MarandaFeb 22 17:11:03 lightwitch.org:dialback debug sending dialback error (remote-server-not-found) to exploit.im...
Feb 22 17:11:03 s2sout57205a0 debug sending: <db:verify id='5867cfae-9ee4-4e8c-8acf-8bb5e4a845d6' type='error' to='exploit.im' from='lightwitch.org'>
Feb 22 17:11:03 s2sout57205a0 debug Received[s2sout]: <verify type='invalid' to='lightwitch.org' from='exploit.im' id='5867cfae-9ee4-4e8c-8acf-8bb5e4a845d6' xmlns='jabber:server:d
ialback'>
Feb 22 17:11:03 lightwitch.org:dialback debug sending dialback error (remote-server-not-found) to exploit.im...
Feb 22 17:11:03 s2sout57205a0 debug sending: <db:verify id='5867cfae-9ee4-4e8c-8acf-8bb5e4a845d6' type='error' to='exploit.im' from='lightwitch.org'>
Feb 22 17:11:03 s2sin238f160 debug Received[s2sin]: <presence id='dummy_#61064#-1964' to='biggasmurf@lightwitch.org' from='volvob3a@jabber.hasufell.com/Adium'>
Feb 22 17:11:03 lightwitch.org:stanza_optimizations debug queuing presence for biggasmurf@lightwitch.org/Xabber_9i3H4Gcj: <presence id='dummy_#61064#-1964' to='biggasmurf@lightw
itch.org' from='volvob3a@jabber.hasufell.com/Adium'>
Feb 22 17:11:03 c2s2a95540 debug Received[c2s]: <iq id='37deb5f067bf39d1' type='get'>
Feb 22 17:11:03 s2sout57205a0 debug Received[s2sout]: <verify type='invalid' to='lightwitch.org' from='exploit.im' id='5867cfae-9ee4-4e8c-8acf-8bb5e4a845d6' xmlns='jabber:server:d
ialback'>
Feb 22 17:11:03 lightwitch.org:dialback debug sending dialback error (remote-server-not-found) to exploit.im...
Feb 22 17:11:03 s2sout57205a0 debug sending: <db:verify id='5867cfae-9ee4-4e8c-8acf-8bb5e4a845d6' type='error' to='exploit.im' from='lightwitch.org'>
Feb 22 17:11:03 s2sout57205a0 debug Received[s2sout]: <verify type='invalid' to='lightwitch.org' from='exploit.im' id='5867cfae-9ee4-4e8c-8acf-8bb5e4a845d6' xmlns='jabber:server:d
ialback'>
Feb 22 17:11:03 lightwitch.org:dialback debug sending dialback error (remote-server-not-found) to exploit.im...
Feb 22 17:11:03 s2sout57205a0 debug sending: <db:verify id='5867cfae-9ee4-4e8c-8acf-8bb5e4a845d6' type='error' to='exploit.im' from='lightwitch.org'>
Feb 22 17:11:03 s2sout57205a0 debug Received[s2sout]: <verify type='invalid' to='lightwitch.org' from='exploit.im' id='5867cfae-9ee4-4e8c-8acf-8bb5e4a845d6' xmlns='jabber:server:d
ialback'>
Feb 22 17:11:03 lightwitch.org:dialback debug sending dialback error (remote-server-not-found) to exploit.im...
Feb 22 17:11:03 s2sout57205a0 debug sending: <db:verify id='5867cfae-9ee4-4e8c-8acf-8bb5e4a845d6' type='error' to='exploit.im' from='lightwitch.org'>
Feb 22 17:11:03 s2sout57205a0 debug Received[s2sout]: <verify type='invalid' to='lightwitch.org' from='exploit.im' id='5867cfae-9ee4-4e8c-8acf-8bb5e4a845d6' xmlns='jabber:server:d
ialback'>
Marandait's still going.
Marandabbiab
nuronMaranda: maybe you can use pasebin ore something like thi
nuronThis?
MarandaProbably but too late
MattJMaranda, 0.10 of Prosody? or Metronome?
Maranda-version exploit.im
BunnehMaranda: exploit.im is running ejabberd version 14.07 on unix/linux 3.16.0
MarandaMattJ, ugh
MarandaMattJ, apologies, I thought it was running Prosody 0.10
MarandaSo that goes to someone else I suppose.
