Re: Discontinuing XMPP support after IETF 115

Phillip Hallam-Baker <phill@hallambaker.com> Thu, 08 September 2022 16:09 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47FA7C15338A for <ietf@ietfa.amsl.com>; Thu, 8 Sep 2022 09:09:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.405
X-Spam-Level:
X-Spam-Status: No, score=-1.405 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.248, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xjptBaeYfG3b for <ietf@ietfa.amsl.com>; Thu, 8 Sep 2022 09:09:08 -0700 (PDT)
Received: from mail-oa1-f46.google.com (mail-oa1-f46.google.com [209.85.160.46]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9E068C1533A4 for <ietf@ietf.org>; Thu, 8 Sep 2022 09:08:57 -0700 (PDT)
Received: by mail-oa1-f46.google.com with SMTP id 586e51a60fabf-12ab0eaa366so6198592fac.13 for <ietf@ietf.org>; Thu, 08 Sep 2022 09:08:57 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=buLwlxNHcN0WxNX89PhGvudKF5g5d5R6FNs6yuqp8Ho=; b=nG5aTmpmfmzijBXi8tdpLyC+72r5H697OSHt1uetgPKsD8iyvmSwP3+2RxR+Gb9ghp YnPZv+8L7tJJ+hrCJBsV3dbkpE5q6GlkOKZYpLMo9R/BL/6NU5uWeAruu61gqNi9+LRs sWAek/IcsDrKjWhjMJWR35pa3/PAl5iqhT0YXAg4eKlGuJ2RIcOMflT47cNN+X8jnrXq DyqMdcZSOg3VhT6X5dmyTXLXQ0VeFSYU1FgL/6T41bqmz0558CAL9UpKPIKvf/d1kvbK MYhKbMuUdA/OxlfLqq8ucqSmY1q1NDNrL2eFcTJXsaxbBuBMI9maWw2n/kXVg5wuLVw+ +kXg==
X-Gm-Message-State: ACgBeo12c12lVUywVruz1g99SbYd6n8B08LnjbuuruzbQyaMP+Xgl4VA 2BACxHgygiuug72hnnV3vtvAZuKsW1Uvg4LsbVuhKYSgU1M=
X-Google-Smtp-Source: AA6agR5de62+WG3Atow7s3u3c/uIfr5LJTNOeJduWkww+ftuyzjqtvu4umMi943lyVQgZA1lWhI80Qi6/t9hMd4+DVs=
X-Received: by 2002:a05:6870:9590:b0:de:27ca:c60c with SMTP id k16-20020a056870959000b000de27cac60cmr2346896oao.108.1662653336718; Thu, 08 Sep 2022 09:08:56 -0700 (PDT)
MIME-Version: 1.0
References: <c3e928df-c2b3-cd68-bfd4-b4098121d95c@nostrum.com> <6.2.5.6.2.20220907123712.126524f0@elandnews.com> <8827514d-61a8-02e5-638f-68b9a3b43f1b@gmail.com>
In-Reply-To: <8827514d-61a8-02e5-638f-68b9a3b43f1b@gmail.com>
From: Phillip Hallam-Baker <phill@hallambaker.com>
Date: Thu, 08 Sep 2022 12:08:44 -0400
Message-ID: <CAMm+Lwj1rcuxtyQOPW7DX6N8uMWbpiBWDVHoTn+eDrgdQsnLYA@mail.gmail.com>
Subject: Re: Discontinuing XMPP support after IETF 115
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Cc: ietf@ietf.org
Content-Type: multipart/alternative; boundary="0000000000008513bc05e82ca5ff"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/-u6LQxaS6_69zsupk6qeL8hy5sU>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IETF-Discussion. This is the most general IETF mailing list, intended for discussion of technical, procedural, operational, and other topics for which no dedicated mailing lists exist." <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Sep 2022 16:09:09 -0000

On Wed, Sep 7, 2022 at 6:13 PM Brian E Carpenter <
brian.e.carpenter@gmail.com> wrote:

> On 08-Sep-22 08:00, S Moonesamy wrote:
> > Hello,
> > At 10:06 AM 07-09-2022, Robert Sparks wrote:
> >> After a series of trials used to gather feedback from the community,
> >> the IETF has switched from Jabber to Zulip as its chat service.
> >
> > I assumed that XMPP was in wide use in the IETF community and still
> > in use on the internet.  I gather that is not the case given that RFC
> > 6120 is following a path similar to RFC 959 [1].  It is high time to
> > consider what to do with "standards" which no longer have community
> support.
>
> Why? A Proposed Standard can sit on the books and does no harm. Sometimes,
> it turns out that there is a whole user community for such a standard
> that we don't know about, for some version of "we".
>

That is not really true. A proposed standard can and often does prevent
others trying to address a problem.

Before DPRIV, I proposed a DNS client-resolver protocol that leveraged a
TLS key exchange to secure a UDP based replacement protocol. Two years
later DPRIV was started and at the first meeting we were told that this
problem is so very very urgent, there is no time to consider any proposals
except for running DNS client interactions over TLS because it 'had to be
done in a year'.

Having seized the floor, sharp elbows stopped anyone from proposing a
practical approach to the problem until QUIC came along and the absurdity
of claiming Fast TCP start, a solution requiring a kernel change would
solve the performance problem became to much. So now, eight years after I
made my original proposal for DNS client-resolver over UDP, there is
finally an RFC but of course, much of the deployment momentum has been
dissipated.

We has the same problem today with DANE and security policy. Again against
my advice, DANE adopted an approach that is technically defective. If you
want to deploy security policy you have to consider the whole process of
service discovery. That means considering the SRV and TXT records FIRST,
not treating them as an afterthought. In other words, start with RFC 6763
and work from there. That is the approach I adopt in the Mesh.

draft-hallambaker-web-service-discovery-06 (ietf.org)
<https://datatracker.ietf.org/doc/html/draft-hallambaker-web-service-discovery-06>

I have a security policy system that works and is not tied to one transport
protocol. But I am pretty sure that I would face demands to recast it in
DANE terms because that is the 'proposed standard' even though it is dead
on its feet for everything but SMTP STARTTLS.


Recognizing that standards have failed or failed to thrive can be a very
valuable and positive contribution to the community because recognizing
failure clears the stage for possible success.