-
meson
singpolyma: certwatch only tries to connect to the ipv6 address for me, which isn't working. Could it be changed so that it tries both ipv4 and ipv6 and give appropriate reports/errors accordingly?
-
Zash
Eyeballs of happyness?
-
bodqhrohro
Zash: yes.
-
lovetox
i dont see any limitations in the pubsub spec which type a pubsub event needs to have
-
lovetox
or did i miss it? So a pubsub event could have "chat" or "groupchat"
-
jonas’
I think it's configurable per node
-
jonas’
<field var='pubsub#notification_type' type='list-single' label='Specify the delivery style for notifications'> <option label='Messages of type normal'> <value>normal</value> </option> <option label='Messages of type headline'> <value>headline</value> </option> </field>
-
jonas’
but according to the form spec only to normal or headline
-
lovetox
thats just an example though is it?
-
lovetox
its not actually mentioned somewhere which types are allowed
-
jonas’
no, that's the registered form
-
jonas’
I assume that's normative
-
lovetox
ah i see
-
lovetox
great
-
mac
do i need otp bot
-
mac
i need help
-
singpolyma
meson: it tres both and fails if either fails
-
singpolyma
> or did i miss it? So a pubsub event could have "chat" or "groupchat" Groupchat would be pretty odd, but chat is a normal option for some fallback moduler✎ ↺ -
singpolyma
> or did i miss it? So a pubsub event could have "chat" or "groupchat" Groupchat would be pretty odd, but chat is a normal option for some fallback modules ✏ ↺
-
meson
singpolyma: Yeah I noticed that :-/
-
meson
singpolyma, I have now removed the redundant AAAA record as I don't use it currently as a workaround
-
singpolyma
Yeah, if the v6 is broken that is the correct solution
-
meson
Alright, thanks for your service :)
-
lovetox
do you think i can get away as a client in todays ecosystem with simply not supporting START TLS?
-
Zash
Based on https://compliance.conversations.im/test/xep0368/ I'd say no.
-
Zash
Especially when that's a self-selected sample of servers from people who are more likely to want get the 100% score
-
Zash
So one might venture a guess that the real figure is lower
-
singpolyma
direct tls still isn't default anywhere so I expect most small servers don't have it as well, for example most snikket instances probably don't set the SRV record for themselves
-
Zash
Tho you could do the browser way and slap scary warnings on it and gradually phase it out, but meh.
-
pep.
Start removing the green check for start tls?
-
pep.
fwiw I still haven't bothered on my own setup..
-
lovetox
i my mind, if anybody is half serious about operating an xmpp server he needs to adpat the default config
-
lovetox
for example i doubt server have per default websocket support, which means if the operator does not add it, webclients will not be able to use it
-
Zash
Haha, ports 5223 and 5270 are registered to other things
-
lovetox
i think server operators dont add direct tls, maybe because its simply not necessary for anything ..
-
lovetox
nothing breaks if you dont offer direct tls
-
moparisthebest
443 should be the default for direct TLS anyway
-
moparisthebest
Multiplexing is what ALPN is for
-
Zash
No
-
singpolyma
> for example i doubt server have per default websocket support, which means if the operator does not add it, webclients will not be able to use it IMO most servers should not have nonstandard stuff like websockets added, but maybe that's just my grumpiness about websocket protocol showing ;)
-
pep.
singpolyma, I think it's actually useful, so that people can use web clients that do 0156
-
lovetox
whats non standard about it?
-
moparisthebest
singpolyma: I about got webtransport integrated last night but both available crates are missing something so it'll be a bit longer :)
-
singpolyma
> whats non standard about it? It only exists for browsers, no other client would eve want it, it doesn't discover over DNS, etc etc ↺
-
singpolyma
moparisthebest: what's missing?
-
moparisthebest
I'll spec clients and servers over that soon and everything can talk http3 over udp port 443 including browsers lol
-
singpolyma
I wouldn't do it on 443 but I know you want everything there so obviously you can if needed ;)
-
moparisthebest
The most mature one won't let me have access to the certs to do sasl external
-
moparisthebest
The other had something in the way but it was late, I'll look again soon
-
singpolyma
Can't your existing quic stuff handle that part?
-
moparisthebest
It didn't let me have access to any quic internals was the problem
-
pep.
singpolyma, actually gajim does/did WS
-
moparisthebest
gajim does WS last I looked, that's what I used to test xmpp-proxy's impl
-
singpolyma
> It didn't let me have access to any quic internals was the problem Oh, it tried to do everything? Yeah, ideally you just need a shim to do the handshake then transition to the regular quic codepath ↺
-
moparisthebest
Yes, the other one looked more like that, gonna poke at it next, was much simpler
-
moparisthebest
Oh right I remember now, it did just do the handshake over QUIC, but only supports doing it or not, when I want to sniff to support both webtransport and regular quic on the same port
-
moparisthebest
The way I support starttls, direct TLS, and websocket on the same TCP port
-
singpolyma
There is no regular quic anymore, this is the way now ;)
-
moparisthebest
That's solvable I think, but only by touching the library