jdev - 2022-02-24


  1. moparisthebest

    does anyone know of a live server I can find a /.well-known/posh/xmpp-client.json or /.well-known/posh/xmpp-server.json on ?

  2. jonas’

    moparisthebest, anything hosted by conversations.im, I think

  3. jonas’

    though apparently not *anything*

  4. jonas’

    but some things

  5. jonas’

    the one (private) domain I knew of did not have it

  6. MattJ

    moparisthebest, https://badxmpp.eu/ to the rescue

  7. MattJ

    Specifically posh.badxmpp.eu

  8. moparisthebest

    MattJ: thanks! Praise zash as usual :)

  9. Zash

    🙂

  10. moparisthebest

    jonas’: that was my first stop, but none on conversations.im itself and I don't know anything hosted by it offhand

  11. MattJ

    Also note that you probably won't find xmpp-server.json anywhere in the wild

  12. MattJ

    We've discussed just using xmpp-client for s2s :)

  13. moparisthebest

    MattJ: like just combining them both and allowing any match?

  14. MattJ

    Probably

  15. moparisthebest

    I honestly can't think of a problem with that

  16. MattJ

    I think we should ensure implementations never let POSH override DANE or better mechanisms. In particular, there really ought to be a secure way to opt out of POSH, but I can't think of anything except that

  17. MattJ

    e.g. I would rather if my web hosting provider didn't have the ability to compromise my XMPP service with the presence of a file or two

  18. moparisthebest

    That makes sense, the downside of course is that hardly anyone does DNSSEC

  19. moparisthebest

    MattJ: DANE obviously ranks above all, where does POSH rank against CAs though?

  20. moparisthebest

    Though... Now that I'm thinking about it, I'm not positive it's more common for people to host their own DNSSEC than HTTPS ?

  21. moparisthebest

    As in it'd be more likely for your DNS host to compromise your XMPP server than your web hosting provider? Maybe?

  22. Kev

    POSH is roughly equivalent to CA (if LE) isn't it?

  23. moparisthebest

    Kev: I can't immediately come up with a convincing argument as to how they are different yea

  24. moparisthebest

    I guess if your DNS host is compromised it's game over anyway, as they can not only set DANE but also get certificates and host your https and XMPP... So "evil web host" is an additional attack vector on top of that existing one

  25. Kev

    Ah, you're right. CA is better than POSH even when LE.

  26. moparisthebest

    Better or the same?

  27. moparisthebest

    Will if you can get a ca cert there's no need to do posh I guess? So posh is an additional attack vector on top of an existing one? *Unless* your web host that hosts posh is protected with Dane??????

  28. moparisthebest

    My head hurts

  29. Kev

    If you use POSH there's one extra machine (potentially) that compromising would affect the trust chain.

  30. Kev

    (And if it's not an extra machine, you may as well not use POSH)

  31. moparisthebest

    Yea, unless DANE

  32. Kev

    Even if DANE, no?

  33. moparisthebest

    Hmm... Need more coffee

  34. Kev

    Assuming you mean DANE of the POSH host (because if you DANE on XMPP you don't need it on the POSH host).

  35. Kev

    Because if the POSH host is compromised (host itself, not DNS), it's an extra point that can lie, despite having valid certs.

  36. moparisthebest

    Thinking about it, if you can do Dane why have POSH

  37. Kev

    If you can DANE on the XMPP host, yes, POSH doesn't seem to do anything (to me).

  38. moparisthebest

    A Dane capable client wouldn't check Dane on posh because it would never get there

  39. moparisthebest

    So absent Dane, you basically have to trust CA *or* POSH

  40. moparisthebest

    There's no secure way to say "please don't trust POSH" other than DANE

  41. moparisthebest

    And POSH isn't the only way your https host can compromise your XMPP server, websockets/Bosh can do it too

  42. Kev

    If you expose those, yes.

  43. moparisthebest

    No, even if you don't expose them right?

  44. MattJ

    No, an attacker who has access to your web server can advertise any BOSH/WS URLs and intercept your XMPP traffic using those mechanisms (and that discovery mechanism)

  45. moparisthebest

    ^

  46. Zash

    DANE > (POSH if some conditions else PKIX) or somesuch

  47. moparisthebest

    would any of you care to provide feedback on my very related adding things to xep-156 host-meta proposal in council@ ? :)

  48. moparisthebest

    actually I'm not sure order really matters, I mean, you can apply the order for outbound connections, but for incoming s2s you basically just have to apply "any of DANE or CA or POSH goes" right ?

  49. moparisthebest

    the end result being your webhost can make outgoing S2S connections on your behalf 100% of the time ?