jdev - 2025-09-05


  1. moparisthebest

    so you lose pinned keys and secure delegation, roll your own TXT record parser, make many more requests that are slower, and gain... what ?

  2. Cynthia

    you're not gonna connect to the same XMPP server 5 different times

  3. moparisthebest

    huh

  4. Cynthia

    and yes, rolling your own TXT record parser is far better than the overhead of HTTPS+JSON

  5. Cynthia

    a person would make ONE TXT record request, for one connection (in any protocol) they make to a XMPP server

  6. Cynthia

    and will also cache the keys too

  7. Cynthia

    well, their DNS resolver caches it, but still

  8. moparisthebest

    you still must make the DNS request over an encrypted connection you realize ?

  9. moparisthebest

    so you are already doing HTTPS or an identical-cost equivalent

  10. moparisthebest

    but without the benefit of secure delegation or pinned keys

  11. moparisthebest

    so your last argument seems to rely on parsing DNS records being easier or cheaper than parsing json... and lol god no

  12. moparisthebest

    I wrote a DNS parser once: https://github.com/moparisthebest/jDnsProxy/blob/master/jDnsProxy/src/main/java/com/moparisthebest/dns/dto/Packet.java I'm still trying to recover

  13. Nyx

    meet in the middle what if JSON over TXT records

  14. moparisthebest

    combine that with the practical limit of TXT records being ~400 characters etc and they are a total non-starter to carry the needed info

  15. Cynthia

    moparisthebest: monero designed openalias to tie monero addresses to domains, and you'll be surprised that they didn't store a JSON file in a HTTPS server

  16. Cynthia

    they used TXT records in DNS

  17. Cynthia

    also btw, good thing about storing it in DNS, is that it isn't dependent on the HTTPS server existing

  18. Cynthia

    what if the server shuts down or is behind some sort of wall?

  19. Cynthia

    good luck trying to get your info

  20. Cynthia

    good luck trying to get your key info

  21. Cynthia

    in fact you are making yet another point of failure in this system, since an attacker can DDoS the server that is hosting your host-meta.json file

  22. Cynthia

    and servers will immediately downgrade to CA-enforced non-ECH TLS connections

  23. Cynthia

    and servers/clients will immediately downgrade to CA-enforced non-ECH TLS connections

  24. Cynthia

    DNS records propagate to other DNS services, it is near impossible to try to DDoS DNS records to impede ECH connections

  25. moparisthebest

    huh ? it has a TTL and an attacker can also just DDoS the XMPP server lol

  26. Cynthia

    but you are getting rid of this one benefit in favor of some centralized HTTPS server

  27. moparisthebest

    it has nothing to do with ECH, ECH is just one of a dozen things you need to connect to an XMPP server, none of which will fit in DNS

  28. Cynthia

    > huh ? it has a TTL and an attacker can also just DDoS the XMPP server lol state actors would greatly benefit from DDoSing your host-meta.json file instead

  29. moparisthebest

    centralized https server ? I have no idea where you are pulling this

  30. Cynthia

    where do you think they'll fetch the file from?

  31. Cynthia

    thin air?

  32. moparisthebest

    certainly not a centralized https server lol

  33. moparisthebest

    100% of XMPP servers already have an https server for http upload

  34. Cynthia

    i don't think you have the right definition of centralization for this :P

  35. Cynthia

    in DNS, records propagate across other servers

  36. moparisthebest

    one of us doesn't lol

  37. Cynthia

    in your design, the ECH record is stored in one server

  38. Cynthia

    which is the XMPP server's HTTPS server

  39. Cynthia

    that is centralization

  40. moparisthebest

    lol there are so many things wrong with what you said I don't even know where to start

  41. Cynthia

    begin :P

  42. moparisthebest

    DNS records do not "propagate across other servers" ... you have usually 1 or 2 DNS servers where all your records live... "state actors" can trivially ddos those and now no one can resolve your domain

  43. Cynthia

    the only way i'll not call it centralization, is if other XMPP servers choose to share ECH keys of your XMPP server

  44. Cynthia

    moparisthebest: but there is more collateral damage to DDoSing a DNS server than DDoSing a HTTPS server

  45. Cynthia

    since it'll include records for thousands of domains within the same registra

  46. Cynthia

    since it'll include records for thousands of domains within the same registrar

  47. moparisthebest

    you can equally have 1 or 2 (or unlimited) HTTPS servers... it doesn't really matter because if a state actor wants to stop you from connecting to your XMPP server they'll just ddos that no ?

  48. moparisthebest

    what ?

  49. Cynthia

    i'm not saying they want to stop you from connecting to your xMPP server

  50. moparisthebest

    I run my own DNS server

  51. Cynthia

    i'm saying to prevent ECH connections

  52. moparisthebest

    oh! you think blocking getting the ECH key means connections will be made without ECH in the clear ???? that's... not how it works

  53. moparisthebest

    read the ECH RFC

  54. Cynthia

    you do not understand what i mean

  55. Cynthia

    they can easily identify connections to a specific server if they prevent people from accessing the ECH keys :P

  56. Cynthia

    not see what's inside the traffic

  57. Cynthia

    but see what SNI is used

  58. Cynthia

    and the TLS fingerprint of the client

  59. Cynthia

    say if clients implement this XEP, what will they do if they literally cannot access the JSON file

  60. Cynthia

    if it's either behind a wall, or the HTTPS server is under maintenance

  61. Cynthia

    will they just stop connecting?

  62. Cynthia

    will new C2S/S2S connections completely halt until you bring your HTTPS server back up?

  63. Cynthia

    anyway i disagree with this experimental XEP, maybe we should stop discussing it

  64. moparisthebest

    > but see what SNI is used this is your misunderstanding... an ECH-capable client will never send plaintext SNI

  65. moparisthebest

    regardless of whether it can get ECH keys or not, or even if they exist or not

  66. moparisthebest

    > anyway i disagree with this experimental XEP, maybe we should stop discussing it that's perfectly fine, you or anyone else is free to do better

  67. moparisthebest

    if the connection methods can't be reached the client will used a cached copy or fallbacks, same as anything else, nothing special because https

  68. Schimon

    Good day. I have asked this question over the mailing-list and I did not receive an answer as of yet, so I ask here also. I am interested to know of a valid URI for XEP-0248: PubSub Collection Nodes. ``` xmpp:comments.hostname?;node=node_collection/node_leaf;item=item_id ``` Would this be a valid URI?

  69. Schimon

    I would also appreciate your comments concerning to, which would be helpful for Libervia and Movim, as it is for Rivista. https://mail.jabber.org/hyperkitty/list/standards@xmpp.org/thread/VXGZYDMD7OZSWDX6WGUMF5VKTTSQ7YQ6/ *Navigation instructions for Atom Over XMPP (XEP-0277 and XEP-0472)*

  70. Schimon

    I would also appreciate your comments concerning to navigational directives, which would be helpful for Libervia and Movim, as it is for Rivista. https://mail.jabber.org/hyperkitty/list/standards@xmpp.org/thread/VXGZYDMD7OZSWDX6WGUMF5VKTTSQ7YQ6/ *Navigation instructions for Atom Over XMPP (XEP-0277 and XEP-0472)*