interop - 2010-12-10


  1. MattJ

    Bouncing prosody8

  2. MattJ

    fippo, awake?

  3. MattJ

    psyced-sasl doesn't like me

  4. MattJ

    Everything else seems to work

  5. MattJ

    Dec 10 01:44:05 s2souta052b68 debug Received[s2sout_unauthed]: <success xmlns='urn:ietf:params:xml:ns:xmpp-sasl'> Dec 10 01:44:05 prosody8.xmpptest.com:saslauth debug SASL EXTERNAL with psyced-sasl.xmpptest.com succeeded

  6. MattJ

    but I don't receive a pong

  7. MattJ

    Ah

  8. MattJ

    It would help if I trusted the interop CA cert, wouldn't it? :)

  9. Zash

    This host does not serve notls.xmpptest.com

  10. Zash

    notls.xmpptest.com. 3600 IN A 89.16.172.47

  11. Zash

    ^^

  12. Zash

    no srv

  13. MattJ

    Ah yes, thanks for reminding me

  14. MattJ

    !uptime matthewwild.co.uk

  15. MattJ

    !slap Kanchil

  16. Kanchil slaps Kanchil with large trout

  17. MattJ

    Actually I don't need to restart

  18. Zash

    !version

  19. Kanchil

    Zash: Kanchil is running Riddim version alpha on an unknown platform

  20. Zash

    MattJ: btw, that reminds me, Riddim has no !uptime plugin yet

  21. Zash

    !slap MattJ

  22. Kanchil slaps MattJ with large trout

  23. Zash

    And can do that ;)

  24. MattJ

    I'll have more time for even Riddim soon :)

  25. Zash

    Bot interop event! \o/ ... ;P

  26. Kev

    Right then, Friday.

  27. remko

    and still need to set up the servers of thursday :)

  28. Kev

    So, today's plan. Make servers require TLS, and require trusted and valid certs.

  29. Kev

    And if MattJ hasn't done notls yet, that still needs doing.

  30. Kev

    remko: Just notls?

  31. remko

    yes, and i still need an account on tigase (Florian?)

  32. Kev

    So the failures machines are all in place apart from expiredcert, which is presenting the wrong cert (although it's also expired), and notls.

  33. steve.kille

    Kev: I would have thought that expiredcert should be valid in every way, except that it has expired??

  34. Kev

    Yes.

  35. Kev

    That's why I said expiredcert isn't in place yet.

  36. steve.kille

    ah yes - can parse your sentence now!

  37. Kev

    expiredcert is in place now too.

  38. badlop

    yes, and ejabberd connects using tls to all of them :S

  39. Kev

    Well, that's one up from connecting without TLS to them :)

  40. Dave Cridland

    Right, I'll give it a run though.

  41. Kev

    We still don't have notls, but that's largely just interesting for the clients^h testing.

  42. Kev

    Given that we have Tigase.

  43. Kev

    tigasetrunk, rather

  44. steve.kille

    why do we need notls in addition to Tigase?

  45. Kev

    steve.kille: It would be good to test it against an XMPP server not offering TLS, as well as the legacy protocol.

  46. Kev

    But largely, it's so that the clients can test correct handling of not having TLS when PLAIN is the only available mech.

  47. Dave Cridland

    Okay, that's odd. I seem to be able to connect to everything except Tigase, and NoTls. So I suspect my settings are out, but I thought I'd checked them...

  48. Kev

    I haven't verified that the expired cert is actually expired, or that the revoked cert is actually revoked, mind.

  49. Dave Cridland

    It was yesterday.

  50. Dave Cridland

    And the expiredcert being expired forced us into using SodiumCA instead of OpenSSL to build the PKCS#12, if you recall.

  51. Kev

    Yes.

