XMPP Service Operators - 2025-07-31


  1. polarian

    >> on spammers: when they jump in, pollute and jump out, admin may not be able to know the jid to block it. >> >> so i wrote this muc jid logger for prosody: https://github.com/norayr/mod_muc_jid_logger > Does this mean that moderators must have access to the prosody daemon's log file to use this? Yes

  2. polarian

    According to the SRC code :)

  3. tom

    does something like this https://blog.cloudflare.com/the-csam-scanning-tool/ exist but an actual tool operators can run on their servers instead of a service from cloudflare?

  4. polarian

    I just go with "not my problem"

  5. tom

    > Today there are startups that are working to build the next Internet giant and compete with Facebook and Google because they can use Cloudflare to be secure, fast, and reliable online. But, as the regulatory hurdles around dealing with incredibly difficult issues like CSAM continue to increase, many of them lack access to sophisticated tools to scan proactively for CSAM. You have to get big to get into the club that gives you access to these tools, and, concerningly, being in the club is increasingly a prerequisite to getting big. > If we want more competitiTo be clear, Cloudflare will be running the CSAM Screening Tool on behalf of the website operator from within our secure points of presence. We will not be distributing the software directly to users. We will remain vigilant for potential attempted abuse of the platform, and will take prompt action as necessary.on for the Internet giants we need to make these tools available more broadly and to smaller organizations. From that perspective, we think it makes perfect sense for us to help democratize this powerful tool in the fight against CSAM.

  6. tom

    > Today there are startups that are working to build the next Internet giant and compete with Facebook and Google because they can use Cloudflare to be secure, fast, and reliable online. But, as the regulatory hurdles around dealing with incredibly difficult issues like CSAM continue to increase, many of them lack access to sophisticated tools to scan proactively for CSAM. You have to get big to get into the club that gives you access to these tools, and, concerningly, being in the club is increasingly a prerequisite to getting big. To be clear, Cloudflare will be running the CSAM Screening Tool on behalf of the website operator from within our secure points of presence. We will not be distributing the software directly to users. We will remain vigilant for potential attempted abuse of the platform, and will take prompt action as necessary.

  7. tom

    cloudflare calling themselves a unfair monopoly and saying that destributing the tool would facilitate a better ecosystem but refusing to do so

  8. tom retracted a previous message, but it's unsupported by your client.

  9. tom

    sending fuzzyhashes of all the files on my CDN to a big tech monopoly, or worse reverse proxying all my traffic unencrypted through would is not an acceptable proposition and seems to present an undue privacy risk to users.

  10. tom

    sending fuzzyhashes of all the files on my CDN to a big tech monopoly, or worse reverse proxying all my traffic unencrypted through one is not an acceptable proposition and seems to present an undue privacy risk to users.

  11. tom

    We don't accept this kind of risk with the use of RTBLs for handling email small so I fail to see why a similar approach or distributing fuzzy hashes couldn't be applicable to monitoring our http-upload cdn servers for csam abuse.

  12. tom

    We don't accept this kind of risk with the use of RTBLs for handling email spam so I fail to see why a similar approach or distributing fuzzy hashes couldn't be applicable to monitoring our http-upload cdn servers for csam abuse.

  13. tom

    We don't accept this kind of risk with the use of RTBLs for handling email spam so I fail to see why a similar approach for distributing fuzzy hashes couldn't be applicable to monitoring our http-upload cdn servers for csam abuse.

  14. tom

    I am considering upgrading prosody v12->v13 tonight

  15. tom

    I am moving from RSA encryption to elliptic curve cryptography

  16. tom

    the old keys were 2048 bits in length and I think that keysize has been weak for a while

  17. tom

    switchover from RSA-2048 to ECC-256 complete

  18. Samson Smith

    > I am moving from RSA encryption to elliptic curve cryptography How does this work Tom

  19. Samson Smith

    What exactly is using RSA

  20. Samson Smith

    Your SSL certs?

  21. tom

    tls encryption

  22. Samson Smith

    Oh okay

  23. Samson Smith

    I didn't know that ECC-256 was available from let's encrypt

  24. tom

    RSA is an old algo from the 90s we kept increasing the modulous size of to keep it secure

  25. Samson Smith

    I'm not even sure how to configure my acme client to request 4096 bit size RSA keys

  26. Samson Smith

    Tom I am familiar with RSA, and how we keep increasing the bit size

  27. Samson Smith

    PGP also uses RSA

  28. tom

    we were supposed to switch to ECC because of this back in the 90s but the NSA probably backdoored DUAL_EC_DRBG so I and many others put off implementing it in favor of increasing to RSA3072

  29. tom

    but now with daniel j berstein's work I think we have safe ecc primitives to start using ECC in favor of RSA

  30. Samson Smith

    A lot of algos are considered unsafe due to relying on the NIST

  31. Samson Smith

    Ed25519 is safe

  32. tom

    > I didn't know that ECC-256 was available from let's encrypt they will if you specificlly ask for it. From E5 instead or R11

  33. Samson Smith

    I'm pretty sure

  34. Samson Smith

    >> I didn't know that ECC-256 was available from let's encrypt > they will if you specificlly ask for it. From E5 instead or R11 What do you mean by E5 and R11? Sorry I'm on my phone and I setup SSL years ago (over half a decade) and forgot about it

  35. tom

    > PGP also uses RSA GnuPG implements ECC as well. I've started generating more ecc subkeys to replace my rsa subkeys. However one of these days i'm going to have to replace my root gpg key with something ecc based as well since the whole thing is only as secure as the root of trust

  36. tom

    thankfully all those years ago when i made my gpg key I used rsa3000+

  37. Samson Smith

    How do sub keys work? I'm not super familiar with gpg and only have used it intermittently

  38. tom

    > What do you mean by E5 and R11? Sorry I'm on my phone and I setup SSL years ago (over half a decade) and forgot about it look at the chain of certificates on my XMPP server. Let's encrypt RSA chain of trust top is R11

  39. tom

    the current ECC chain of trust is E5

  40. tom

    https://letsencrypt.org/certificates/

  41. Samson Smith

    The other day I generated a 4096 RSA key and enabled all capabilities on it, signing, certify, authentication, and encryption. Is that a bad idea?

