Re: Discontinuing XMPP support after IETF 115

Brian E Carpenter <brian.e.carpenter@gmail.com> Thu, 08 September 2022 20:35 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C7C34C152587 for <ietf@ietfa.amsl.com>; Thu, 8 Sep 2022 13:35:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.106
X-Spam-Level:
X-Spam-Status: No, score=-7.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oOIiD0g4zS1d for <ietf@ietfa.amsl.com>; Thu, 8 Sep 2022 13:35:36 -0700 (PDT)
Received: from mail-pl1-x633.google.com (mail-pl1-x633.google.com [IPv6:2607:f8b0:4864:20::633]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 87DE1C1522BA for <ietf@ietf.org>; Thu, 8 Sep 2022 13:35:36 -0700 (PDT)
Received: by mail-pl1-x633.google.com with SMTP id f24so19082305plr.1 for <ietf@ietf.org>; Thu, 08 Sep 2022 13:35:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date; bh=+0q5VAy/wmp345LLxHDOS0ssAc02YWblubAeQIIqD5M=; b=JAo4Y5yt3FS96As8GiIO7Qxtn2K+/c9GW8wpGVvyO/44VPC9IEBdZke90mff9bx5QT SKcftOYfEV+sO9h2dcwUY08kHsoEytsC68c7/uuQ+3CtxXREnofaKUvmZrSzlfaNjYiJ TQnt/MK4Eam9cEPqjnq1z2sFBHHZHRLQxJkpS0ugruM8A3e3G4KkoVEGVoKpF16NE7zK fwTHMN6ciwXzDYrekRmsPCswsuSVbu+LSfUDXTXyi/tULNCxm5q/8mhdpJJh64LCLvOp bhmwSK4z43lFq5QXbIOEzzjGkyyGMGXdSA1VCn2nmM3Rr7k8D/Vhnl8YK25yAIzz1wBn RklA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date; bh=+0q5VAy/wmp345LLxHDOS0ssAc02YWblubAeQIIqD5M=; b=JelbLyH9JVpvC7LCqoK+7RmcxIOLYvYIKV/MQUH0aQEWK4uyXKOe8eWBkoScHkL/gK sBu41ggeRTj3YjJlm74HWZMnvzdzIEkjNQGx5hsmlCwXTGihvoyzp16zYhVgY1vRSVr1 mCeGSTTv18kam2SjenGSBtzM5uKQGdzQRO9M0b6IsTvNSox2tCM/TD6+eOHk/Mqmrz0C 918QoJpJzRJgtdhcxu87u4LSQJqLCx9ZH/AgtMIY+7fYx9TaO65RXcB2XEq5zsCeAH2L GA0Y5rFmM/ISL4HA8rDYOnkdT8yB9ke18mJ2shOveD71pBV1I5Sn/KVqB1y1Tz5OkvQz TuAQ==
X-Gm-Message-State: ACgBeo3gH9bdp7tiYCzWLjvSSpcdGR21ugztOPPwhJjZJzz+43Da2+RW r/BbG3Ayqkv0hiT9iA/bv2PEY3utBS5IHQ==
X-Google-Smtp-Source: AA6agR6se0JsG0l2VTf0Vevvrp5yRRlytvG0GeLyZvlQFwnW8ZLPekmFsinPeCb76p/JU44LUp9Chw==
X-Received: by 2002:a17:90b:180b:b0:1fd:d537:dd30 with SMTP id lw11-20020a17090b180b00b001fdd537dd30mr5975903pjb.75.1662669335742; Thu, 08 Sep 2022 13:35:35 -0700 (PDT)
Received: from ?IPV6:2406:e003:1124:9301:80b2:5c79:2266:e431? ([2406:e003:1124:9301:80b2:5c79:2266:e431]) by smtp.gmail.com with ESMTPSA id w187-20020a6230c4000000b00537f16e25d3sm29441pfw.75.2022.09.08.13.35.33 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 08 Sep 2022 13:35:34 -0700 (PDT)
Message-ID: <ede8ceea-5034-f66c-817c-1911ca36ca59@gmail.com>
Date: Fri, 09 Sep 2022 08:35:30 +1200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.10.0
Subject: Re: Discontinuing XMPP support after IETF 115
Content-Language: en-US
To: Phillip Hallam-Baker <phill@hallambaker.com>
Cc: ietf@ietf.org
References: <c3e928df-c2b3-cd68-bfd4-b4098121d95c@nostrum.com> <6.2.5.6.2.20220907123712.126524f0@elandnews.com> <8827514d-61a8-02e5-638f-68b9a3b43f1b@gmail.com> <CAMm+Lwj1rcuxtyQOPW7DX6N8uMWbpiBWDVHoTn+eDrgdQsnLYA@mail.gmail.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
In-Reply-To: <CAMm+Lwj1rcuxtyQOPW7DX6N8uMWbpiBWDVHoTn+eDrgdQsnLYA@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/PlB91ryI2bBSNLOScMUmWkMZH38>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IETF-Discussion. This is the most general IETF mailing list, intended for discussion of technical, procedural, operational, and other topics for which no dedicated mailing lists exist." <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Sep 2022 20:35:38 -0000