  52. Dave Cridland

    12/10 10:44:39 xmppd 21382 (root ) I-MBOX-Info Verifying certificate 12/10 10:44:39 xmppd 21382 (root ) I-MBOX-Info certificate (subject emailA ddress=xmpp@revokedcert.xmpptest.com,OU=XMPP Department,O=Your Organisation,L=Th e Internet,C=GB,CN=revokedcert.xmpptest.com), detail (email=xmpp\\40revokedcert. xmpptest.com,ou=XMPP Department,o=Your Organisation,l=The Internet,c=GB,cn=revok edcert.xmpptest.com) error certificate has been revoked (unspecified reason) 12/10 10:44:39 xmppd 21382 (root ) N-MBOX-Notice TLS certificate verificat ion failed 12/10 10:44:39 xmppd 21382 (root ) I-MBOX-Info successful setup of a recei ving db connection from mlinktrunk.xmpptest.com to revokedcert.xmpptest.com

  53. Dave Cridland

    Right, so this is acting as if strong auth isn't required, which isn't right.

  54. Dave Cridland

    Re-running gives me the (internal) errors I'd expect. So we may have a bug with reloading, since I suspect the option simply didn't take.

  55. Dave Cridland

    SO I'm not getting a connection (TCP level) to fippo's psyced-db or psyced-dwd at the moment. I'll give those another go later.

  56. Dave Cridland

    Otherwise, prosody8, ejabberd21, mlinkrelease, psyced-sasl all work, the rest fail.

  57. Dave Cridland

    Okay, psyced-db now works, but -dwd still gives me a connection refused.

  58. fippo

    psyced-db works? it should not currently

  59. fippo

    as both -db and -dwd are down

  60. Dave Cridland

    12/10 11:15:37 xmppd 21687 (root ) I-MBOX-Info Verifying certificate 12/10 11:15:37 xmppd 21687 (root ) I-MBOX-Info certificate (subject emailA ddress=fippo@mail.symlynx.com,OU=hangtime department,O=hangtime,L=The Internet,C =DE,CN=psyced-db.xmpptest.com) verified ok

  61. Dave Cridland

    Pretty sure it's the right server I'm talking to.

  62. fippo

    oh wait... my bad

  63. fippo

    it's supposed to be down

  64. Dave Cridland

    Okay. COnnecting securely to servers that aren't actually online would be quite a trick.

  65. fippo

    badlop: would you mind sending a from in the stream header?

  66. badlop

    yes, show me an example of problematic stream header

  67. badlop

    ok, patch applied and verified

  68. fippo

    thanks

  69. badlop

    yet another patch from interop to next release :)

  70. fippo

    that might even increase the chance of using sasl on the public network from 5% to 15%

  71. Tobias

    heh

  72. Dave Cridland

    badlop, I've a bunch of those too, now.

  73. fippo too

  74. Dave Cridland

    fippo, Reminds me - you should be seeing tls as <required/> by mlinktrunk now?

  75. Kev

    I'd say that would justify claiming the interop week has been a success, then.

  76. Dave Cridland

    In as much as we've got most things to work and fixed a bunch of bugs.

  77. fippo

    and we have a better plan how to organize the next interop event

  78. steve.kille

    What might be test targets in the next event?

  79. Dave Cridland

    steve.kille, Well, we still have a day on this one. I'm aiming to spend this afternoon seeing if I can get XEP-0288 to work with fippo's servers.

  80. fippo

    dave: whoop!

  81. steve.kille

    \o/

  82. Dave Cridland

    fippo, DO you have a XEP-0288 that'll accept non-TLS connections from anywhere? It'll speed up my testing.

  83. steve.kille

    Are these extras getting recorded in the Wiki?

  84. fippo

    dave: i'll change the config of -dwd so it doesn't require tls

  85. fippo

    dialback without dial-back worked quite well, too. So we just need someone to write it up :-)

  86. Dave Cridland

    steve.kille, The extras are getting recorded, but I've not written up the '198 testing that Matt and I did yesterday, mostly because I didn't stay to see it complete. But we certainly got close.

  87. Dave Cridland

    fippo, Yes. Don't you have a draft XEP?

  88. Dave Cridland

    fippo, I should have probably mentioned that mlinktrunk does dialback without dialback as well. I don't know if anyone actually used it, though.

  89. fippo

    dave: i think psyced-db should have been using it the last two days

  90. Dave Cridland

    fippo, Ah, good.

  91. Dave Cridland

    Right. So it must be time to implement XEP-0288, then.

