Re: [Standards] XMPP OAuth2 login at Google

2015-04-20 Thread Anu Pokharel
That’s a relief.  I noticed you did this in the newer Adium betas and was 
wondering what was going on. I guess it’s on my radar to complete on Monal now 
as well. The gradual movement away from standard XMPP in gtalk is depressing.

-Anu


 On Apr 20, 2015, at 10:01 AM, Thijs Alkemade th...@xnyhps.nl wrote:
 
 
 On 20 apr. 2015, at 10:15, Thijs Alkemade th...@xnyhps.nl wrote:
 
 [Reviving a very old thread]
 
 It looks like today is going to be the day Google shuts down ClientLogin [1],
 and with that, SASL PLAIN [2]. This might be the final nail in the coffin of
 XMPP support for Google Talk, as I fear few clients have implemented 
 X-OAUTH2.
 
 We have an update in beta for Adium, but working on that while knowing Google
 could shut down the XMPP interface any day was not very motivating.
 
 Thijs
 
 [1] = https://developers.google.com/identity/protocols/AuthForInstalledApps
 [2] = 
 http://googledevelopers.blogspot.com/2012/09/adding-oauth-20-support-for-imapsmtp.html
 
 False alarm, apparently, in last February they made a new post [1] stating:
 
 We’ve taken steps to provide alternatives to password authentication in other
 protocols as well. CalDAV API V2 only supports OAuth 2.0, and we’ve added
 OAuth 2.0 support to IMAP, SMTP, and XMPP. While a deprecation timeline for
 password authentication in these protocols hasn’t been announced yet,
 developers are strongly encouraged to move to OAuth 2.0.”
 
 Thijs
 
 [1] = 
 http://googledevelopers.blogspot.com/2015/02/reminder-clientlogin-shutdown-scheduled.html



signature.asc
Description: Message signed with OpenPGP using GPGMail


[Standards] Proposed XMPP Extension: Push

2015-03-25 Thread Anu Pokharel
Hi all, 
I make an XMPP app on iOS called Monal. Much of my comments are based on my 
experiences developing  an XMPP client on iOS  for the past 6 years. My 
concerns may be Apple specific in some places but since the intent of the XEP 
is for a very general implementation,  these issues should be considered.  
Apologies for resurrecting this discussion. 

The proposed XEP  does not seem to address token expiration. On Apple platforms 
(and likely others) the push token will change periodically.  This information 
is provided on a feedback channel to the App server but there is no way for it 
to communicate this to the XMPP server. There is really no way for the client 
to know it’s token has expired so It will not know to request a new one from 
the push service and the messages will just be lost.  In addition even if the 
client were to somehow know, there doesn't seem to be a way for the client to 
refresh its token with the XMPP server. 

It may also be nice if the client could define what events it cared about. Most 
mobile clients are  probably not going to care much about anything other than 
ping and message stanzas when operating in the background.  There would be 
significant battery life improvements if a client could take advantage of 
XEP-0198 (with a very long expiration) to close the socket unless a message or 
ping arrived.  While  XEP-0198 is probably beyond the scope of this document, 
it’s probably how I and others will try to use push, so it may warrant 
mentioning. 


Thanks, 

-Anu