-
sagaracharya
What DNS to set for pop3s?
-
sagaracharya
I have it on 995
-
fireburner
You mean port not fns?
-
fireburner
995 TCP
-
Licaon_Kter
I guess the whole cert generation tools, CAA and the rest got a bit more testing these days given the incident. I've seen some issues in my setup at leastp
-
ru_maniac
well, I'd really love for XMPP Observatory to make a comeback, I'm still struggling to find an easy-to-use tool to check TLS configuration
-
ru_maniac
have to use multiple
-
ru_maniac
I mean, I remember that it was a resource hog, but man it was handy
-
MattJ
It just needs someone to make it š
-
MattJ
And, crucially, maintain it
-
MattJ
The old one was out of date and giving bad security advice
-
ru_maniac
but it provided with a lot of raw data in a single place -- yes, it was up to maintainer to decide on it -- but nevertheless, it was all in one place
-
sagaracharya
Yes, set the SRV record
-
āMike Yellow
Anyone have an idea about why Gajim gets no āPrivate messages are disabledā in this room?
-
Licaon_Kter
āMike Yellow: rephrase "gets no" ? Does it get the messsage since they are disabled? Or does not get that message and then errors when you try?
-
āMike Yellow
https://suchat.org:5443/upload/72100d426ee0a341f79cb126f62c325d03f117fb/pNaJLfj0HBlixDWXG51PfspwgiP7ayFOVeaPX4AK/0a4911f2-acb3-4125-bf30-68fa73838fc5.png
-
āMike Yellow
I can get error and see āPrivate messages are disabledā on Conversations.
-
ru_maniac
Mattj: are there any specifics with enabling channel binding on prosody? I couldn't find anything in the docs on the site
-
āMike Yellow
Licaon_Kter, did you receive that?
-
ru_maniac
https://upload.core.radiosignal.net/upload/5zVL7VH25QCMzvvR0Or680Mq/8372ca08-ee51-4568-95bc-c0c04e889328.png
-
ru_maniac
for crying out loud
-
ru_maniac
i don't know if oxpa is still here, but they really need to get their act together
-
ru_maniac
their TLS configuration is not just outdated, it is dangerous
-
ru_maniac
https://upload.core.radiosignal.net/upload/25OSPKvlWgiPKEQciOnmgEpN/c6b8012c-d881-4847-8620-36c0f1cb3c56.png
-
Guus
Pet peeve, a d I'm not 100% sure if this is the case with oxpa, but it kind of irks me when people start requiring things from other people that are providing free services in their spare time.
-
ru_maniac
I don't require anything from anyone, I'm using my own server
-
ru_maniac
but my friends are using this, hence my interest and, frankly, discomfort
-
ben
what are your friends using?
-
ru_maniac
jabber.ru as their primary server, for various reasons
-
Licaon_Kter
āMike Yellow: > Licaon_Kter, did you receive that? No
-
Licaon_Kter
ru_maniac: > Mattj: are there any specifics with enabling channel binding on prosody? I couldn't find anything in the docs on the site Run "trunk"
-
āMike Yellow
>No So I wonder why there is no an exclamation symbol on Gajim.
-
ru_maniac
Licaon_Kter: > Run "trunk" Not available at 0.12 branch, I take it?
-
Licaon_Kter
> i don't know if oxpa is still here, but they really need to get their act together Think this was always known, for years ru_maniac: > jabber.ru as their primary server, for various reasons Ask them to make another account on an working server, sorry, but use the incident as leverage
-
Licaon_Kter
āMike Yellow: go in the Gajim room and ask, search their Issues section in their repo etc
-
Lightning Bjornsson
> MattJ a écrit : > AFAICT certspotter doesn't differentiate between certs issued to you, or to someone else. So it would just notify you every month or so about your own certificates. That would be annoying, and make it more likely that you would miss actual issues. This is not a problem, if you refine it to make it easier to pay attention to
-
ru_maniac
Licaon_Kter: known or not, this is barely an excuse
-
Licaon_Kter
ru_maniac: nope, didn't know either, thought that 50% of the network, those who host prosody, have this live since a year ago or more when the blogposts where posted and Monal and Conversations and who ever started to support it
-
ru_maniac
as for moving to another server -- this solves this specific situation, sure, but not really a fix in the end
-
Lightning Bjornsson
> ru_maniac a écrit : > for crying out loud > i don't know if oxpa is still here, but they really need to get their act together afaik their act is together, the interceptor is who is mucked up
-
Licaon_Kter
ru_maniac: baby steps
-
ru_maniac
true enough
-
Licaon_Kter
Lightning Bjornsson: oh, c'mon... their ejabberd version was 3.2 or some $hit from 2014????