  92. Zash

    !xep 288

  93. Kanchil

    Zash: XEP-0288: Bidirectional Server-to-Server Connections is Standards Track (Experimental, 2010-10-04) See: http://xmpp.org/extensions/xep-0288.html

  94. Zash

    Yes, it's already a week old, clearly it's time to implement it!! :D

  95. will.thompson

    Dave Cridland: your implementation of google:queue works perfectly. It did highlight that our keepalive pings are *way* too frequent though :p

  96. Tobias

    google:queue?

  97. Dave Cridland

    Tobias, Evil closed standard thing. But a good idea, so I've implemented it and started to draft a XEP.

  98. Bob (BJ)

    Anyone care to give me an account on their server so I can test my client?

  99. MattJ

    Does google:queue have client-facing controls?

  100. Tobias

    Dave Cridland: is that draft already published as a XEP?

  101. Dave Cridland

    MattJ, Yes,

  102. Dave Cridland

    Tobias, No.

  103. Tobias

    k

  104. will.thompson

    http://mail.jabber.org/pipermail/summit/2010-February/000528.html

  105. Dave Cridland

    Tobias, I need to write up both Google's implementation and a more standardsish one.

  106. MattJ

    Oh well, I have an implementation minus any controls

  107. will.thompson

    we hacked it into Gabble for the N900. It's particularly important on GTalk because, unless you engage it, they whitespace-ping you every 30 seconds, so even if you have a sensible interval between pings... you still wake up all the time

  108. MattJ

    Heh

  109. Tobias

    ahh, this thing, i remember it now :)

  110. MattJ

    Bob (BJ), xmpptest@prosody8.xmpptest.com, password xmpptest

  111. MattJ

    Kev, notls should be working since last night

  112. Kev

    Ah, gerat.

  113. Kev

    remko: ^

  114. Bob (BJ)

    You got an IP address for that. I don't seem to be able to resolve via DNS.

  115. MattJ

    Bob (BJ), does your client support SRV records?

  116. MattJ

    If not, interop failure #1 :)

  117. will.thompson

    Dave Cridland: ah, one catch. the version of Gabble on the N900 only looks for google:roster to trigger queue, not google:queue. (Google doesn't actually advertise the latter; I guess we only added that speculative check in a later version.) Annoying.

  118. MattJ

    Dave Cridland, fippo, anyone: any familiarity with "unhandled critical CRL extension"?

  119. Dave Cridland

    MattJ, I can ask the X.509 people. Any idea what the extension in question *is*?

  120. MattJ

    Looking at the certs, my suspicion is CRLissuer

  121. MattJ

    which is present in all the certs

  122. MattJ

    and OpenSSL prints <unknown> as its value when it prints the cert

  123. Dave Cridland

    I'll look into it - I suspect this is an issue with what Sodium's putting into the certs.

  124. MattJ

    Thanks

  125. MattJ

    How does it work for you? :)

  126. MattJ

    OpenSSL source comment:

  127. MattJ

    /* See if we have any critical CRL extensions: since we * currently don't handle any CRL extensions the CRL must be * rejected.

  128. Dave Cridland

    MattJ, We don't use OpenSSL for CRL checking, so we'd be affected in entirely different ways (if at all).

  129. MattJ

    Ah, ok

  130. Dave Cridland

    So if it's complaining about the CRL itself, then it has to be the CRL, not the certs.

  131. fippo

    mattj: I can look into that when I found out who _removed_ my crl code

  132. remko

    Kev, MattJ: thanks, i'll see if i can't connect to notls tonight

  133. MattJ

    Dave Cridland, no, I think it's the certs

  134. MattJ

    let me check

  135. MattJ

    Ah no, you may be right

  136. Kev

    remko: Well, you shouldn't be able to connect to it :)

  137. remko

    right

  138. Dave Cridland

    MattJ, Okay, so Sodium CA is inserting an extension into the CRL incorrectly.

  139. MattJ

    Yay

  140. Dave Cridland

    MattJ, If I understand correctly, the extension "MUST NOT" be there because the CRL is being issued directly by the CA, but as far as I can tell it's mandatory in every other case, so OpenSSL could run into issues potentially with other CAs.

