XMPP Service Operators - 2022-10-06


  1. kuba_

    i don't know if it's right place for this question, sorry if it's not:

  2. kuba_

    is there any site that monitors xmpp servs uptime?

  3. mathieui

    You mean, the duration?

  4. MattJ

    kuba_, if you want to know the current status and history of a public server's uptime, this may be useful: https://status.conversations.im/

  5. MattJ

    If you run a server and want to monitor it, this may be useful: https://observe.jabber.network/

  6. MattJ

    If you want to do a quick check of any server: https://xmpp-connectivity-check.mwild1.repl.co/

  7. kuba_

    MattJ: tyvm. 1st link is what i needed

  8. kuba_

    https://status.conversations.im/historical/ to be exact

  9. Menel

    There are also some other Websites in the wildy that track that.. But I don't have the links anymore...

  10. Trung

    thanks Menel!

  11. Menel

    Found it https://www.jabberes.org/servers/servers_by_uptime.html

  12. Menel

    Not quite up to date anymore it seems

  13. kuba_

    Menel: thx anyway

  14. MattJ

    General FYI: I've relocated https://xmpp-connectivity-check.mwild1.repl.co/ to https://connect.xmpp.net/ (shorter URL and more trustworthy host ๐Ÿ˜‰)

  15. edhelas

    Test took 0.3338691517710686 seconds

  16. edhelas

    What a precise time ๐Ÿ‘Œ

  17. mjk

    string.format('%.16f', t) ?

  18. Ge0rG

    pressing [enter] in the input box does not submit the form

  19. mjk

    ...and it demands I identify ducks in pictures to view the source code

  20. Ge0rG

    but you don't give a duck?

  21. mjk

    _after_ being cloudwalled

  22. mjk

    Ge0rG: not even a flying one

  23. mjk

    somewhat relatedly, I can't seem to duckduckgo documentaion for foorl... or indeed anything relevant at all

  24. Ge0rG

    foorl is just the bot's name, the code is at https://github.com/horazont/xmpp-crowd

  25. MattJ

    mjk, browser menu -> view source

  26. mjk

    d'oh!

  27. MattJ

    Ducks identification is one reason I'm moving it

  28. mjk

    thanks both Ge0rG and MattJ

  29. mjk

    ah, so %.16f is how o.j.n formats the response json

  30. mjk

    or some equivalent

  31. MattJ

    Okay, pushed some visual improvements, submit on enter, and some rounding on the test duration :)

  32. mjk

    ๐Ÿ‘๏ธ

  33. Ge0rG

    รพo/

  34. Ge0rG

    \o/

  35. MattJ

    Haven't fixed the source link, I'll do that once I've actually moved to a new repo

  36. mjk

    it could just link to view-source: fwiw :D

  37. MattJ

    It could, but I'm not sure if that is a standard across browsers... :)

  38. mjk

    right

  39. MattJ

    > On 25 May 2011, the 'view-source' URI scheme was officially registered with IANA per RFC 4395.

  40. MattJ

    So...!

  41. mjk

    orrr serve the same page as text/plain!

  42. mjk

    oh, also noticed there's no <noscript> warning that js is required

  43. Ge0rG

    "Connection failed!" ๐Ÿ˜ฅ

  44. mjk

    now that I enabled js, same here

  45. MattJ

    Connection failed to what?

  46. mjk

    snikket.chat

  47. mjk

    hm. dev.snikket.chat works

  48. MattJ

    snikket.chat isn't an XMPP service, so that's expected

  49. mjk

    sry for the noise then :)

  50. Zash

    MattJ, IN SRV 0 0 0 . ?

  51. MattJ

    Could do, yes

  52. Ge0rG

    MattJ: Connection failed to a test host that doesn't serve XMPP. What I wanted to point out is that there is no specific error message about what went wrong

  53. MattJ

    Sure, it's just meant to be a quick "is it up?" tool

  54. MattJ

    Once the new xmpp.net is live, it can link to that for more advanced information

  55. Zash

    xmpp:no-service.badxmpp.eu has `IN SRV 0 0 0 .` so could compare with that

  56. moparisthebest

    But without DNSSEC clients/servers shouldn't trust that and should attempt to connect anyway

  57. Zash

    Sigh.

  58. MattJ

    Does it make a difference? Without DNSSEC there are many other ways to mess around with the results and stop clients successfully connecting.

