#ben_thatmustbemeHaving a standard is good, eme makes sense in empowering competitors to Netflix for example. I do believe that's a good thing. But timbl just pissed on the while idea of rough consensus being a core principle of w3c. The statement was made that the proponents of eme were unwilling to compromise so he approved it.... Which now sets precedent for everyone to be extremely stubborn because you can eventually just get whatever you want
#cwebberI suggested it because I think it'll reduce your trouble down the road.
#cwebber(I suggested it as an option as opposed to saying "you have to do this" because you really don't have to... I just think it'll be less painful if you do :))
#Gargron" Okay, but what is better? If a different platform wants to implement emojis, but not "fortune cookies", wouldn't it be better if they only needed to include emoji-specific context, rather than the "general mastodon" context?"
#cwebberGargron: I think you're conflating contexts and vocabularies
#cwebberit's a confusing thing so I don't blame you, especially since you can often retrieve a json-ld context from the vocabulary URL
#cwebberGargron: vocabulary namespace is "where the terms go" as in terms of "this specific uri really means this one specific thing". so "http://joinmastodon.org/ns/#Emoji" in this example would mean Emoji as a specific *concept*
#cwebberwhereas you can have multiple contexts map to the same term
#csarvencwebber is that concept URI actually in use or only an example?
#csarvenGargon, if you take the ns approach, I suggest defining the terms you'd like to use at a neutral-enough location, and keep it public for input. Off the top of my head, https://w3id.org/ might work for your needs.
#csarvenThat's a persistent URI which might be more inviting for others to be more likely to use and interop with.
#csarvenUsing mastodon in the domain is in some ways signals that it is mastodon specific. That is of course fine in and of itself but may deter its use from non mastodon implementations to reuse.
#csarvenThere is going to be unintended use but not much you can do about that other than to document descriptions as best as you can.
#cwebberI guess that determines where it should go
#cwebberwe could also push for it to be an as2 extension or something, though I feel like I ought to read up on how it works :)
#csarvenI'm a bit ignorant on what's going on and half paying attention to the emoji/mastodon discussion here :) Keep that in mind.. So, are mastodon emojis part of the content, like any character in the status update, or do they indicate some (re)action either made, to be made or to trigger?
#rhiaroPSA: don't talk to csarven until he's started writing his phd thesis properly ;)
#xmpp-social[ajordan] They're both lists of really small problems but there's a lot of them... wasn't sure how you wanted to manage them so I didn't do anything, but I can break them up into multiple issues, etc.
#ben_thatmustbemei'll review it later, that may make things easier though
#Loqi[AJ Jordan] AJ Jordan AJ Jordan at 2017-09-19T17:03:06Z (As seen today on the SocialWG call) @Christopher Allan Webber: I'm here to clack keyboards and ...
#rhiaroeprodrom: We have a proposal from tantek to continue with our every other week unless we have runover
#rhiaro... My concern I think we have a december ??
#rhiaro... We are far enough along that it's going to be up to us to mess this up. My feeling is we don't need to do more than two during October. Any objectiosn?
#rhiarocwebber: I'm going to be at rebooting web of trust on Oct 3rd. I can maybe step away to be at the meeting. I also want to set expectations that I might not have that much to say because I'm representing a client all next week in DC and then I'm at rebooting web of trust, so that's going to take up a bunch of my time
#rhiarocwebber: Update on the test suite is that I've been working onit, had an unexpected item pushed onto the queue for it. Since Mastodon has taken the lead and a couple of other implementations are using http signatures be mandatory for server-to-server, I had to implement that
#rhiaro... in the process I found out the examples had a bug in them..
#rhiaro... but got that implemented and checked it is interoperable with another person in the channel
#rhiaro... I'm working on trying to get the.. I think the remaining two sections of the tests will be done at the end of october realistically
#rhiaro... There is one major issue that came up this week
#rhiaro... we didn't specify the mime type in server to server
#rhiaro... as far as I know every implementation did this. It was just omitted. Something we should add. Not sure if it is considered normative, technically it's a requirement, but it was a bug in the spec
#rhiarocwebber: this was the result that we came to because it wasn't clear waht the future direction was. I'm still not going to say that the worl dhas completely ... basically we left two routes, one was oauth2, one was LD signatures and http signatures
#rhiaro... in practice http signatures has become required and the LD signatures has become optional
#rhiaro... it's the in-practice what's being used route that we're seeing
#rhiarosandro: what do you mean the LD signatures part is optional?