  141. MattJ

    So it seems

  142. MattJ

    You can disable the check (which is what I've done for now), but that's clearly not ideal :)

  143. fippo

    mattj: verify error code 36?

  144. MattJ

    If that's X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION, yes

  145. MattJ

    Yes, 36

  146. fippo

    I get that too (but at least revokedcert. fails properly

  147. MattJ

    but so do all the other certs, no?

  148. fippo

    yes, but revokedcert fails with X509_V_ERR_CERT_REVOKED at least

  149. MattJ

    fippo, what version of OpenSSL are you using?

  150. fippo

    mattj: it claims to be 0.9.8g but is probably debian pimped

  151. Dave Cridland

    MattJ, The only extension in the CRL itself that's critical is the Issuing DP - but that's optionally generated by Sodium CA. Just uncheck the box on the "Generate CRL..." dialog.

  152. MattJ

    Ok, thanks

  153. MattJ

    fippo, they changed the code in OpenSSL 1.x

  154. MattJ

    that comment now reads:

  155. MattJ

    /* The rules changed for this... previously if a CRL contained * unhandled critical extensions it could still be used to indicate * a certificate was revoked. This has since been changed since * critical extension can change the meaning of CRL entries. */

  156. Kev

    So, is there anything people need of me today?

  157. Kev

    Is there anything else we should have on the test plan? I'm fairly comfortable with both the server and client tests.

  158. MattJ

    Looks fine

  159. Kev

    MattJ: Just checking - is notls set to only offer PLAIN?

  160. MattJ

    Aha, good point - Prosody won't offer PLAIN on unencrypted connections either

  161. MattJ

    I'll set it to offer just PLAIN

  162. fippo

    Kev: for the next time I have some dialback failures - but I need to write them up and think about how to test them

  163. Kev

    fippo: That'd be great, thanks.

  164. Kev

    We can start planning the tests for next time as soon as we're done here, if you want.

  165. MattJ

    We should set up more tricky DNS situations next time

  166. Zash

    mixed A and SRV?

  167. MattJ

    Like testing correct SRV target selection

  168. Kev

    That's hard, but sure.

  169. MattJ

    and IDNA

  170. Zash

    and make a SRV query return a CNAME ?

  171. MattJ

    Kev, it's not really hard, is it?

  172. Kev

    Zash: That's not an interesting test, I think.

  173. Kev

    Something working against invalid input isn't as interesting as it failing against valid :)

  174. fippo

    zash: I wanted to test that, but bind won't do it anymore

  175. Kev

    Or am I missing a security consideration why that's worth testing?

  176. Zash

    Iduno, but I have a CNAME catch-all thingy :)

  177. Zash

    But IDN and IPv6

  178. Kev

    Both worth testing.

  179. Dave Cridland

    Zash, IDN with X.509 is particularly interesting. I know we fail that one right now.

  180. fippo

    IDN + x509 sounds like fun!

  181. Zash

    !ping nödåtgärd.se

  182. MattJ

    +1

  183. Zash

    aw

  184. Kanchil

    Zash: Pong from nödåtgärd.se in 7.021 seconds

  185. MattJ

    :D

  186. MattJ

    UTF8 processing overhead? :)

  187. Kev

    BTW Zash / MattJ, I upgraded Kanchil

  188. Zash

    !version

  189. Kanchil

    Zash: Kanchil is running Riddim version alpha on an unknown platform

  190. Zash

    Kev: You say?

  191. MattJ

    I guess I should go and fix verse, riddim and clix to squish with the latest Prosody repo

  192. Zash

    :)

  193. Zash

    Also, latest says "I am running .."

  194. Kev

    Zash: Well, I should have updated.

  195. Kev

    I certainly tried to.

  196. MattJ

    did you hg pull -u? :)

  197. MattJ

    I think git updates the working copy by default when you pull

  198. MattJ

    hg doesn't

  199. Kev

    Gotcha.

