I'm a bit torn on this one. Mostly I agree with what Travis wrote. I'm 
slightly concerned that the way this spec makes recommendations (ie. 
putting exporter and end-point at the same level of "SHOULD" [1]) may 
lead to a false sense of security (this is already true of most 
everywhere we write about tls-end-point where we don't make it clear 
that it provides vastly different security properties than unique 
mechanisms like tls-unique and tls-exporter).
I also strongly agree with Dave that we should run this by KITTEN first; 
asking the advice of the experts seems pertinent.
Overall I'm not against having a way to do this negotiation: if 
tls-exporter starts showing signs of weaknesses it's probably good to 
have a way to quickly update. But I'm somewhat against this document 
making recommendations for compatibility and would prefer that to exist 
elsewhere (probably somewhere we can update quicker than a standards 
track XEP if future problems arise; maybe we should have a "how to use 
TLS with XMPP" informational spec of our own at some point?
Finally, I'd like to see a trust-on-first-use model added to the spec. 
If we're going to do this, the client may want to cache the mechanism 
list on the first connection to the server and fail if that list is 
downgraded in the future, or something along those lines.
TL;DR — overall I'm not against the general idea, but I don't think this 
spec is ready for last call yet.
—Sam
[1]: actually, it looks like tls-exporter isn't even a SHOULD, it's a 
"should". That SHOULD probably be fixed :)
On 2024-05-06 13:21, Daniel Gultsch wrote:
  This message constitutes notice of a Last Call for
comments on
 XEP-0440.
 
 Title: SASL Channel-Binding Type Capability
 Abstract:
 This specification allows servers to annouce their supported SASL
 channel-binding types to clients.
 
 URL: 
https://xmpp.org/extensions/xep-0440.html
 
 This Last Call begins today and shall end at the close of business on
 2024-05-20.
 
 Please consider the following questions during this Last Call and send
 your feedback to the standards(a)xmpp.org discussion list:
 
 1. Is this specification needed to fill gaps in the XMPP protocol
 stack or to clarify an existing protocol?
 
 2. Does the specification solve the problem stated in the introduction
 and requirements?
 
 3. Do you plan to implement this specification in your code? If not,
 why not?
 
 4. Do you have any security concerns related to this specification?
 
 5. Is the specification accurate and clearly written?
 
 Your feedback is appreciated!
 _______________________________________________
 Standards mailing list -- standards(a)xmpp.org
 To unsubscribe send an email to standards-leave(a)xmpp.org 
-- 
Sam Whited
sam(a)samwhited.com