-
ru_maniac
> Lightning Bjornsson: oh, c'mon... their ejabberd version was 3.2 or some $hit from 2014???? 3.2 something from 2016 ↺
-
ru_maniac
afaik, 3.2 last release was around 2018
-
Lightning Bjornsson
okay, you have a point, but that doesn't go against the fact that the cert on-device wasn't expired, and the cert others saw was.
-
ru_maniac
had their act been together, their dns would have been set up properly
-
ru_maniac
> okay, you have a point, but that doesn't go against the fact that the cert on-device wasn't expired, and the cert others saw was. they've caught this only when their service went belly up, and clients were unable to connect due to expired cert ↺
-
Licaon_Kter
ru_maniac: the mitm-er service went belly up' I blame the mitm for not refreshing certs on time :)) _XMPP's greatest enemy are certs_
-
Licaon_Kter
> afaik, 3.2 last release was around 2018 Was it? ejabberd switched to YEAR.MONTH before 2017 iirc, then again maybe they had Bussiness Edition? ĀÆ\_(ć)_/ĀÆ
-
MattJ
ru_maniac, channel binding is automatically offered in Prosody whenever it can be, you don't need to "enable it". However the biggest reason it might not be offered right now is because the current stable branch doesn't support it with TLS 1.3
-
ru_maniac
>> afaik, 3.2 last release was around 2018 > Was it? ejabberd switched to YEAR.MONTH before 2017 iirc, then again maybe they had Bussiness Edition? ĀÆ\_(ć)_/ĀÆ last release in the branch, prob was a maintenance release
-
MattJ
Channel binding was only defined properly for TLS 1.3 in RFC 9266, last year
-
ru_maniac
> ru_maniac, channel binding is automatically offered in Prosody whenever it can be, you don't need to "enable it". However the biggest reason it might not be offered right now is because the current stable branch doesn't support it with TLS 1.3 got it, thanks that was a bit unclear from 0.12.4 changelog
-
MattJ
It wouldn't be in the 0.12.4 changelog because there have been no changes related to channel binding in 0.12, as far as I recall
-
MattJ
I think we've supported it in 0.10 or so, released back in 2017
-
ru_maniac
there was something re: TLS 1.3 and how SCRAM-SHA-1-PLUS works improper, iirc
-
ru_maniac
but I may be mistaken
-
MattJ
So the important change in trunk (and the next major release) will be support for channel binding with TLS 1.3
-
ru_maniac
I see, thank you for the detailed explanation, this answers my question fully
-
basicdreams
I am a simple Jabber user, not a system administrator can someone explain in detail yesterdayās incident with jabber.ru? Does what happened indicate Jabber as an unreliable method of communication? I use OMEMO encryption with all contacts (key fingerprints have been confirmed in real life)
-
MattJ
basicdreams, no, the same attack could have worked against any protocol, it's not a problem of Jabber/XMPP
-
MattJ
In fact Jabber/XMPP does already have protection against this, but it wasn't enabled on jabber.ru
-
ru_maniac
> I am a simple Jabber user, not a system administrator > can someone explain in detail yesterdayās incident with jabber.ru? Does what happened indicate Jabber as an unreliable method of communication? I use OMEMO encryption with all contacts (key fingerprints have been confirmed in real life) 1) TLDR: their hosting provider implemented man-in-the-middle type of attack, de-crypting and re-encrypting all of their traffic 2) it does not, their service was just incorrectly configured ↺
-
MattJ
basicdreams, and if you use verified OMEMO, your communications are secure (they could see that you sent a message to a person, but not the message contents)
-
basicdreams
thanks for the answer yes, I understand what MITM is, but I don't understand if I should take any action on the client side (someone above advised to enable DNSSEC in Conversations settings, for example✎ -
basicdreams
thanks for the answer yes, I understand what MITM is, but I don't understand if I should take any action on the client side (someone above advised to enable DNSSEC in Conversations settings, for example) ✏
-
MattJ
Just DNSSEC wouldn't have prevented this, the best defence is channel binding, but you need a server that supports it (the latest Conversations version does, if the server does)
-
MattJ
and discussion about channel binding support in servers is precisely what is happening here this morning :)
-
mekosko
How to check if channel binding is enabled?