  200. Zash

    MattJ: git, true

  201. MattJ

    hg up

  202. Zash

    hg pull says you should do hg up iirc

  203. MattJ

    Bouncing prosody8

  204. MattJ

    fippo, have you broken -db and -dwd? :)

  205. MattJ

    I can't see the stream header you send, but Prosody is rejecting your stream:features, with "unbound prefix"

  206. fippo

    mattj: -db is down and I just changed sth in -dwd (which is mostly for dave)

  207. MattJ

    Apt

  208. Zash wants a SRV aware netcat :/

  209. MattJ

    Zash, "clix raw"

  210. MattJ

    kind of

  211. fippo

    mattj: -dwd should work again

  212. fippo

    (not sure how it behaves in that test though :-)

  213. Zash

    MattJ: ohrly

  214. MattJ

    Zash, it does XMPP auth for you, then acts as telnet

  215. Zash

    MattJ: But, for testing non-xmpp things :)

  216. MattJ

    How would SRV help then? :)

  217. Dave Cridland

    (14:32:34) Send (217) <?xml version='1.0'?><stream:stream xmlns='jabber:server' xmlns:db='jabber:server:dialback' xmlns:stream='http://etherx.jabber.org/streams' to='psyced-dwd.xmpptest.com' from='puncture.dave.cridland.net' version='1.0'> (14:32:34) Recv (222) <stream:features><starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls'/><switch xmlns='http://switch.psyced.org'><scheme>psyc</scheme></switch><dialback xmlns='urn:xmpp:features:dialback'><errors/></dialback></stream:features> (14:32:34) Send (102) <stream:error><bad-format xmlns='urn:ietf:params:xml:ns:xmpp-streams'/></stream:error></stream:stream>

  218. fippo

    dave: fixed already

  219. Dave Cridland

    fippo, No, still like that.

  220. MattJ

    +1

  221. fippo

    ah... restarted the wrong server

  222. MattJ

    Heh

  223. MattJ

    I'm terrified I'm going to bounce prosody.im by mistake before the day is out

  224. Dave Cridland

    MattJ, Yeah, I'm glad I'm far, far away from isode.com.

  225. MattJ

    Bouncing prosody8, this time with mod_dialback unloaded just to make sure :)

  226. MattJ

    Dave Cridland, M-Link does dialback even with EXTERNAL?

  227. Dave Cridland

    MattJ, I just noticed that. :-)

  228. Dave Cridland

    MattJ, But the answer si that M-Link doesn't really overly care about how it authenticates to you, or indeed how you want to authenticate to it - it'll just care that it can authenticate you.

  229. MattJ

    You mean as long as I have a valid cert I could say <message><body>Hey, I'm prosody.im</body></message>? :)

  230. MattJ

    if I remove dialback from the stream header will it use EXTERNAL?

  231. Dave Cridland

    It will. But I've swapped around the processing order for features, so I'll update it shortly to use EXTERNAL.

  232. MattJ

    ok

  233. MattJ

    There's something up

  234. MattJ

    I'm not getting any pongs for my pings to mlinktrunk

  235. MattJ

    but Prosody reckons both s2s streams are up and running

  236. Dave Cridland

    I just bounced it, actually.

  237. Dave Cridland

    Now supporting a (very weakly tested) XEP-0288 Bidi.

  238. Dave Cridland

    As well as (I think) preferring to do EXTERNAL over dialback. Although that's obviously slower, so perhaps I should switch back.

  239. MattJ

    Eh? :)

  240. Dave Cridland

    EXTERNAL has more round-trips.

  241. MattJ

    Are you sure?

  242. Dave Cridland

    MattJ, With d-w-d, then yes.

  243. MattJ

    Cheat

  244. Dave Cridland

    MattJ, You say "cheat", I say "optimized".

  245. MattJ

    I'm still getting no pong

  246. MattJ

    Maybe it's my fault, same with ejabberd

  247. fippo

    I still get pongs from trunk

  248. Dave Cridland

    Just bouncing it to clear everything, then I'll try.

  249. Dave Cridland

    OK, something really odd going on... I've got to do the school run again, but we'll figure it out when I get back.

