XMPP Service Operators - 2023-10-26


  1. Guus

    Is the operator of jabber.sytes24.pl in this room? Does anyone else have trouble accepting a s2s from them? They appear to be using a certificate that we don't trust, and dialback seems to succeed, only for the connection to be closed with an TLS error immediately after.

  2. Menel

    They run Openfire 4.2.1😱

  3. Guus

    ohboy - but it appears that you _can_ federate with them?

  4. Menel

    HAL can

  5. Menel

    The prosody bot

  6. Guus

    is that a c2s or s2s connection?

  7. Menel

    s2s

  8. Menel

    (i think 🤔)

  9. Menel

    At least s2s works too from HAL

  10. Guus

    Hmm, my browser also allows their certificate

  11. Guus

    so why doesn't my server?

  12. Menel

    Testssl fails also the handshake

  13. Menel

    Wasn't openfire the one with the huge cve, and we can assume their whole sever is taken over by now?

  14. Licaon_Kter

    Or you can use the exploit to update it's certs and setup :)

  15. Guus

    Yes / yes.

  16. Guus

    It'd not be quite legal though.

  17. Guus

    (also, they've exposed they admin console to the public internet, on a non-encrypted port :S

  18. Licaon_Kter

    Was joking but yeah ¯\_(ツ)_/¯

  19. Guus

    Well, I'm guessing that this server is now a crypto-mine - so there's an argument that you'd do the hoster a favour...

  20. Licaon_Kter

    Unasked favors don't go unpunished

  21. Guus

    There are to any negations in that sentence to parse without more coffee :D

  22. Licaon_Kter

    :)

  23. Lightning Bjornsson

    eep?

  24. Squeaky Latex Folf

    https://notes.valdikss.org.ru/jabber.ru-mitm/ you guys know about this right? Does this make Hetzner and Linode providers to avoid, or just Germany is a country you should avoid hosting at?

  25. Squeaky Latex Folf

    I wanted to maybe get Hetzner due to it being so cheap but if they're going to intercept traffic maybe it's not a smart idea

  26. Squeaky Latex Folf

    Perhaps homehosting is not so bad after all

  27. Squeaky Latex Folf

    Except then the police will raid your home

  28. MattJ

    Practically all reputable providers will obey court orders

  29. Squeaky Latex Folf

    Or otherwise wiretap you

  30. Squeaky Latex Folf

    > Practically all reputable providers will obey court orders Fair enough. But why? Just because they're Russian?

  31. Squeaky Latex Folf

    Sounds pretty racist to me

  32. MSavoritias (fae,ve)

    because they follow the law obviously

  33. Squeaky Latex Folf

    What I don't understand though, is why they made a TLS MITM when they could literally log into the VPS and steal the certificates

  34. MattJ

    Nobody knows (if this even was a court order, though it seems likely). But there is a bunch of criminal activity associated with jabber.ru users, so it's not unlikely that they were targeting some individual or group that were using the service.

  35. MattJ

    Maybe they (ironically) wanted to avoid detection. Also the laws between wiretapping and "stealing the certificates" are also very likely to differ.

  36. MattJ

    Maybe they just wanted to highlight this kind of attack so we could prevent it in the future

  37. Squeaky Latex Folf

    Why was STARTTLS even used?

  38. Squeaky Latex Folf

    Do XMPP clients and servers still use STARTTLS?

  39. Squeaky Latex Folf

    No, right?

  40. MattJ

    Yes, and that's not a problem

  41. Squeaky Latex Folf

    Why use STARTTLS when you can use TLS immediately instead?

  42. MattJ

    At this point, it's just a case of moving the ecosystem as usual. Direct TLS is gradually gaining adoption.

  43. Squeaky Latex Folf

    Is it not used often?

  44. MattJ

    I don't have stats

  45. Squeaky Latex Folf

    XMPP had mandatory TLS since 2014 right?

  46. MattJ

    Yes

  47. Ge0rG

    Direct TLS stats from yax.im, a server without a respective SRV record: 974 STARTTLS connections, 1 Direct TLS connection

  48. MattJ

    :D

  49. MattJ

    https://compliance.conversations.im/test/xep0368/ has some numbers, but many of the servers that don't have it are smaller/private ones

  50. techmetx11

    STARTTLS is called STARTTLS, because it stands for START using direct TLS

  51. Ge0rG

    Oh sorry, I have to corect that. 0 active Direct TLS connections, the one I accidentally counted was an outgoing one from port 52236

  52. techmetx11

    inb4 it was just a command to tell the server to start using TLS (opportunistic TLS)

  53. Lightning Bjornsson

    > Squeaky Latex Folf a écrit : > https://notes.valdikss.org.ru/jabber.ru-mitm/ you guys know about this right? Does this make Hetzner and Linode providers to avoid, or just Germany is a country you should avoid hosting at? No, it means you have to adopt better practices in social networking for illegal purposes (e.g. tor)

  54. Link Mauve

    At JabberFR, we have 486 connections using STARTTLS on port 5222, and 254 using direct TLS on port 5223.

  55. Lightning Bjornsson

    Or just for all purposes.

  56. Squeaky Latex Folf

    Fair enough, but Tor XMPP federation doesn't have an XEP and I heard people had to make a manual table of Tor servers to federate with or otherwise it'd refuse due to incorrect certs

  57. Squeaky Latex Folf

    Fair enough, but Tor XMPP federation doesn't have an XEP afaik and I heard people had to make a manual table of Tor servers to federate with or otherwise it'd refuse due to incorrect certs

  58. techmetx11

    https://en.wikipedia.org/wiki/Opportunistic_TLS#Weaknesses_and_mitigations

  59. Squeaky Latex Folf

    Why do so many use STARTTLS? I don't get it

  60. techmetx11

    yup, as i expected from opportunistic TLS

  61. techmetx11

    i thought "could you just strip the STARTTLS command?"

