1
0
mirror of https://github.com/moparisthebest/xeps synced 2024-11-18 07:15:07 -05:00
xeps/xep-0429.xml

87 lines
4.0 KiB
XML
Raw Normal View History

2020-01-28 12:53:40 -05:00
<?xml version='1.0' encoding='UTF-8'?>
<!DOCTYPE xep SYSTEM 'xep.dtd' [
<!ENTITY % ents SYSTEM "xep.ent">
%ents;
]>
<?xml-stylesheet type='text/xsl' href='xep.xsl'?>
<xep>
<header>
<title>Special Interests Group End to End Encryption</title>
<abstract>This document proposes the formation of a Special Interest Group (SIG) within the XSF devoted to the development of end-to-end encryption within the context of XMPP.</abstract>
&LEGALNOTICE;
<number>0429</number>
<status>Active</status>
<lastcall>2020-12-15</lastcall>
<lastcall>2020-03-10</lastcall>
2020-01-28 12:53:40 -05:00
<type>Procedural</type>
<sig>None</sig>
<approver>Council</approver>
<dependencies/>
<supersedes/>
<supersededby/>
<shortname>SIG-E2EE</shortname>
&paulschaub;
2021-08-10 11:38:10 -04:00
<revision>
<version>1.1.0</version>
<date>2021-08-10</date>
<initials>mw</initials>
<remark>Add discussion venue after creation by the Infrastructure Team.</remark>
</revision>
<revision>
<version>1.0.0</version>
<date>2021-07-27</date>
<initials>XEP Editor: jsc</initials>
<remark>Accepted by Council</remark>
</revision>
2020-01-28 12:57:55 -05:00
<revision>
<version>0.2.0</version>
<date>2020-01-28</date>
<initials>ps</initials>
<remark>Allow only XSF members to act as ambassadors</remark>
</revision>
2020-01-28 12:53:40 -05:00
<revision>
<version>0.1.0</version>
<date>2020-01-28</date>
<initials>XEP Editor (jsc)</initials>
<remark>Accepted by vote of Council on 2020-01-08.</remark>
</revision>
<revision>
<version>0.0.1</version>
<date>2019-12-30</date>
<initials>ps</initials>
<remark>Initial published version.</remark>
</revision>
</header>
<section1 topic='Introduction' anchor='intro'>
<p>End-to-end encryption presents a vital tool for users to protect their communications against third parties. To ensure a good user experience it is important to agree on shared standards which are widely rolled out and adopted by implementations.</p>
<p>There already exists a number of encryption protocols with different properties and scopes. It is necessary to coordinate the efforts of further improving those standards to identify and unify common problems and patterns.</p>
</section1>
<section1 topic='Scope and Role' anchor='scope'>
<p>The role of the SIG shall be as follows:</p>
<ul>
<li>Produce, or coordinate the production and maintenance of relevant XMPP Extension Protocol (XEP) documents as described below under Deliverables.</li>
<li>Represent the interests and requirements of the XMPP community during the development of end-to-end encryption protocols that are non-exclusive to XMPP. Note: Only elected members of the XSF may act as ambassadors.</li>
2020-01-28 12:53:40 -05:00
<li>Provide recommendations for implementers.</li>
</ul>
<p>The SIG-E2EE shall not itself approve XMPP extension protocols (XEPs), which tasks shall remain under the purview of the XMPP Council.</p>
<p>The scope of the SIG is limited to end-to-end encryption in contexts which are useful for instant messaging.</p>
</section1>
<section1 topic='Membership' anchor='membership'>
<p>The SIG-E2EE shall be open to the public and shall not be limited to elected members of the XMPP Standards Foundation. Anyone who works with, or is interested in encryption protocols is invited to take part. Only elected members of the XSF however may act as ambassadors.</p>
2021-08-10 09:15:47 -04:00
<p>The following discussion venues have been selected for SIG-E2EE:</p>
<ul>
<li>Mailing list: <link url="https://mail.jabber.org/mailman/listinfo/standards">standards@xmpp.org</link></li>
<li>MUC: <link url="xmpp:e2ee@muc.xmpp.org?join">e2ee@muc.xmpp.org</link></li>
</ul>
2020-01-28 12:53:40 -05:00
</section1>
<section1 topic='Lifetime' anchor='lifetime'>
<p>The SIG-E2EE shall be a standing SIG, and shall exist as long as the XMPP Council deems it useful.</p>
</section1>
<section1 topic='Deliverables' anchor='deliverables'>
<p>The SIG-E2EE should maintain active existing end-to-end encryption specifications and keep them up to date.</p>
<p>It should also coordinate the production of future end-to-end encryption specifications to keep up with the state of the art.</p>
</section1>
</xep>