  250. MattJ

    k

  251. MattJ

    The world falls apart without dialback :)

  252. fippo

    it doesn't without EXTERNAL :-)

  253. MattJ

    Quite :)

  254. fippo

    so the path is clear

  255. MattJ

    Plus d-w-d should be trivial to implement

  256. fippo

    btw: if you're bored you could implement bidi

  257. MattJ

    I'd like to get 198 working first

  258. MattJ

    then I shall

  259. Dave Cridland

    MattJ, Most of my bidi implementation time was thinking "But that can't be all it is..."

  260. MattJ

    Dave Cridland, I do think it should be really easy to implement, especially in Prosody

  261. MattJ

    all our code sends stanzas to the the incoming s2s stream

  262. MattJ

    just Prosody redirects it at the last minute

  263. MattJ

    bidi would just turn off the redirection

  264. fippo

    dave: same for me

  265. fippo

    there is a tricky thing about not sending db:verify on the same connection where I am not sure if this works as expected - but you should not have that problem

  266. fippo

    since you're doing dialback-3

  267. Dave Cridland

    OK, I think I've fixed that issue.

  268. Dave Cridland

    MattJ, You should be able to ping me now. Turns out that once it'd done the stream restart, it basically sat waiting, instead of deciding the stream was setup.

  269. MattJ

    Dialback is enabled again so I can test 198

  270. MattJ

    it should be enabling on outgoing streams now

  271. Dave Cridland

    MattJ, I'm doing EXTERNAL again, or should be.

  272. Dave Cridland

    Just bouncing that server yet again - I've been meaning to apply a patch that should stop an irritating crash.

  273. Dave Cridland

    Oh, gosh, that's odd. :-)

  274. Dave Cridland

    So, I'm now doing EXTERNAL again, and actually carrying on, only I'm *also* doing dialback. Whoops. :-)

  275. MattJ

    :)

  276. Dave Cridland

    *sigh* I'm still doing that. Which is very annoying. But on the plus side, you're still not enabling 198, so I don't feel quite so bad.

  277. stpeter

    heh

  278. fippo

    dave: the solution is to remove any EXTERNAL related code :-)

  279. Dave Cridland

    fippo, I know, I know. I'll make it an option, soon enough.

  280. Dave Cridland

    fippo, But the standard says we must, so we must.

  281. stpeter prepares to submit revised versions of 3920bis and xmpp-address

  282. steve.kille

    Dave Cridland/fippo - sounds like the standards need fixing

  283. steve.kille

    We have way too many handshakes as it, and getting rid of the SASL handshakes for single connection secure S2S sounds like a senisilbe standardization objective

  284. steve.kille

    stpeter: what do you think?

  285. Dave Cridland

    steve.kille, Not so much fixing, as we need to document d-w-d properly, and ensure that it's perceived as acceptable.

  286. stpeter

    I think I don't want to make more changes to 3920bis at this moment for feature of introducing too many perturbations late in the process :)

  287. steve.kille

    Althought helpful now, I am not sure the d-w-d name will be helpful long term

  288. Dave Cridland

    Ah, success. Now only authenticating once.

  289. stpeter

    but I suggest that we complete more interop testing over the next 12 months, submit an implementation report based on the feature set in 3920bis, then rev the document again (hopefully after we have the address format fixed)

  290. Dave Cridland

    MattJ, So, I'm now fixed. Are you waiting until you've got a resource bound before enabling 198? That might be problematic on S2S.

  291. steve.kille

    stpeter: sounds like a reasonable plan to me

  292. MattJ

    Dave Cridland, hmm, I don't think so - hold

  293. stpeter

    there are enough changes between 3920 and 3920bis that I think continued interop testing and deployment feedback will be productive

  294. stpeter

    while we work in parallel on those thorny internationalization issues

  295. MattJ

    stpeter, I suspect future versions might (reference a) document about dialback-without-dialback :)

  296. steve.kille

    can we have a new name for it?

  297. MattJ

    dwd is good, isn't it Dave? :)

  298. stpeter

    MattJ: that would be good, I think -- based on what little I've read about it, which is only Dave's blog post

  299. MattJ

    I don't think anyone else has had a XEP named after them before

  300. fippo

    dave: actually, what would happen if I tried to do EXTERNAL twice on a single stream (i.e. multiple authentications)?