  42. tom

    yes

  43. tom

    if your using lets encrypt, it's only as secure as 2048

  44. Samson Smith

    Oh wow

  45. Samson Smith

    I'm not sure how secure EDSA is

  46. Samson Smith

    I think it relies on the NIST (at least for ssh?)

  47. Samson Smith

    Unless ed25519 is a variant of EDSA and I just don't realize it

  48. tom

    Samson Smith: if your interested in this stuff here is a great read https://blog.cryptographyengineering.com/2015/10/22/a-riddle-wrapped-in-curve/

  49. Samson Smith

    Thanks tom

  50. Samson Smith

    Are there providers for free SSL certs other than let's encrypt? It's the only one I know about and what everyone seems to use

  51. Samson Smith

    I'm partly worried if I change certs from RSA it will break compatibility with a lot of software so it might be a good idea to get both honestly. I'm sure simply using a higher bit size RSA cert would have minimal issues with compatibility

  52. Samson Smith

    Maybe there is a different provider with at least 3072 sized certs

  53. tom

    > Are there providers for free SSL certs other than let's encrypt? It's the only one I know about and what everyone seems to use yes but lets encrypt is hosted by the Electronic Frontier Foundation while others like ZeroSSL don't have quite the reputation

  54. tom

    > I'm partly worried if I change certs from RSA it will break compatibility with a lot of software so it might be a good idea to get both honestly. I'm sure simply using a higher bit size RSA cert would have minimal issues with compatibility I think the days of not having ECC compatibility are behind us which is why I switched my certs over just now, but if you'd like I can report back here if there are any interoperability/federation issues from this switchover

  55. Samson Smith

    >> Are there providers for free SSL certs other than let's encrypt? It's the only one I know about and what everyone seems to use > yes but lets encrypt is hosted by the Electronic Frontier Foundation while others like ZeroSSL don't have quite the reputation I understand I guess I'm stuck with let's encrypt then, especially because I use wildcard certs to make my life easier, I'm sure those cost a fortune elsewhere

  56. Samson Smith

    >> I'm partly worried if I change certs from RSA it will break compatibility with a lot of software so it might be a good idea to get both honestly. I'm sure simply using a higher bit size RSA cert would have minimal issues with compatibility > I think the days of not having ECC compatibility are behind us which is why I switched my certs over just now, but if you'd like I can report back here if there are any interoperability/federation issues from this switchover That would be nice to know Tom, I think you have my contact as well and we share a few other MUCs you could let me know in any of those places as well

  57. Samson Smith

    I just know already as it is some programs have issues with certs

  58. tom

    just message me here then, I'll probably forget

  59. Samson Smith

    I had to generate new ones to get everything to work nicely, like I think I generate a different cert from the one let's encrypt gives me for DNS over TLS

  60. Samson Smith

    Android doesn't like to use the cert they give me directly, I don't remember why

  61. Menel

    Ecc certs are old by now, I don't know software that doesn't work with it. I'm using Ecc certs since at least 5 years I think. I don't think you'll have to worry. And if something actually breaks you can just switch back

  62. Samson Smith

    Menel I can also just have both certs as well can't I

  63. Samson Smith

    Renew both monthly

  64. tom

    kalli.st, your cert expired

  65. xa0.uk

    more spam from jasjsnsnjsjs@c0nnect.de in c-o and biboumi@

  66. xa0.uk

    probably a target for rtbl?

  67. xa0.uk

    (not like i'm salty)

  68. xa0.uk

    also, some are saying this is probably the same group of spammers associated with syn.rip

  69. Kris

    already added to rtbl

  70. Kris

    these channels either don't subscribe to it, or it is a different jid

    👍 1
  71. jonas’

    likely

  72. jonas’

    (likely they do not subscriber

  73. jonas’

    (likely they do not subscribe)

  74. j.r (jugendhacker.de)

    jjsjaksj@c0nnect.de also seems to be a similar spammer

  75. polarian

    Hmmm seems depeering from c0nnect.de might be wise

  76. polarian

    Has anyone contacted them yet?

  77. Kris

    also already added

  78. polarian

    The whole server?

  79. Kris

    no the above JID

  80. polarian

    > Has anyone contacted them yet? I meant contacted the server admins

  81. polarian

    I will do it then ig

  82. trashserver.net Admin

    > Has anyone contacted them yet? I have. No response so far.

  83. trashserver.net Admin

    Unfortunately the servers website is blank. No info about the admin.

  84. trashserver.net Admin

    I've reached out to the server Hoster / IP owner. Not sure if these are the same guys. Nevertheless, I've filed an Abuse message.

    ❤️ 3
  85. Martin

    Guus managed to contact them in the past.

  86. xa0.uk

    > I've reached out to the server Hoster / IP owner. Not sure if these are the same guys. Nevertheless, I've filed an Abuse message. ❤️

  87. マリウス

    does anyone have experience with ejabberd and know why its beam might end up going berserk at 99% on a CPU, with /var/log/messages filling up with `epmd[96954]: epmd: invalid packet size` messages?

  88. tom

    I don't, sorry.

  89. polarian

    > Guus managed to contact them in the past. I have attempted to contact them, no response yet