This message constitutes notice of a Last Call for comments on
XEP-0377.
Title: Spam Reporting
Abstract:
This document specifies a mechanism by which users can report spam and
other abuse to a server operator or other spam service.
URL: https://xmpp.org/extensions/xep-0377.html
This Last Call begins today and shall end at the close of business on
2026-01-05.
Please consider the following questions during this Last Call and send
your feedback to the standards(a)xmpp.org discussion list:
1. Is this specification needed to fill gaps in the XMPP protocol
stack or to clarify an existing protocol?
2. Does the specification solve the problem stated in the introduction
and requirements?
3. Do you plan to implement this specification in your code? If not,
why not?
4. Do you have any security concerns related to this specification?
5. Is the specification accurate and clearly written?
Your feedback is appreciated!
Version 0.1.0 of XEP-0511 (Link Metadata) has been released.
Abstract:
This specification describes how to attach metadata for links to a
message.
Changelog:
Accepted as Experimental by council vote (dg)
URL: https://xmpp.org/extensions/xep-0511.html
Note: The information in the XEP list at https://xmpp.org/extensions/
is updated by a separate automated process and may be stale at the
time this email is sent. The XEP documents linked herein are up-to-
date.
The XMPP Extensions Editor has received a proposal for a new XEP.
Title: Link Metadata
Abstract:
This specification describes how to attach metadata for links to a
message.
URL: https://xmpp.org/extensions/inbox/link-metadata.html
The Council will decide in the next two weeks whether to accept this
proposal as an official XEP.
Version 0.1.0 of XEP-0510 (End-to-End Encrypted Contacts Metadata) has
been released.
Abstract:
This specification describes how to encrypt contacts metadata to
minimize server exposure.
Changelog:
Accepted as Experimental by council vote (dg)
URL: https://xmpp.org/extensions/xep-0510.html
Note: The information in the XEP list at https://xmpp.org/extensions/
is updated by a separate automated process and may be stale at the
time this email is sent. The XEP documents linked herein are up-to-
date.
Version 0.8.0 of XEP-0353 (Jingle Message Initiation) has been
released.
Abstract:
This specification provides a way for the initiator of a Jingle
session to propose sending an invitation in an XMPP message stanza,
thus taking advantage of message delivery semantics instead of sending
IQ stanzas to all of the responder's online resources or choosing a
particular online resource.
Changelog:
Adapt usage of JID types to real-world usage:
* Send JMI responses to full JID of initiator instead of bare JID
* Send JMI <finish/> element to full JID of both parties (melvo)
URL: https://xmpp.org/extensions/xep-0353.html
Note: The information in the XEP list at https://xmpp.org/extensions/
is updated by a separate automated process and may be stale at the
time this email is sent. The XEP documents linked herein are up-to-
date.
I quite like XEP-0392. I didn't honestly think I would when it first
proposed and published, but it's really handy.
But, XEP-0392 doesn't - anywhere - specify what the "input" should be. I
can see some options:
1) Pick the relevant jid. I'm currently using the bare jid for 1:1
conversations, and the XEP-0045 occupant jid (including nickname) for MUCs.
That seems the most obvious, but means nickname changes also change colour.
2) Pick the display name. I could use the name for 1:1 (the one I display,
from Roster etc) and the nickname from a MUC. That has the advantage that
where those are the same, the colour will be consistent - "Zash" will be
coloured the same on all MUCs, for example.
3) Pick the most stable identifier I can. So occupant_id in MUC,
though still bare Jid for 1:1. This would mean the bright pink occupant
would remain bright pink no matter what nickname change they tried. No
escape!
Any suggestions? Or doesn't it matter?
Dave.
The XMPP Extensions Editor has received a proposal for a new XEP.
Title: End-to-End Encrypted Contacts Metadata
Abstract:
This specification describes how to encrypt contacts metadata to
minimize server exposure.
URL: https://xmpp.org/extensions/inbox/contacts-e2e.html
The Council will decide in the next two weeks whether to accept this
proposal as an official XEP.
Greetings.
I am interested to know, whether there is a possibility to create a
write-only node.
For instance, a node which be written by anyone, and read by selected
people, be useful to moderation of contents.
Pending
urn:xmpp:microblog-await:0
Moderators: read and write
Public: write
Denied
urn:xmpp:microblog-denied:0
Moderators: read and write
Public: none
Approved
urn:xmpp:microblog:0
Moderators: read and write
Public: read
P.S. The node names are not standard node names.
These are node names for the purpose of realization.
Kind regards,
Schimon
Greetings.
I would want to discuss of Atom Over XMPP; that is XEP-0277 and
XEP-0472, and subsequently XEP-0501; and the implementation thereof by
several publishing platforms.
Some publishing platforms utilize RFC 4287 in an invalid fashion, and I
would want to advise of a better practice.
I do not discuss this over the documentation repository, because I do
not think that it is necessary, as this is an issue which concerns to
RFC 4287 itself The Atom Syndication Format.
atom:content
------------
Section 4.1.2 to RFC 4287 titled by The "atom:entry" Element has this
statement.
> o atom:entry elements MUST NOT contain more than one atom:content
> element.
However, there are at least two publishing platforms that violate that
principle, and provide two elements of "atom:content";
One "atom:content" element of type="xhtml" and an additional one of
type="text" which is not really Plain Text as intended by RFC 4287, but
is Markdown Text.
I suppose that, the purpose of the extra element is to store the source
code of the actual content, to facilitate human interaction with these
platforms.
It is important to not that the valid values of attribute "type" of
element "atom:content" are "text, "html", and "xhtml".
atom:link
---------
Nevertheless, the element "atom:link" offers two relevant attributes to
that would fit perfectly.
Attribute "href" (location) to specify the URI to the document. That
could also be over FTP, Gemini, HTTP, XMPP, over a PubSub URI for
public or private access; and it is particularly helpful, to both
developers and people, to access or download the source of a document,
instead of extracting it from an XML element;
Attribute "rel" (relation) which has various of uses over Atom, HTML,
and XML, including paging with rel="next" and rel="previous" (RFC
5005), could be utilized to classify the content of the linked document
as a source of a post (i.e. rel="source"); and
Attribute "type" (MIME-Type) to set the file type of the content (i.e.
type="text/markdown").
Attributes "hreflang" and "title", of element "atom:link", might also
be useful, yet these two attributes are not crucial to this discussion.
Importance
----------
There are three crucial reasons for that advisory.
* Compliance with RFC 4287, as intended;
* Better classification of data, as proposed; and
* Most importantly, to not confuse developers who want to explore
publishing over XMPP; for example, developers of publishing platforms
such as Bonfire, Pleroma who are meticulous when they implement
standards.
Of note
-------
I was confused, and almost discouraged, when I first attempted to
create a publishing platform, because I tested against platforms that
utilize more than a single element of "atom:content", and which one was
classified as "text" even though it was not plain text.
Respectfully,
Schimon