  59. MattJ

    I think you're just saying, "DNSSEC should be used" :)

  60. moparisthebest

    Well it should be but if the domain doesn't have it enabled... Still shouldn't trust it

  61. moparisthebest

    There are many ways yes, but also highly likely an attacker that can mess with DNS can't or doesn't block other connections, no harm in trying

  62. MattJ

    But that's just the same as saying it shouldn't trust anything without DNSSEC

  63. Zash

    Other direction! Don't connect to anything without DNSSEC!

  64. moparisthebest

    > But that's just the same as saying it shouldn't trust anything without DNSSEC Right, we don't trust, we verify, in the srv records existing case that means checking the cert names match the original domain name, in the srv record . case that means connecting anyway

  65. MattJ

    Good point, but it makes no practical difference in this case

  66. MattJ

    The point of injecting '.' would be to deny access to a legitimate domain. If the client ignores that, the attacker should just inject an invalid SRV target instead.

  67. MattJ

    Cert verification will fail, but... access successfully denied

  68. moparisthebest

    Either way there is no harm in trying to connect directly to 5222/5269 and 443, it might get through

  69. MattJ

    Depends whether there is an attacker messing with your DNS :)

  70. Zash

    You're saying "Just always ignore SRV records"

  71. MattJ

    It's not unique to SRV though - they can just mess with A records

  72. moparisthebest

    No, I'm saying we never trust them anyway, why would . be deserving of special trust

  73. Zash

    Fallback was a mistake, we should have mandated SRV records

  74. MattJ

    . isn't deserving of special trust, it's treated equally and the effect is ultimately no better or worse than an attacker modifying any other DNS response

  75. MattJ

    If anything, denying a connection is safer from a client perspective than being redirected to an attacker's server (which may gather IPs, or host some TLS exploit, or whatever)

  76. Maranda

    > <Zash> Other direction! Don't connect to anything without DNSSEC! Aka any .im domain ๐Ÿ˜

  77. Ge0rG

    ,oO( .IM TLD DNSSEC DLV DANE XMPP TLSA RR )

  78. MattJ

    Nobody noticed me accidentally roll out broken DNSSEC for *.snikket.chat this week (except observe.jabber.network, kudos). I think we have a long way to go until DNSSEC saves anyone :)

  79. Ge0rG

    how do you call a long way that's getting longer faster than you move along it?

  80. Maranda

    ``` ~# dig ds im. ; <<>> DiG 9.16.29 <<>> ds im. ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27924 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 4000 ;; QUESTION SECTION: ;im. IN DS ;; AUTHORITY SECTION: . 882 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022100600 1800 900 604800 86400 ```

  81. mjk

    Ge0rG: DNS Adventures in Mirror World?

  82. Maranda is puzzled by Ge0rG bubble.

  83. Maranda

    For a second you illuded me, I could get an answer to that

  84. Ge0rG

    Maranda: https://op-co.de/blog/posts/yax_im_dnssec/

  85. Ge0rG

    That was around 2016, before DLV got ditched due to widespread availability of DNSSEC

  86. Maranda

    hehe

  87. Ge0rG

    > Currently, StartSSL and WoSign offer free certificates, and Let's Encrypt is about to launch. This is ancient!

  88. Zash

    StartWHAT and WhoSign?

  89. Ge0rG

    WHO? That escalated quickly!

  90. mjk

    vaccine certs?

  91. moparisthebest

    > Nobody noticed me accidentally roll out broken DNSSEC for *.snikket.chat this week (except observe.jabber.network, kudos). I think we have a long way to go until DNSSEC saves anyone :) Which is unfortunately why my already implemented but not written down in XEP form discovery for QUIC doesn't use DNS but instead an https request like host-meta.json :'(

  92. moparisthebest

    But at least it has a flag where if it's set means you don't need to do any srv or posh lookups at all...

  93. MattJ

    Yes, please write that spec :)

  94. Maranda

    > <moparisthebest> > Nobody noticed me accidentally roll out broken DNSSEC for *.snikket.chat this week (except observe.jabber.network, kudos). I think we have a long way to go until DNSSEC saves anyone :) > > Which is unfortunately why my already implemented but not written down in XEP form discovery for QUIC doesn't use DNS but instead an https request like host-meta.json :'( So you reinvented a dot well-known?

  95. MattJ

    No, it would be included under .well-known, like the existing host-meta

  96. moparisthebest

    Yep, actually I just crammed more stuff in the existing host-meta.json