#rhiarocwebber: it's being used in mastodon for the use case where... say you're doing a share
#rhiaro... how does that server know that if it's coming from you, the other person really said that thing
#rhiaro... it might not be feasible for themt o go back and retreive the original easily because of complicated access control stuff
#rhiaro... you just want to make sure that person really said the thing that was forwarded
#rhiaro... in practice mastodon realised that to make this work with AP they need the signatures
#rhiaro... they're only being checked in mastodon's usage when someone forwards to their followers cos it was the top post in the chain
#rhiaro... no other case is the signature actually checked. It's not required unless you're doing that
#rhiaro... maybe not everyone on the cal is familar with this probelm
#rhiaro... it sometimes results in a problem where the top poster in a comments chain gets comments from other servers and people in the thread miss out on messages
#tantekTBH all the signatures stuff feels like it needs more incubation to figure out something that works cross-implementations. It's feels like perhaps the biggest interop risk in all of AP. Hoping for the best, but pretty concerned (not raising any objections, just worries).
#rhiaro... we worked out this forwarding mechanism that makes sure messages get sent to peoples' followers
#ajordanand it could be worse, it's not a normative requirement in the spec or anything
#rhiaro... I'm not sure if I'll need to implement that in the tests as well
#rhiarosandro: sounds great in terms of interop. Trying to think of how to best help people who come along and read the spec right now
#tantekajordan there's always something to be done. e.g. separating anything related to it into a separate add-on spec that is incubated/matured on its own timeline
#rhiaro... they'll probably be a bit confused about what they're supposed to do
#rhiarocwebber: it sounds like you're saying if it seems like things ar econverging shoudl we be nudging people?
#tantekajordan, i.e. cut the feature from AP CR, since CR supposedly means *everything* in the spec is ready for implementation
#rhiarosandro: yeahh th e two main ways are that we could take the oauth part out and just use the one that seems to be being used
#tantekajordan, to be clear, not proposing this, just explaining that there are possible options
#ajordanah tantek yes that makes sense, I meant *in* the AP spec itself
#rhiaro... or just have section 8 be a pointer to some document maintained by the CG that can refine this going forward and maybe eventually put it into a separate spec
#tantekjust overheard sandro saying something very similar just now. interesting
#Zakimtantek, you wanted to note there is something very odd with an entire non-normative section that we are depending on for interop of a specific set of features
#rhiarotantek: the spec advertises a set of features you get if you interop. We're trying to capture features that are essential noted by folks like mastodon. Good we're listening to our implementors. But not good it's in non-normative text
#rhiaro... having a document maintained by the CG is fine with me
#rhiaro... evan? How do you feel about having pointers to an auth doc written by the CG which is mutable but starts out recommending what's actually in practice?
#rhiarocwebber: not just. The forwarding use case .. it's most likely to protect private content becuase that' swhen you can't necessarily look it up. There are two other cases where you still want it
#rhiaro... you could dial back and look at it publicly if it is public. But this means you don't hav eto do that
#rhiaro... you can use signatures as a uniform method
#rhiaro<rhiaro> sounds to me like it's not required if everything is public though..
#rhiarotantek: sounds like a path to this ability in the spec is how to handle private content
#rhiarocwebber: verification is important. It's right that it's not required if things are public
#rhiaro... you could use another mechanism which is to go look at the content
#rhiaro... but it sitll is important that i fyou get a post to your inbox that says here's some content, you have to make sure that the contnet really is from that server, and there are two ways to do it
#cwebberPROPOSED: Remove section 8 on Authentication and Authorization from spec, move to pointing from security considerations to a mutable document maintained by CG which includes current deployment practices (OAuth 2.0 bearer tokens for C2S, HTTP signatures and sometimes Linked Data Signatures for S2S)
#cwebberRESOLVED: Remove section 8 on Authentication and Authorization from spec, move to pointing from security considerations to a mutable document maintained by CG which includes current deployment practices (OAuth 2.0 bearer tokens for C2S, HTTP signatures and sometimes Linked Data Signatures for S2S)
#rhiarosandro: cgs can't publish notes. I think they're called reports
#rhiaro... if we wanted to solidify it at some point, some w3c member like mozilla could turn it into a member submission and get it formally archived at w3c
#rhiarosandro: there may be some alternative. one alternative is we don't necessarily use the test suite to prove interop. There are other ways, that's the usual one. I can imagine in the s2s thing that it might be more demonstrative to show these two systems federate by running them by hand with people watching
#rhiaro... that I think would suffice an dmight be less work
#rhiarotantek: I'm not entirely comfortable with that
#rhiaro... if interop is defined by how two implementations happen to work together, there's no guarnatee we've captured those details in the normative spec
#rhiarosandro: if you have three and one is written by the editor that.. that's the same guarantee as if the test suite aligns with the spec
#rhiaro... if the editor is making an implementation and that interops with two external ones, that's a good case we have interop
#rhiaroaaronpk: I would have beend one with websub and micropub a looottt sooner...
