Signature


Re: [Standards] Proposed XMPP Extension: XMPP Transport Layer Security

2008-06-13 Thread Peter Saint-Andre
On 06/13/2008 3:33 PM, Peter Saint-Andre wrote:
 On 06/13/2008 3:12 PM, Dirk Meyer wrote:
 Peter Saint-Andre wrote:
 1. We modify XEP-0174 so it just defines _presence._tcp as a discovery
 mechanism, as a result of which you have an IP address and port that you
 can use for a direct TCP connection that functions as a transport for an
 e2e XML stream.

 2. We split the e2e XML streams stuff out from XEP-0174 into a new
 e2e-streams spec, which defines how you use whatever reliable
 transport is close to hand (direct TCP connection, IBB, SOCKS5, ice-tcp,
 etc.) as the transport for an e2e XML stream (this can be unencrypted as
 all XEP-0174 implementations do now, or upgraded to encrypted using
 STARTTLS, which is what we'd recommend -- but this way it is
 backwards-compatible and enables code reuse).
 It should get a note about clientCert requests.
 
 Correct.
 
 3. The current XTLS spec morphs into a new Jingle-xmpp spec that
 defines a Jingle application type for an XMPP session (as defined in
 XEP-streams), where that application type can use IBB, SOCKS5, ice-tcp,
 or any other reliable transport.
 Sounds ok to me. Funny thing is that XTLS gets closer again to my
 first idea (except that I did not used jingle). If you need some help
 writing 2. or 3. give me a call. I will be away for the weekend but
 could help you out on sunday evening (which will be the whole sunday
 in your timezone).
 
 I hope to finish the work today, but we'll see if I'm successful...

Here is an early version of the Jingle-streams spec:

http://www.xmpp.org/extensions/inbox/jingle-streams.html

Next I'll copy the e2e-streams stuff from XEP-0174 into a new spec.

Peter

-- 
Peter Saint-Andre
https://stpeter.im/



smime.p7s
Description: S/MIME Cryptographic Signature


Re: [Standards] Proposed XMPP Extension: XMPP Transport Layer Security

2008-06-13 Thread Peter Saint-Andre
On 06/13/2008 3:45 PM, Peter Saint-Andre wrote:

 Here is an early version of the Jingle-streams spec:
 
 http://www.xmpp.org/extensions/inbox/jingle-streams.html
 
 Next I'll copy the e2e-streams stuff from XEP-0174 into a new spec.

http://www.xmpp.org/extensions/inbox/e2e-streams.html

Peter

-- 
Peter Saint-Andre
https://stpeter.im/



smime.p7s
Description: S/MIME Cryptographic Signature