-
mekosko
In Conversations
-
MattJ
I don't know if it tells you, unfortunately
-
Licaon_Kter
mekosko: you need server running prosody trunk, maybe https://compliance.conversations.im tells you the version
-
MattJ
Licaon_Kter, (or Holger) do you know if ejabberd supports tls-exporter?
-
Licaon_Kter
ĀÆ\_(ć)_/ĀÆ
-
basicdreams
Is there any XEP that describes channel binding?
-
MattJ
basicdreams, no, it's part of SCRAM, the authentication method we mostly use these days
-
MattJ
Both Prosody and ejabberd have supported it for years, on TLS 1.2. Support for channel binding with TLS 1.3 will be in the next Prosody release, and I'm unsure if ejabberd has it already or if it's planned.
-
mekosko
Licaon_Kter, I think compliance site does not check for this XEP, because it shows 100% compliance for ejabberd 23.04 server I'm currently on
-
Licaon_Kter
mekosko: "tells you the software version"
-
MattJ
It's not a XEP
-
MattJ
Well, there is XEP-0440, but servers can support channel binding without XEP-0440
-
MattJ
The old xmpp.net would have reported this, but unfortunately it died
-
mekosko
There is also an option to verify each cert manually in conversations, maybe this may help?
-
MattJ
Not really, unless you know which certificate should be trusted and which should not
-
mekosko
But you will know if cert is changed
-
Licaon_Kter
mekosko: maybe the real admin changed it
-
MattJ
Yes, it changes every 4 weeks probably
-
mekosko
But what if you are an admin š✎ -
mekosko
Although I'm not sure what difficulties there are when working in this mode ✏
-
MattJ
Then sure, you can log in via ssh every 4 weeks and verify the fingerprint
-
mekosko
What if you are an admin ✏
-
mekosko
Although I'm not sure what difficulties there are when working in this mode
-
clouded
would s2s suffer from the same type of attack?
-
MattJ
Yes, it could do. It didn't in this case (they only targeted port 5222). Channel binding isn't an option for s2s, so we're considering what other protections might help there.
-
iioknj
Licaon_Kter:
-
iioknj
Licaon_Kter: I have something to share
-
iioknj
I have something to share
-
iioknj
Licaon_Kter:
-
iioknj
I have something to freely share
-
techmetx11
what
-
Licaon_Kter
techmetx11: our frenly spammer, nvm
-
techmetx11
yes i expected
-
techmetx11
they sound like that oneplus vpn guy
-
Licaon_Kter
Because they is
-
āMike Yellow
We have an unusual idea. We find that well-maintained servers never guarantee they are able to register in-band in long term, so many servers suggested in the manual are not reliable for newcomers. How about suggesting some half-abandoned servers for them?
-
āMike Yellow
After they get familiar with XMPP, then they can choose a suitable server for themselves by them selves.✎ -
āMike Yellow
After they get familiar with XMPP, then they can choose a suitable server for themselves by themselves. ✏
-
Licaon_Kter
āMike Yellow: non sure what reliable has te do with spammers actions✎ -
Licaon_Kter
āMike Yellow: not sure what reliable has te do with spammers actions ✏
-
āMike Yellow
>has te do What is this?