#rhiarotantek: the big concern is because the editor is doing both there are assumptions that are not reflected
#rhiarosandro: that's why you have those two other implementations
#rhiarotantek: at that point the third implementation might as well be the test suite rather than a third implementation
#rhiarosandro: if you want to call it the test suite sure, but it wouldn't be doing the same thing as what a test suite would do because it would be driven by hand
#Zakimrhiaro, you typed too many words without commas; I suspect you forgot to start with 'to ...'
#rhiarosandro: I think the AP s2s test suite / validator, we can think creatively about it
#rhiaro... it doesn' thave to be a thing you can connect to and run automatically
#rhiarotantek: I think driven by hand is fine. No requirement for automation
#rhiarosandro: the standard I just specified is lower than what i was saying before because it doens't invovle puckipedia and mastodon talking to each other
#rhiarotantek: you're saying we define interoperation by checking that these two interop. We need a textual description of what should happen when you runt wo implementatiosn against each other. That's a test suite.
#rhiaro... You can't avoid documenting hte epxected result
#rhiaroajordan: if we're going down the prompty path, which seems fine, after we ship a rec I think it would be nice to go back and make that stuff automated, to make new implementations easier
#rhiarothinks someone might want to pay cwebber to do that work ;)
#rhiarocwebber: the path will still be left open to code i nthe automated tests
#rhiaro... the biggest one is the hashing algorithm thing
#ajordanOK I gotta go to class but just want to say that I've finally been sending stuff to ben_thatmustbeme
#ajordannothing major, lots of clarifications merged
#rhiaro... essentially PuSH had only specified sha1 as the only valid hash algorithm. A while ago we had added other algorithsm and sha1 is mostly broken now
#rhiaro... but then there was a concern that servers and the hub need a way to negotiate which algorithm to use, which is a rather large new mechanism to add
#ajordanbye all! thanks for a good (partial) meeting
#rhiaro... the current proposal is to drop all the new algorithms from the spec, goign back to the way it was in PuSH and then mention that we may add new algorithms as an extension so we can actually better specify how these algorithms are negotiated
#rhiarosandro: I was not proposing formally dropping the other 3
#rhiaro... that struck me as hard to do without restarting CR
#rhiaroaaronpk: I guess I was assumign that the... oh you're right the proposed text doens't drop th eother three
#rhiaro... that leaves it in the same sort of undefined state
#rhiarosandro: i"m not thrilled with the undefined state but I think tha'ts the most expedient way forward
#rhiaroaaronpk: julien's comment is that it's not a big deal to use a weak hash beacuse if you're also using https there are a lot of layers to break before you can take advantage of a weak hash
#rhiarosandro: and also if the callback url is secret that also protects you
#sandro In the future, an extension may be specified allowing subscribers to indicate which algorithms they can use for validation. As of this writing, most hubs sign with SHA-1, despite its known cryptographic weakness, in order to be interoperable with older subscribers.
#rhiaroaaronpk: it explicitly says we should define the algorithm extension as an extension
#sandroRESOLVED: Resolve websub #125 by accepting proposal as written
#rhiarotantek: the text sandro put does touch on a security vulnerability, could you include a list item in security & privacy considerations that calls it out explicitly?
#rhiaro... that's a reason to write up a draft for the extension in the next few weeks if somebody feels motivated
#rhiarosandro: 124. We have this content negotiation solution we came up with a while ago. Richard the i18n guy pointed out there's language negotiation too
#rhiaro... and he's asking if we forgot or chose not to do it
#rhiaro... I think the answer is we forgot and should include text saying for either content type negotiation or language negotiation you should be doing the same thing
#rhiaro... shall we delegate to aaron to adopt something similar to ben's text and say we'll try to also get richard's approval but I don't think we need to
#Loqi[dissolve] Suggested text
For practical purposes, it is important that the rel=self URL only offers a single representation. As the hub has no way of knowing what mime-type or language may have been requested by the subscriber upon discovery, it would not be...
#Loqi[dissolve] Suggested text
For practical purposes, it is important that the rel=self URL only offers a single representation. As the hub has no way of knowing what mime-type or language may have been requested by the subscriber upon discovery, it would not be...