Skip to main content

Notice: this Wiki will be going read only early in 2024 and edits will no longer be possible. Please see: for the plan.

Jump to: navigation, search

Paho/Project Plan

Current Plan

The release plans are in the project documentation - see "releases" at

Current and Near Future Major Items

  • contributing to M2Mqtt: regression tests, disk persistence, maybe some other items
  • offline buffering (ability to send while not connected) and automatic reconnect for C, Java and JavaScript clients
  • ongoing embedded client improvements: proper FreeRTOS support, asynchronous clients, build improvements, documentation: porting guides, tutorials, formal MQTTClient-C release
  • Android service stability, Android app
  • WebSockets support for C, Python clients (any others?)
  • MQTT-SN to MQTT embedded gateway
  • MQTT conformance test material
  • MQTT client statistics
  • possibly an MQTT forwarder for DMZ (it's been mooted, but I'm not exactly sure what it means)

Actively Soliciting Contributions for

It would be nice for Paho to have these, even if they do already exist elsewhere. Eclipse legal processes mean that the software is clean, safe to use commercially.


  • I am assuming the MQTT specification will evolve over the next couple of years. Would it make sense to start an incubator to try out some new ideas for the spec? Developers could contribute code that implements these ideas and this would help the MQTT TC in the evolution of the spec. (Ian Skerrett)

Paho incubator has now been created -

  • I'd like to see a focus on creating tools to test/debug/deploy MQTT apps. Tools like MQTTLens I think will be critical to the adoption of MQTT. Could Paho be the home to these types of tools? (Ian Skerrett)

Add suggestions here Ideas for tools that could be created or adopted to test/debug/deploy MQTT

  • I think the MQTT embedded security story could be greatly improved (Julien Vermillard) I think today using MQTT or any M2M protocol with security on any embedded platform is difficult and cumbersome. I use wakaama with tinydtls a DTLS implementation MIT licensed and at some point I would like to provide ready to install client on some platform but with security (with a business friendly license) as a mandatory feature. Maybe it worth looking at (BSD licensed) or extending tinydtls for providing good old TLS which is in fact simpler than DTLS.

Back to the top