-
Ellenor Malik
new spmamer
-
Ellenor Malik
jessieb@draugr.de
-
tom
fcrazytapok@conversations.im OTR spam
-
tom
I've noticed a pattern too
-
tom
They send two roster requests over several days before sending the OTR spam
-
tom
You don't have to accept them
-
Ge0rG
interesting
-
Ge0rG
any other visible patterns?
-
tom
The names
-
Ge0rG
random letter + wordlist item?
-
tom
They appear to be (although I haven't had enough spam to tell for sure if this is definitive or not yet) ascii constisting of a word and a couple random letters
-
tom
But always US-ASCII
-
tom
And at least one word
-
Ge0rG
Well, most JIDs consist of US-ASCII
-
tom
Yeah but the spam is in RU/EN
-
Ge0rG
Are there any pattern that can be used to differentiate them from real users?
-
tom
So you'd think they'd also have a cyrllic name
-
Ge0rG
I have many russian users on my server, but most of them also use latin names
-
tom
I don't think I can give you any more differentiateable patterns yet Ge0rG
-
Ge0rG
I'd also take raw XML ;)
-
tom
Oh
-
Ge0rG
Unfortunately, the spammers didn't spam me yet.
-
tom
Well I'll be sure to capture that next time
-
jonas’
I prefer cooked XML over raw
-
tom
But
-
Ge0rG
jonas’: watch out, or I'll serve you some vegan JSON
-
jonas’
Ge0rG, JSON can’t be vegan
-
jonas’
too much suffering associated with JSON
-
tom
When I send out the abuse reports to other operators, it's usually the case I hear back random IPs opened thousands of accounts a while ago
-
tom
And just now started becoming active
-
Ge0rG
tom: that's the usual pattern.
-
tom
And the operator is able to remove the accounts based on a bunch being registered in a timeframe
-
Ge0rG
tom: https://yaxim.org/blog/2020/05/12/new-anti-spam-measures/ has helped significantly
-
Ellenor Malik
I prefer beef and onion json
-
Ellenor Malik
which is less suffery than the vegan json i,ve eaten
-
tom
Well if that's the case maybe we could look at honeypotting new accounts after they dramticlly exceed normal new user rates
-
tom
As in
-
tom
Don't cancel them just capture the XML and pretend success
-
Ge0rG
I prefer not to silently blackhole new accounts, as there can always be false positives.
-
tom
Ge0rG: can you add my jid as a member to the yax.im spamfighting chat?
-
tom
I tried joinging but it was members only
-
tom
I need an invite
-
tom
Ge0rG: do you know what kind of captcha the spammer is talking about?
-
tom
The one he claims he can bypass
-
tom
Bypassing google recaptcha is hella easy and there are services for that
-
tom
But I was wondering if maybe there was a monoculture of captchas in the XMPP fedisphere
-
tom
And that's why bypassing was so effective, or he/she was talking out of their ass
-
tom
» ** 2020-09-21 » [02:47:01] <fcrazytapok@conversations.im> Реклама по Jabber / Advert on » Jabber » » [RU] Представляем новый сервис рекламы по Jabber! » Вы увидели это сообщение? Значит и десятки тысяч других пользователей » увидят ваше! » » Более 500 000 АКТИВНЫХ пользователей в базе: » - из открытых тем на форумах » - из дампов форумов всех тематик » » Собственное ПО для рассылки: » - обход капчи на стороне клиента и сервера » - поддержка OTR шифрования клиента и сервера » » Более детально здесь: http://gg.gg/m3a3u » » ---------------------------------------------------------- » » [EN] Introducing a new Jabber advertising service! » Did you see this message? This means that tens of thousands of other » users will see yours! » » More than 500,000 ACTIVE users in the database: » - from open topics on forums » - from forums' dumps » » Own software for mailing: » - bypass captcha on client and server side » - OTR client and server encryption support » » More details here: http://gg.gg/m3a3u »
-
tom
You know
-
tom
This same message is repeating every time
-
tom
How resistant exactly is OTR to crypanalysis
-
jonas’
very
-
tom
Well
-
tom
What about size
-
jonas’
size?
-
jonas’
you need to do a full OTR handshake before message contents are exchanged
-
tom
If you have a known plaintext can you infer if the ciphertext is the plaintext by looking at the size of the packet?
-
jonas’
for the handshake to succeed, you’d have to have key material which can recover the plaintext anyways
-
tom
No i'm not talking about reading the message
-
jonas’
but messages will not be sent before you could read them
-
tom
The spammer send the EXACT same message every time
-
jonas’
you cannot send (useful) OTR messages before the handshake is complete
-
tom
I'm wondering if you looked at the SIZE of the OTR ciphertext, if it was very similar or the same each time this message is sent
-
jonas’
for that you’d first need actual cipheretxt
-
jonas’
to get actual ciphertext, the handshake must have succeeded
-
jonas’
the "same" message you’re seeing is probably just the first message of the handshake
-
tom
I've seen encrypted voice systems fall over because people could pretty accurately guess words by looking at the packet size of an encrypted compressed VoIP stream
-
tom
(looking at your SiLK codec)
-
jonas’
classic compression-before-encryption problem.
-
jonas’
but that’s also completely unrelated to OTR