On 09-Sep-22 04:08, Phillip Hallam-Baker wrote:
> 
> 
> On Wed, Sep 7, 2022 at 6:13 PM Brian E Carpenter
> <brian.e.carpenter@gmail.com <mailto:brian.e.carpenter@gmail.com>>
> wrote:
> 
> On 08-Sep-22 08:00, S Moonesamy wrote:
>> Hello, At 10:06 AM 07-09-2022, Robert Sparks wrote:
>>> After a series of trials used to gather feedback from the
>>> community, the IETF has switched from Jabber to Zulip as its chat
>>> service.
>> 
>> I assumed that XMPP was in wide use in the IETF community and
>> still in use on the internet.  I gather that is not the case given
>> that RFC 6120 is following a path similar to RFC 959 [1].  It is
>> high time to consider what to do with "standards" which no longer
>> have community support.
> 
> Why? A Proposed Standard can sit on the books and does no harm.
> Sometimes, it turns out that there is a whole user community for such
> a standard that we don't know about, for some version of "we".
> 
> 
> That is not really true. A proposed standard can and often does
> prevent others trying to address a problem.

IMHO that's a minority case, but when it happens, it can be dealt with by formally obsoleting the problematic document or feature. Anecdotal evidence: I've done it. Several times in fact: RFC3879, RFC4048, RFC6563, RFC7526.

So if XMPP was actively harmful, we could obsolete it. But I don't think that's the case.

    Brian

> 
> Before DPRIV, I proposed a DNS client-resolver protocol that
> leveraged a TLS key exchange to secure a UDP based replacement
> protocol. Two years later DPRIV was started and at the first meeting
> we were told that this problem is so very very urgent, there is no
> time to consider any proposals except for running DNS client
> interactions over TLS because it 'had to be done in a year'.
> 
> Having seized the floor, sharp elbows stopped anyone from proposing a
> practical approach to the problem until QUIC came along and the
> absurdity of claiming Fast TCP start, a solution requiring a kernel
> change would solve the performance problem became to much. So now,
> eight years after I made my original proposal for DNS client-resolver
> over UDP, there is finally an RFC but of course, much of the
> deployment momentum has been dissipated.
> 
> We has the same problem today with DANE and security policy. Again
> against my advice, DANE adopted an approach that is technically
> defective. If you want to deploy security policy you have to consider
> the whole process of service discovery. That means considering the
> SRV and TXT records FIRST, not treating them as an afterthought. In
> other words, start with RFC 6763 and work from there. That is the
> approach I adopt in the Mesh.
> 
> draft-hallambaker-web-service-discovery-06 (ietf.org)
> <https://datatracker.ietf.org/doc/html/draft-hallambaker-web-service-discovery-06>
>
>  I have a security policy system that works and is not tied to one
> transport protocol. But I am pretty sure that I would face demands to
> recast it in DANE terms because that is the 'proposed standard' even
> though it is dead on its feet for everything but SMTP STARTTLS.
> 
> 
> Recognizing that standards have failed or failed to thrive can be a
> very valuable and positive contribution to the community because
> recognizing failure clears the stage for possible success.
>