-
moparisthebest
so you lose pinned keys and secure delegation, roll your own TXT record parser, make many more requests that are slower, and gain... what ?
-
Cynthia
you're not gonna connect to the same XMPP server 5 different times
-
moparisthebest
huh
-
Cynthia
and yes, rolling your own TXT record parser is far better than the overhead of HTTPS+JSON
-
Cynthia
a person would make ONE TXT record request, for one connection (in any protocol) they make to a XMPP server
-
Cynthia
and will also cache the keys too
-
Cynthia
well, their DNS resolver caches it, but still
-
moparisthebest
you still must make the DNS request over an encrypted connection you realize ?
-
moparisthebest
so you are already doing HTTPS or an identical-cost equivalent
-
moparisthebest
but without the benefit of secure delegation or pinned keys
-
moparisthebest
so your last argument seems to rely on parsing DNS records being easier or cheaper than parsing json... and lol god no
-
moparisthebest
I wrote a DNS parser once: https://github.com/moparisthebest/jDnsProxy/blob/master/jDnsProxy/src/main/java/com/moparisthebest/dns/dto/Packet.java I'm still trying to recover
-
Nyx
meet in the middle what if JSON over TXT records
-
moparisthebest
combine that with the practical limit of TXT records being ~400 characters etc and they are a total non-starter to carry the needed info
-
Cynthia
moparisthebest: monero designed openalias to tie monero addresses to domains, and you'll be surprised that they didn't store a JSON file in a HTTPS server
-
Cynthia
they used TXT records in DNS
-
Cynthia
also btw, good thing about storing it in DNS, is that it isn't dependent on the HTTPS server existing
-
Cynthia
what if the server shuts down or is behind some sort of wall?
-
Cynthia
good luck trying to get your info✎ -
Cynthia
good luck trying to get your key info ✏
-
Cynthia
in fact you are making yet another point of failure in this system, since an attacker can DDoS the server that is hosting your host-meta.json file
-
Cynthia
and servers will immediately downgrade to CA-enforced non-ECH TLS connections✎ -
Cynthia
and servers/clients will immediately downgrade to CA-enforced non-ECH TLS connections ✏
-
Cynthia
DNS records propagate to other DNS services, it is near impossible to try to DDoS DNS records to impede ECH connections
-
moparisthebest
huh ? it has a TTL and an attacker can also just DDoS the XMPP server lol
-
Cynthia
but you are getting rid of this one benefit in favor of some centralized HTTPS server
-
moparisthebest
it has nothing to do with ECH, ECH is just one of a dozen things you need to connect to an XMPP server, none of which will fit in DNS
-
Cynthia
> huh ? it has a TTL and an attacker can also just DDoS the XMPP server lol state actors would greatly benefit from DDoSing your host-meta.json file instead
-
moparisthebest
centralized https server ? I have no idea where you are pulling this
-
Cynthia
where do you think they'll fetch the file from?
-
Cynthia
thin air?
-
moparisthebest
certainly not a centralized https server lol
-
moparisthebest
100% of XMPP servers already have an https server for http upload
-
Cynthia
i don't think you have the right definition of centralization for this :P
-
Cynthia
in DNS, records propagate across other servers
-
moparisthebest
one of us doesn't lol
-
Cynthia
in your design, the ECH record is stored in one server
-
Cynthia
which is the XMPP server's HTTPS server
-
Cynthia
that is centralization
-
moparisthebest
lol there are so many things wrong with what you said I don't even know where to start
-
Cynthia
begin :P
-
moparisthebest
DNS records do not "propagate across other servers" ... you have usually 1 or 2 DNS servers where all your records live... "state actors" can trivially ddos those and now no one can resolve your domain
-
Cynthia
the only way i'll not call it centralization, is if other XMPP servers choose to share ECH keys of your XMPP server
-
Cynthia
moparisthebest: but there is more collateral damage to DDoSing a DNS server than DDoSing a HTTPS server
-
Cynthia
since it'll include records for thousands of domains within the same registra✎ -
Cynthia
since it'll include records for thousands of domains within the same registrar ✏
-
moparisthebest
you can equally have 1 or 2 (or unlimited) HTTPS servers... it doesn't really matter because if a state actor wants to stop you from connecting to your XMPP server they'll just ddos that no ?
-
moparisthebest
what ?
-
Cynthia
i'm not saying they want to stop you from connecting to your xMPP server
-
moparisthebest
I run my own DNS server
-
Cynthia
i'm saying to prevent ECH connections
-
moparisthebest
oh! you think blocking getting the ECH key means connections will be made without ECH in the clear ???? that's... not how it works
-
moparisthebest
read the ECH RFC
-
Cynthia
you do not understand what i mean
-
Cynthia
they can easily identify connections to a specific server if they prevent people from accessing the ECH keys :P
-
Cynthia
not see what's inside the traffic
-
Cynthia
but see what SNI is used
-
Cynthia
and the TLS fingerprint of the client
-
Cynthia
say if clients implement this XEP, what will they do if they literally cannot access the JSON file
-
Cynthia
if it's either behind a wall, or the HTTPS server is under maintenance
-
Cynthia
will they just stop connecting?
-
Cynthia
will new C2S/S2S connections completely halt until you bring your HTTPS server back up?
-
Cynthia
anyway i disagree with this experimental XEP, maybe we should stop discussing it
-
moparisthebest
> but see what SNI is used this is your misunderstanding... an ECH-capable client will never send plaintext SNI ↺
-
moparisthebest
regardless of whether it can get ECH keys or not, or even if they exist or not
-
moparisthebest
> anyway i disagree with this experimental XEP, maybe we should stop discussing it that's perfectly fine, you or anyone else is free to do better ↺
-
moparisthebest
if the connection methods can't be reached the client will used a cached copy or fallbacks, same as anything else, nothing special because https
-
Schimon
Good day. I have asked this question over the mailing-list and I did not receive an answer as of yet, so I ask here also. I am interested to know of a valid URI for XEP-0248: PubSub Collection Nodes. ``` xmpp:comments.hostname?;node=node_collection/node_leaf;item=item_id ``` Would this be a valid URI?
-
Schimon
I would also appreciate your comments concerning to, which would be helpful for Libervia and Movim, as it is for Rivista. https://mail.jabber.org/hyperkitty/list/standards@xmpp.org/thread/VXGZYDMD7OZSWDX6WGUMF5VKTTSQ7YQ6/ *Navigation instructions for Atom Over XMPP (XEP-0277 and XEP-0472)*✎ -
Schimon
I would also appreciate your comments concerning to navigational directives, which would be helpful for Libervia and Movim, as it is for Rivista. https://mail.jabber.org/hyperkitty/list/standards@xmpp.org/thread/VXGZYDMD7OZSWDX6WGUMF5VKTTSQ7YQ6/ *Navigation instructions for Atom Over XMPP (XEP-0277 and XEP-0472)* ✏