XMPP Service Operators - 2023-07-12


  1. sagaracharya

    Do y'all use physical servers to host or you use remote servers or VPS providers?

  2. moparisthebest

    both

  3. sagaracharya

    moparisthebest: Which physical server?

  4. moparisthebest

    one in my server closet at home

  5. balabol.im

    > Do y'all use physical servers to host or you use remote servers or VPS providers? Single-board comp.+ssd

  6. sagaracharya

    Nice! :) I feel proud. All people I hear use ssh, remote servers

  7. Quinn64

    I'm using a RPi4 hosted through Njalla's VPN service

  8. moparisthebest

    My server is remote when I'm not at home :)

  9. Link Mauve

    I also use ssh to connect to my server, one room away. :p

  10. Link Mauve

    It doesn’t even have a screen plugged in. ^^

  11. sagaracharya

    > My server is remote when I'm not at home :) ssh is the worst thing ever wrt computer security

  12. sagaracharya

    ssh means anyone use my computer and destroy the meaning of malicious cracking!

  13. msavoritias

    can we please not have misinformation in here? sagaracharya can you please read about ssh and ipv6 or anything else before says statements like this? thank you

  14. Guus

    telnet ftw!

  15. Guus runs, hides.

  16. sagaracharya

    > can we please not have misinformation in here? sagaracharya can you please read about ssh and ipv6 or anything else before says statements like this? thank you Ok. You're assuming that I don't know. Please learn before speaking

  17. sagaracharya

    Can you keep the keys safe?

  18. sagaracharya

    Your private key?

  19. sagaracharya

    Do you know even a shred about end point security?

  20. sagaracharya

    That is not misinformation

  21. jonas’

    oh it very much is

  22. jonas’

    SSH-the-software and SSH-the-protocol are not the worst thing ever wrt computer security. If you cannot manage your credentials, that's a separate issue.

  23. jonas’

    you could for instance use a hardware security module like a yubikey if you don't trust the safety of your private key on a filesystem.

  24. jonas’

    The OpenSSH server is one of the most reliable pieces of software in regards to security ever made, if you take the amount of exposure it typically has into account.

  25. sagaracharya

    > you could for instance use a hardware security module like a yubikey if you don't trust the safety of your private key on a filesystem. Yes, but the command to fetch the key is given by the processor

  26. sagaracharya

    Master is the processor, not the yubikey

  27. sagaracharya

    > The OpenSSH server is one of the most reliable pieces of software in regards to security ever made, if you take the amount of exposure it typically has into account. I agree. But the problem lies not in OpenSSH but in other gigantic buggy softwares

  28. jonas’

    great, so the statement "ssh is the worst thing ever wrt computer security" is false by your own account.

  29. jonas’

    also note that before SSH, we had _telnet_

  30. jonas’

    which is oh so much worse

  31. Trung

    sagaracharya: you don't have to use OpenSSH or any SSH what so ever. It's your server do what you want. And on that same piece of logic, when it's not your server, it's none of your bussiness 😁

  32. jonas’

    sagaracharya, this is not the place for polemics or hyperboles (which that statement probably was meant to be). Please keep them elsewhere. I advise you to be careful and err on the side of caution when you write here next.

  33. sagaracharya

    > sagaracharya: you don't have to use OpenSSH or any SSH what so ever. It's your server do what you want. And on that same piece of logic, when it's not your server, it's none of your bussiness 😁 Oh wow. Thanks for your profound knowledge. I didn't know that. I thought your server is mine!

  34. Trung

    yeah i'm here: https://trung.fun

  35. sagaracharya

    jonas’: ok, thanks. I'll certainly keep your important advice next time or rather every time that I speak. Any more teachings, my guru?! :D

  36. jonas’

    sagaracharya, yes, cut the sarcasm.

  37. sagaracharya

    No orders please

  38. Trung

    yay

  39. ernst.on.tour

    sagaracharya: Dünnes Eis, ganz dünnes Eis ...

  40. Trung

    and sagaracharya is here: 49.36.111.29 "monoclesbrowser/1.0"

  41. jonas’

    Trung, please don't publicly post IP addresses of other people, if that's what you just did.

  42. Trung

    well if he comes back and confirm it we'll know

  43. Menel

    General and friendly reminder : https://xmpp.org/extensions/xep-0458.html#sect-idm45629458263072 ff

  44. Link Mauve

    And https://github.com/xsf/xeps/pull/1288 to fix that link a bit. :)

  45. Guus

    Thanks for turning this into something that's at least remotely constructive, Link Mauve :)

  46. Link Mauve

    :D

  47. Licaon_Kter

    PSA: https://letsencrypt.org/2023/07/10/cross-sign-expiration.html

  48. Menel

    ^is there anything to do about it for older clients now? Without moving away from let's encrypt I mean..

  49. Menel

    At least it is still more then one year away..

  50. Licaon_Kter

    Menel: you can do this https://codeberg.org/iNPUTmice/Conversations/commit/fedd1a68d7622a9e85d3a13529c36e940b854e74

  51. fatoumata

    slight OT: but everyone _should_ setup pam_google_authenticator for SSH this instructions work for many systems just fine: https://wiki.archlinux.org/title/Google_Authenticator

  52. Guus

    That gives 2FA for SSH logins? I can see how that would be useful, yes.

  53. moparisthebest

    If you use passwords for authentication yes, but just don't

  54. fatoumata

    and reminder to set a strong password on your ssh keys, so that if they are stolen they won''t be too useful

  55. fatoumata

    it still has benefit with keys mopar

  56. moparisthebest

    It's debatable, I'm not really a fan

  57. fatoumata

    most people have no password at all on their keys, one firefox exploit and they're sent off somewhere along with .ssh/known_hosts reminder to also set `HashKnownHosts yes` in your .ssh/config to mitigate that and also `IdentitiesOnly yes` while you're there

  58. Guus

    https://tech.lgbt/@kasdeya/110688847833828258

  59. moparisthebest

    Now those sound like good tips that won't annoy the crap out of me :)

  60. moparisthebest

    Guus: haha nice

  61. Licaon_Kter

    Ghosts are like screen/tmux sessions.ee

  62. Licaon_Kter

    Ghosts are like screen/tmux sessions.

  63. Martin

    > Establishing a secure connection from linkmauve.fr to mdosch.de failed. Certificate hash: (No certificate). No Link Mauve here?

  64. mimi89999

    Establishing a secure connection from linkmauve.fr to lebihan.pl failed. Certificate hash: (No certificate).

  65. Licaon_Kter

    The LE intermediate fairy came earlier?