MattJBut it looks like your server is emitting a type='error' in response to a type='invalid'?
MarandaMattJ, nope it's the other way around
nuron-uptime shreddox.eu
Bunnehnuron: shreddox.eu has been running for 1 week and 4 days
Link Mauve-uptime jabberfr.org
BunnehLink Mauve: jabberfr.org has been running for 1 week and 19 hours
MattJMaranda, the log literally says sending: <db:verify [...] type='error'
MarandaMattJ, exploit.im it's emitting a type invalid to a type error.
Link MauveI’m glad the libevent bug is now “fixed”. :)
MarandaMattJ, yes but it's not the beginning of the log.
ingolfhas joined
ingolfhas left
ingolfhas joined
jjrhhas left
jjrhhas left
kmqhas left
Marandaugly to replicate garbled condition the remote server closed the incoming stream on step 3, Metronome (correctly me thinks?) sends remote-server-not-found on the outgoing which was authenticated using SASL external
Marandapouts.
Marandaand it gets answered by *type invalid*
csshas joined
probablyhas left
probablyhas joined
ingolfhas joined
jjrhhas left
jjrhhas left
jjrhhas left
Marandahas left
jjrhhas left
Marandahas left
podhas joined
ingolfhas left
ingolfhas joined
podhas left
podhas joined
kmqhas joined
Marandawell I'll have it do a *SouL* ( ¯\_(ツ)_/¯ ) and drop the stream after 10 dialback failures, I wanted it to do that already but for some reason I rethought that.
SouLGreat, Maranda!
SouLI did that at my job and now I have no job!
SouLNo, no, just kidding! haha
mimi89999has left
ingolfhas left
ingolfhas joined
ingolfhas left
ingolfhas joined
Martinhas left
Zashhas left
probablyhas left
probablyhas joined
csshas left
andi01has joined
ibikkhas left
ilehhas left
ilehhas joined
sezuanhas joined
Odinhas left
Odinhas joined
Odinhas left
Odinhas joined
ibikkhas joined
Odinhas left
Odinhas joined
probablyhas left
probablyhas joined
jjrhhas left
zuglufttierhas joined
zuglufttierhas left
zuglufttierhas joined
jjrhhas left
ilehhas left
zuglufttierhas left
ingolfhas left
ingolfhas joined
Odinhas left
Odinhas joined
ilehhas joined
zuglufttierhas joined
ibikkhas joined
csshas left
csshas left
csshas joined
csshas left
kmqhas joined
csshas joined
kmqhas joined
ThibGhas left
probablyhas left
ingolfhas left
ingolfhas joined
probablyhas joined
Odinhas left
Odinhas joined
Odinhas left
Odinhas joined
ingolfhas left
ingolfhas joined
jjrhhas left
csshas left
probablyhas left
probablyhas joined
Odinhas left
Odinhas joined
ilehhas left
jjrhhas left
jjrhhas left
404.cityhas left
jjrhhas left
jjrhhas left
jjrhhas left
jjrhhas left
ibikkhas joined
SouLhas left
ingolfhas left
ingolfhas joined
carloshas joined
carloshas joined
podhas left
fp-testerhas left
Odin-contact soderparr.com
BunnehOdin: Contact addresses for soderparr.com are xmpp:abuse@@HOST@ (abuse) mailto:abuse@@HOST@ (abuse)
OdinOk, so that didn't work as expected :)
csshas joined
Odinhas left
Odinhas joined
Maranda🤔🤔🤔
Zashhas left
ibikkhas joined
Odin-contact soderparr.com
BunnehOdin: Contact addresses for soderparr.com are mailto:admin@soderparr.com (admin) mailto:abuse@soderparr.com (abuse) xmpp:abuse@soderparr.com (abuse) xmpp:admin@soderparr.com (admin)
OdinMuch better!
podhas joined
Odin-cert soderparr.com
Odin-certinfo soderparr.com
BunnehOdin: soderparr.com has a valid certificate issued by Let's Encrypt Authority X3
Odin-version soderparr.com
BunnehOdin: soderparr.com is running ejabberd version 18.01.108 on unix/linux 4.4.0