-
Licaon_Kter
āMike Yellow: not sure what reliable has to do with spammers actions ✏
-
Licaon_Kter
Typos
-
āMike Yellow
I know spammers are annoying. And we see the future of XMPP servers is to refuse to register in-band, reasonable and acceptable. But for computer newbies, especially who can not read English, it may be better to tell them to register half-abandoned servers, which has a greater probability to succeed in one try.
-
āMike Yellow
It is awkward when they tried two servers and be refused to register in-band.
-
Martin
Better don't recommend abandoned servers. If you want to recommend a server with ibr your group should operate one if you have someone with the expertise as for other servers you can't guarantee the availability of ibr. Bit running an ibr enabled server takes a lot of effort if you don't want to get quickly blocked by other servers due to spam.
-
savagepeanut
If you are operating the server and only people you know are using it, invites sound great for your use case
-
āMike Yellow
Yeah. Invitation-only institution is always the way to fully block spammers and enemies.
-
āMike Yellow
For Chinese, to establish an XMPP server, one should...: Learn to be an advanced XMPP user. Then learn to be an server host. Be able to read another language and have money to rent a foreign cloud server. Or have a full-time running computer and learn to establish an XMPP server over I2P or Tor?
-
āMike Yellow
Chinese users are not united for now. Can not even think about establishing such an invitation-only server. Even the amount of advanced XMPP users in China I know is not greater than 10.
-
Licaon_Kter
āMike Yellow: that's what anyone has to do, wtf, U R not special, head down, read more, stfu :)
-
raver
```Details for xmpps-client check Certificate expires at 2023-12-06T16:45:38Z. SASL mechanisms: PLAIN, SCRAM-SHA-1, SCRAM-SHA-1-PLUS, X-OAUTH2``` Should I disable all methods besides SCRAM-SHA1-PLUS to force channel binding?✎ -
raver
```Details for xmpps-client check Certificate expires at 2023-12-06T16:45:38Z. SASL mechanisms: PLAIN, SCRAM-SHA-1, SCRAM-SHA-1-PLUS, X-OAUTH2``` Should I disable all methods besides SCRAM-SHA-1-PLUS to force channel binding? ✏
-
MattJ
raver, yes, though you may end up with clients not able to connect. And that will include all web clients, because browsers don't support channel binding.
-
sagaracharya
Anyone uses opensmtpd?
-
Licaon_Kter
sagaracharya: wrong channel
-
ru_maniac
sagaracharya, ask here: xmpp:hbsc@muc.lurk.org✎ -
ru_maniac
sagaracharya, ask here: hbsc@muc.lurk.org ✏
-
Guus
sagaracharya: I am truly curious - what is your motivation to keep asking offtopic questions here, when that typically ends up in a verbal clash with others? Do you disagree that this is offtopic? Do you disagree with the policy? Is this the most appropriate channel that you know of to ask these questions?
-
sagaracharya
Ihave to learn the art of having 200 users at the very start
-
raver
MattJ: thx, good to know. I only use movim very rarely. If I leave more mechanisms enabled can I force the client to use the best?
-
sagaracharya
That is acrucial art
-
sagaracharya
Well. I don't act in silos. I believe a discussion near the topic is allowed. I personally wouldn't mind discussion on food if this were my channel
-
Guus
okay, so you do not agree with the policy - I get that.
-
sagaracharya
Guus: https://humaaraartha.in/sagar/essays.html
-
sagaracharya
I can teach you English if you want
-
sagaracharya
I believe the moderators are doing their job well
-
sagaracharya
Guus: When you become the moderator, you can add your divine opinion on what's on topic and what is not
-
Guus
I'm not trying to aggravate you. I was truly interested.
-
sagaracharya
Anyways, I have better work to do, i.e. completing my mailserver setup :)
-
sagaracharya
Yes, I saw that interest
-
Guus
but, as you implied yourself: this is not 'your' room. We're all guests here, basically. It does not seem unreasonable to me to adhere to the stated policy - especially when you have already challenged that policy, and owners indicate that they keep the policy as-is.
-
octagon
should there be another "spam manifesto" style pledge/whatever to get most/all the server to deploy CAA+DNSSEC and channel binding where possible?
