XSF Discussion - 2018-02-03


  1. Flow

    Tobias, how/where did you learn about those two I-Ds?

  2. Tobias

    The Twitter realms

  3. Tobias

    Will see if I get around reading them on the 🚆

  4. Flow

    Tobias, kk :)

  5. zinid

    Failed outbound s2s EXTERNAL authentication zinid.ru -> jabber.org (208.68.163.218): Authentication failed: Peer provided no SASL mechanisms; most likely it doesn't accept our certificate

  6. zinid

    does anybody know when SASL EXTERNAL will be fixed on jabber.org?

  7. Tobias

    zinid, yeah...DNS will be fixed.

  8. Tobias

    zinid, currently a lot people are busy doing FOSDEM things though

  9. zinid

    I don't think this is DNS problem

  10. zinid

    this is a problem in certificate verification

  11. Tobias

    oh

  12. zinid

    jabber.org's server doesn't accept LE certificates for example

  13. Tobias

    Flow, https://tools.ietf.org/html/draft-omara-mls-architecture-00#section-2.2 sounds tricky to do in a federated world, unless the "Authentication Service" can federate with others

  14. Tobias

    zinid, i'm using LE on my server and it can talk to jdev, so it supports them but there seem to be issues

  15. zinid

    Tobias, that's because it authenticate your server via dialback

  16. Tobias

    could be

  17. zinid

    but not every server is running dialback module, and more server will stop using it in the future

  18. zinid

    but not every server is running dialback module, and more servers will stop using it in the future

  19. SaltyBones

    Tobias: so if the authentication service is trusted this is not e2e and thus not like omemo/otr, right?

  20. Tobias

    that's the question

  21. Flow

    Tobias, not sure if it is tricky in a federated system, but if you don't have a central authentication authority and can't cryptographically bind your identity with your key, your only option is probably something like fingerprint verification and/or TOFU

  22. Tobias

    right, in the end there are still people who want end to end verification when they meet

  23. Tobias

    "By definition, the AS is invested with a large amount of trust. A malicious AS can impersonate - or allow an attacker to impersonate - any user of the system. This risk can be mitigated by publishing the binding between identities and keys in a public log such as Key Transparency (KT) [KeyTransparency]."

  24. Tobias

    Flow, they just bolt heavy KT on it and be done with it

  25. Tobias

    wonder how that scales, these KT logs become quite large

  26. SaltyBones

    Tobias, have you found the corresponding mailing list discussion already?

  27. Tobias

    there doesn't ssem to be one, currently it's just a personal draft

  28. SaltyBones

    Yeah, I can't find anything either.

  29. Tobias

    Flow, also https://tools.ietf.org/html/draft-omara-mls-architecture-00#section-3.1.6 :) "should be able to interoperate"

  30. Tobias

    at least not a MAY :)

  31. SaltyBones

    Okay, from what I can find they don't even state how this is supposed to work so one can check.

  32. SaltyBones

    And the reference to the protocol has no link. :p

  33. Tobias

    Federated authentication is tricky

  34. SaltyBones

    Is that this: https://medium.com/netflix-techblog/message-security-layer-a-modern-take-on-securing-communication-f16964b79642 ?

  35. SaltyBones

    Tobias, but for proper e2e you need e2e verification anyway...

  36. SaltyBones

    You can get away without it if you have decent ratcheting, I suppose.

  37. Tobias

    I did a federated authentication thing for iot. But there I hard linked the crypto to the network layer (IPv6 address)

  38. Tobias

    That's not directly possible with free choice DNS names so we would need a different system for XMPP

  39. SaltyBones

    "hard linked"?

  40. SaltyBones

    So if a device is compromised you throw it away because the key cannot be changed?

  41. SaltyBones

    (Seems to be one of the few cases where this might not be problem.)

  42. Tobias

    If you change the key you change the address

  43. SaltyBones

    Tobias, I axed: https://mailarchive.ietf.org/arch/msg/cfrg/KN9-Dy26tBGMx4YkzY98ZDkpRTg

  44. Tobias

    I linked to proto earlier. See history

  45. Tobias

    https://datatracker.ietf.org/doc/draft-barnes-mls-protocol/

  46. SaltyBones

    Oh, cool, I'll add that!

  47. Tobias

    Don't know how future proof that is. It's not mentioning block chain at all

  48. SaltyBones

    -_-

  49. SaltyBones

    Tobias, https://twitter.com/paul_pearce/status/959138611617673216

  50. Tobias

    😀

  51. Ge0rG

    AES CBC is literally a block chain.

  52. Zash

    !

  53. Zash

    Is "nano" still a cool word?

  54. Ge0rG

    Zash: sorry, nope

  55. Zash

    "nanoblockchain"

  56. Zash

    "microblockchain" then?

  57. Zash

    pico?

  58. Ge0rG

    "nano" was a thing when I wen to school. Which is now almost 20 years ago

  59. Zash

    I was in school 20 years ago too

  60. Ge0rG

    Zash: I propose "eco" or "bio" because it comes without PoW

  61. waqas

    Yeah, enough time has passed to move to pico now

  62. Zash

    PicoBlockChain - PBC

  63. waqas

    Ge0rG: Eco has been around for too long too

  64. waqas

    I haven't head of Bio that much in tech however… XEP-xxxx: Bio Chains

  65. Zash

    Hyperblockchains?

  66. MattJ

    nano is a cool word, I use it all the time

  67. Zash

    Something something hypercube routing

  68. pep.

    Noob question, is there a way to never send the plain passwd to the server and only do scram, from account creation to the end. (Thinking about ibr)

  69. Ge0rG

    Hyper cube, wasn't that the movie full of deadly traps?

  70. Ge0rG

    pep.: you need to send the password during ibr

  71. MattJ

    pep., no

  72. Zash

    Wasn't there some draft/protoxep on uploading SCRAM stuff?

  73. MattJ

    oh?

  74. Zash

    Bunneh: xep scram

  75. Bunneh

    Zash: Sorry, I couldn't find a match

  76. pep.

    Zash: would be nice

  77. pep.

    Also, scram for the web when

  78. Zash

    Hah, good luck

  79. Zash

    Re the talk of device / client registration that was mentioned on the summit

  80. Zash

    In't that something like the model of OAuth, where instead of the user signing into their account, they authorize the clients to access their account.

  81. Zash

    In that model, password login don't as much sense

  82. Ge0rG

    I want an Auth mechanism called SCUMM.

  83. moparisthebest

    What like oauth with Facebook?