Difference between revisions of "Interop"
(I'll keep my (XSF) hat on.) |
(No difference)
|
Revision as of 09:16, 9 December 2010
XMPP Interop
Plan: to make this the main page for all Interop information, a work-in-progress
2010 Interop
From Monday 6th December through to Saturday 11th December, the XSF will be conducting an online interop event to test and demonstrate XMPP interoperability based on the latest core standards. Client and Server implementers are encouraged to participate.
There is a XEP-0045 chatroom hosted at interop@muc.xmpp.org - if anyone has interop problems connecting to it, this is known to be reachable from jabber.org accounts.
There is also a mailing list interop@xmpp.org - joining it can be done by sending email to interop-request@xmpp.org with a subject line of "subscribe", or alternately by using the Web Interface.
2010 Interop CA
The CA certificate (DER-encoded) and CRL are available from http://ca.xmpptest.com/
How to obtain a signed certificate
- Generate a certificate request:
- git clone https://github.com/bjc/prosody.git
- cd prosody/certs
- DOMAIN=yourhost.xmpptest.com
- make $DOMAIN.cnf
- make $DOMAIN.key
- make $DOMAIN.csr
- Send the CSR to MattJ (mwild1 ON gmail com)
- You will receive an email from MattJ with the file $DOMAIN.pem; you can append to it the private key with:
- cat $DOMAIN.key >> $DOMAIN.pem
2010 Server Interop Participation
Each participating server has one IM domain, and a chatroom subdomain. These are setup with only SRV records, no A/AAAA records and ports other than the default 5269.
Isode
- Contacts
- Servers
- mlinkrelease.xmpptest.com: R14.6 M-Link
- mlinktrunk.xmpptest.com: R15.0 M-Link (trunk)
- IPv4 and IPv6 dual-stack
Prosody
ejabberd
- Contacts
- Servers
- ejabberd21.xmpptest.com: ejabberd 2.1.x; dev2.process-one.net ; ports 5222 (c2s) 5269 (s2s) 5280 (BOSH); IBR with CAPTCHA
- ejabberd master; just planned
psyced
- Contacts
- Servers
- psyced - s2s only with XEP-0288 and D-W-D support in several configurations (xep-0178-enabled, standard dialback, dwd, bidi)
- psyced-db.xmpptest.com - dialback only, does not enforce TLS
- psyced-sasl.xmpptest.com - enforces TLS, will offer sasl
- psyced-dwd.xmpptest.com - dialback with d-w-d, bidi
Tigase
2010 Client Interop Participation
Client developers are requested to ask server admins for usernames and passwords as required, to reduce the possibility of spamming (although it seems unlikely, it'd be a pest if it happened).
BoldonJames
Swift
- Contacts
- Kevin Smith XMPP
- Remko Tronçon XMPP+EMail
- Clients
- Swift
Gajim
- Contacts
- Yann Leboulanger XMPP
- Clients
- Gajim
Collabora
- Contacts
- Sjoerd Simons XMPP
- Will Thompson XMPP
- (Emilio Pozuelo Monfort XMPP ? not actively working on the XMPP backend, but is writing a search UI which should be able to drive the XEP-0055 code in Gabble)
- Clients
- Telepathy-Gabble, as used by Empathy
- Particularly interested in testing (based on a quick show of hands on the developer channel):
- XEP-0055
- XEP-0186 Invisible Command (deferred! how upsetting)
- Non-Google implementations of google:queue
- SOCKS5 bytestream proxies
- Server PEP behaviour when we turn +notify on and off on the fly. Specifically: do updates that occur while we do not have +notify set get pushed to us when we turn it back on?
OneTeam
OneTeam for iPhone
Testing
Current Server Config
Working through these during the week, as they need people to change their server configs. For the current config, please allow dialback, allow non-TLS s2s, and don't do cert checking if offered TLS. For C2S, please allow non-TLS (and TLS) connections.
Server Tests
- Test 1 (Wednesday). With no requirements on TLS, SASL or cert checking, ensure that a user connected to the server sending a XEP-0199 ping to each other test server receives the correct reply (meaning s2s worked).
- Test 2 (Thursday). Requiring TLS on all s2s connections on all servers, ensure that a user connected to the server sending a XEP-0199 ping to each other server gets the reply. Ensure that the servers don't s2s (i.e. the user receives an error from their own server when sending the ping) to notls.xmpptest.com (not yet set up).
- Test 3 (Friday). Requiring TLS on all s2s connections, with identity verification, ensure that the user's ping works to all test servers. Ensure it doesn't work to (notls|expiredcert|mismatchcert|revokedcert|selfcert).xmpptest.com (not yet set up).
Server Results
- Test 1
- mlinktrunk Works against: mlinkrelease, tigasetrunk, ejabberd21, prosody8, psyced-db, psyced-dwd, psyced-sasl. Fails against: none.
- mlinkrelease Works against: mlinktrunk, tigasetrunk, ejabberd21, prosody8, psyced-db, psyced-dwd, psyced-sasl. Fails against: none.
- tigasetrunk Works against: . Fails against: .
- ejabberd21 Works against: mlinkrelease, mlinktrunk, prosody8, psyced-dwd, psyced-sasl, tigasetrunk. Fails against: none.
- prosody8 Works against: mlinkrelease, mlinktrunk, ejabberd21, psyced-db, psyced-sasl, psyced-dwd, tigasetrunk. Fails against: .
- psyced-db Works against: mlinkrelease, mlinktrunk, ejabberd21, psyced-dwd, psyced-sasl, tigasetrunk. Fails against: none.
- psyced-dwd (not actively participating, requires TLS)
- psyced-sasl (not actively participating, requires TLS)
Client Tests
- Test 1 (Wednesday). Check that each client can connect to each test server.
- Test 2 (Thursday). Check that the clients will not login to notls.xmpptest.com, as it will only offer PLAIN without TLS. (Not yet set up).
- Test 3 (Friday). Check that the clients will login to all test servers, but not to the invalid TLS domains (see the s2s test list), or will warn the user before doing so.
Client Results
Other results
- Gajim and OneTeam worked well with voice over Jingle, with acceptable sound quality
- The N900 client and OneTeam worked well with voice over Jingle, when the phone was on wifi, did not work the phone was on 3G