-
MattJ
octagon, a general set of evolving "best practices" for server operators would probably be nice to have
-
MattJ
and this would be something that can go on it. Well, soon (we still need to get channel binding for TLS 1.3 generally available - afaik neither Prosody nor ejabberd support it in current releases)
-
Licaon_Kter
> octagon, a general set of evolving "best practices" for server operators.... So you are always behind "modern" setup
-
MattJ
"Just do what Snikket does." EOF
-
MattJ
(but I'm currently working on a PR to disable PLAIN in Snikket entirely)
-
unix.dog
> ```Details for xmpps-client check > Certificate expires at 2023-12-06T16:45:38Z. > SASL mechanisms: PLAIN, SCRAM-SHA-1, SCRAM-SHA-1-PLUS, X-OAUTH2``` > Should I disable all methods besides SCRAM-SHA-1-PLUS to force channel binding? raver, Iām curious how you check this
-
unix.dog
unfortunately iām not sure how Iād set this up with the way my services are authenticated to (LDAP)
-
MattJ
Yeah, some deployments make it hard/impossible to do channel binding
-
MattJ
and sometimes even SCRAM isn't possible
-
unix.dog
yeah, all the passwords are hashed with argon2id on the LDAP side, so i canāt access them
-
MattJ
Yep, so you're presumably PLAIN-only
-
unix.dog
yeah
-
MattJ
With the SASL2 FAST stuff, the client would be able to upgrade from password auth to token auth, and the token auth supports channel binding
-
unix.dog
token auth? oh, like doing authentication once and then generating a token?
-
MattJ
So 99% of the time you'd be protected, unless you had to log in with your password again for some reason
-
MattJ
Yeah
-
unix.dog
yes, thatād be ideal :P
-
Guus
Are clients expected to scream murder when they were once offered channel binding, but not any longer, for a particular domain?
-
unix.dog
iām assuming itās still being implemented in clients and servers as of now, though
-
MattJ
https://blog.prosody.im/fast-auth/ has some info - it's still early days, but it's surprisingly widely implemented already
-
MattJ
Guus, we leave that problem up to client developers and UI designers :P
-
unix.dog
that seems very impressive
-
Guus
MattJ: should we? Isn't that the only way to reliably (?) offer channel binding and other Auth mechanisms at the same time?
-
unix.dog
iād like to see that in ejabberd if it isnāt already :o
-
Guus
Otherwise, a mitm attack would simply silently drop the channel binding, right?
-
MattJ
unix.dog, you and lots of people :)
-
MattJ
I assume it will come, but I think they just haven't found someone to implement it yet
-
unix.dog
yeah, thatās just how it is i think
-
unix.dog
i do want to pick up erlang so i can contribute some..
-
ååē½å
> https://blog.prosody.im/fast-auth/ has some info - it's still early days, but it's surprisingly widely implemented already Instead, both the client and server are supported for secondary authenticationćļ¼2FAļ¼✎ -
ååē½å
> https://blog.prosody.im/fast-auth/ has some info - it's still early days, but it's surprisingly widely implemented already best, both the client and server are supported for secondary authenticationćļ¼2FAļ¼ ✏
-
Menel
2fa alone doesn't help prevent mitm like it was done, I think.
-
ååē½å
The critical operations on the server need to be confirmed. Important, must be 2FA ļ¼2FA is not popular so farļ¼. 2FA is more popular and acceptable than other schemes.
-
ååē½å
https://notes.valdikss.org.ru/jabber.ru-mitm/ it real?
-
Licaon_Kter
ååē½å: yes, ongoing discussion
-
raver
>> ```Details for xmpps-client check >> Certificate expires at 2023-12-06T16:45:38Z. >> SASL mechanisms: PLAIN, SCRAM-SHA-1, SCRAM-SHA-1-PLUS, X-OAUTH2``` >> Should I disable all methods besides SCRAM-SHA-1-PLUS to force channel binding? > raver, Iām curious how you check this I've checked the supported mechanisms here: https://connect.xmpp.net/ ↺