  62. techmetx11

    apparently that works

  63. MattJ

    techmetx11, that article is about "opportunistic TLS" which is not what XMPP does these days

  64. Link Mauve

    Squeaky Latex Folf, it doesn’t have any downside compared to direct TLS.

  65. MattJ

    If you strip starttls, clients will refuse to connect, and even the older ones will shout at you about it

  66. techmetx11

    MattJ: so clients can't connect in plain text?

  67. MattJ

    No, they refuse to

  68. techmetx11

    oh

  69. cloudisalie

    Hi

  70. MattJ

    Obviously that is up to the client. But if the client wants it can also POST your credentials to a pastebin. We can't control everything :)

  71. cloudisalie

    They are all a lie https://news.ycombinator.com/item?id=21412052

  72. cloudisalie

    Don't trust them

  73. MattJ

    If you find any maintained client that would connect without TLS, it's a security issue and you should report it as such

  74. Squeaky Latex Folf

    Well there are a few reasons why one might want to connect without TLS

  75. Squeaky Latex Folf

    For example if you have a lower layer in the OSI stack that already does encryption

  76. Squeaky Latex Folf

    Like Tor

  77. MattJ

    Sure. That's why I can't use Dino for Prosody development, because I test on localhost with self-signed certs and it won't let me continue.

  78. MattJ

    Others complain, but usually there is an override somewhere

  79. Squeaky Latex Folf

    What is the proper way of federating over Tor anyway?

  80. Squeaky Latex Folf

    I heard it's not really supported

  81. techmetx11

    MattJ: Dino seems to be a overly simplistic client

  82. Lightning Bjornsson

    Theoretically, the same as in clearnet, except that you connect out over Tor, and to a .onion.

  83. MattJ

    techmetx11, I don't know... it supports a bunch of features others don't. It's still the only client with group audio/video calls?

  84. Licaon_Kter

    techmetx11: has group video calls, hard te say

  85. techmetx11

    i meant as in user configuration

  86. Licaon_Kter

    You're missing the XML console and Disco listing? Yeah, no..e

  87. Licaon_Kter

    You're missing the XML console and Disco listing? Yeah, no.

  88. techmetx11

    most of the important settings (like time until sending a "<user> has left" message, and stuff)

  89. techmetx11

    are hardcoded

  90. Licaon_Kter

    What is that?

  91. Licaon_Kter

    I don't see that in Monal, sorry, Siskin, sorry....

  92. techmetx11

    Licaon_Kter: it's the little notification that tells you if a user has left your conversation

  93. techmetx11

    Dino has it hardcoded to 10 minutes

  94. Licaon_Kter

    Who cares, I'll message them anyway, they'll see it later...

  95. moparisthebest

    > Hmm, my browser also allows their certificate Guus: sounds like a classic case of missing intermediate cert, browsers "helpfully" find and include them for you so you don't know your site is broken

  96. jacob.eva

    > HAL can > > The prosody bot What is this? I've not heard of this

  97. Menel

    The last days so many people complained about starttls, I wonder what Blog started that, because it has nothing at all to do with these kinds of attacks, and no direct tls could've prevented it. Theres yet an issue with it to be found in the xmpp context..

  98. Menel

    I've 34 incoming direct tls s2s and 10 starttls

  99. RTG

    Menel: certainly the attack had nothing to do with starttls. But it does raise a tangential question: if the attacker had instead reported starttls as unsupported during the c2s MiTM, do all clients _refuse_ to connect without TLS? :)

  100. Menel

    That's up to the client devs, not the sever devs. All modern clients, all I've used, would refuse always or complain very loudly

  101. Menel

    Also I all servers disable starttls, even then you could insert your attack the same way, as long as people use too old clients that are happy with plaintext

  102. Menel

    Also if all servers disable starttls, even then you could insert your attack the same way, as long as people use too old clients that are happy with plaintext

  103. Licaon_Kter

    RTG: they had TLS, right?

  104. Licaon_Kter

    (Funny that I had to force reconnection now, because using my own wifi, error says "sasl degraded")

  105. RTG

    > That's up to the client devs, not the sever devs. > All modern clients, all I've used, would refuse always or complain very loudly I'd certainly have this _feeling_ as well, but has it ever been evaluated and documented how various clients react with "bad" TLS? TLS 1.0 and 1.1 have largely been deprecated and are no longer recommended. Do any clients still support TLS under 1.2? The attack raises these tangential questions, and while the answers may be within a collective few who are XMPP experts, the community at large can benefit by knowing the client they use either has or doesn't have various protections. :)

  106. MSavoritias (fae,ve)

    thats why we have https://joinjabber.org/ and https://providers.xmpp.net/apps/

  107. MSavoritias (fae,ve)

    to promote good apps to people :)

  108. MSavoritias (fae,ve)

    for the technically inclined you can see what each app supports at xmpp.org directly here -> https://xmpp.org/software/

  109. Menel

    Ge0rG: > Oh sorry, I have to corect that. 0 active Direct TLS connections, the one I accidentally counted was an outgoing one from port 52236 I'm connected to yax.im with direct TLS and "bidi" maybe you didn't count the bidi connection ?

  110. emus

    https://fosstodon.org/@xmpp/111303395297803949