  301. MattJ

    I need to figure out what protocol mattj is an acronym for

  302. stpeter has been tempted to define an extension whose acronym is "PSA" :)

  303. MattJ

    !xep 198

  304. Kanchil

    MattJ: XEP-0198: Stream Management is Standards Track (Draft, 2010-03-05) See: http://xmpp.org/extensions/xep-0198.html

  305. MattJ

    Dave Cridland, missing xmlns declaration - looks a lot healthier now

  306. Dave Cridland

    fippo, We'd drop the stream.

  307. Dave Cridland

    MattJ, Ew.... I've just noticed I'm requesting acks even when I'm only writing to the stream to ack... That's nasty. I'll fix that.

  308. fippo

    Dave: damn - but that would only allow to negotiate multiple source domains anyway

  309. MattJ

    Hmm

  310. MattJ

    Someone doing piggybacking asking for another remote domain - I'm not sure I'd considered that

  311. fippo

    mattj: "target piggybacking"? haven't seen that outside my lab

  312. Dave Cridland

    Oops. My experiment with source piggybacking is not going all that well.

  313. Dave Cridland

    I seem to be piggybacking my MUC domain around 6 times a second.

  314. Dave Cridland

    Does that make it the authentication stronger?

  315. MattJ

    :)

  316. MattJ

    Did you get my responses to your 198 message(s)?

  317. Dave Cridland

    MattJ, Yes, but they came through to my Gajim, of course.

  318. MattJ

    Dave Cridland, so all is well?

  319. badlop is halfway implementing cert verification in ejabberd, and hopes the (notls|expiredcert|mismatchcert|revokedcert|selfcert).xmpptest.com servers will be up a pair of days more

  320. fippo

    badlop: selfsigned should be easy to find on public servers - CN=ejabberd is the most common certificate :-)

  321. MattJ

    :)

  322. MattJ

    Feel free to shoot on sight the admin of any server with CN="Prosody Example Certificate", that's expired, and self-signed

  323. MattJ

    except for me

  324. Zash

    Hah

  325. MattJ

    Wait... ejabberd doesn't do EXTERNAL already?

  326. MattJ

    I was sure it did

  327. fippo

    no, it gets offered external but does not do use it yet

  328. Dave Cridland

    MattJ, I thought it did too - I'm sure I remember testing mine against jabber.org when it was ejabberd.

  329. MattJ

    There was someone in jabber@ once

  330. MattJ

    They ran a public server using ejabberd

  331. Dave Cridland

    Your poetry is useless. Doesn't even rhyme.

  332. MattJ

    They were doing some testing on their laptop, and span up a test instance with their user db

  333. MattJ

    behind a firewalled NAT, they claimed their ejabberd instance had sent out unsubscribes on behalf of their domain

  334. MattJ

    they had the certs configured on their laptop, we put it down to EXTERNAL

  335. fippo

    mattj: you still want to update the wiki

  336. MattJ

    Mmm, yes

  337. MattJ

    I didn't conclude my testing because of the number of issues I had when I stopped advertising dialback :)

  338. MattJ

    Maybe I just shouldn't do that

  339. MattJ

    Heh

  340. fippo

    yeah... I wonder if I should have failed ejabberd actually...

  341. fippo

    but it was worthy enough to get offered external

  342. fippo

    I guess that is one of the points we should specify more cleary next time

  343. fippo wonders if we will have to test xep-0238

  344. MattJ

    Any 1.0 server capable of TLS can be offered external

  345. MattJ

    and TLS was tested yesterday, no? :)

  346. fippo

    well... xep 0178 has this "only offer it if it will succeed" rule

  347. MattJ

    Sure, but that's not a function of the implementation, but of the cert it uses

  348. fippo

    which is good because if the peer attempts external and this fails this will increase roundtrips

  349. Dave Cridland

    fippo, Right, I have a slightly better variant on my source-piggybacking attempt - can I point it at (one of the) psyced-* servers to test?