-
polarian
>> on spammers: when they jump in, pollute and jump out, admin may not be able to know the jid to block it. >> >> so i wrote this muc jid logger for prosody: https://github.com/norayr/mod_muc_jid_logger > Does this mean that moderators must have access to the prosody daemon's log file to use this? Yes ↺
-
polarian
According to the SRC code :)
-
tom
does something like this https://blog.cloudflare.com/the-csam-scanning-tool/ exist but an actual tool operators can run on their servers instead of a service from cloudflare?
-
polarian
I just go with "not my problem"
-
tom
> Today there are startups that are working to build the next Internet giant and compete with Facebook and Google because they can use Cloudflare to be secure, fast, and reliable online. But, as the regulatory hurdles around dealing with incredibly difficult issues like CSAM continue to increase, many of them lack access to sophisticated tools to scan proactively for CSAM. You have to get big to get into the club that gives you access to these tools, and, concerningly, being in the club is increasingly a prerequisite to getting big. > If we want more competitiTo be clear, Cloudflare will be running the CSAM Screening Tool on behalf of the website operator from within our secure points of presence. We will not be distributing the software directly to users. We will remain vigilant for potential attempted abuse of the platform, and will take prompt action as necessary.on for the Internet giants we need to make these tools available more broadly and to smaller organizations. From that perspective, we think it makes perfect sense for us to help democratize this powerful tool in the fight against CSAM.✎ -
tom
> Today there are startups that are working to build the next Internet giant and compete with Facebook and Google because they can use Cloudflare to be secure, fast, and reliable online. But, as the regulatory hurdles around dealing with incredibly difficult issues like CSAM continue to increase, many of them lack access to sophisticated tools to scan proactively for CSAM. You have to get big to get into the club that gives you access to these tools, and, concerningly, being in the club is increasingly a prerequisite to getting big. To be clear, Cloudflare will be running the CSAM Screening Tool on behalf of the website operator from within our secure points of presence. We will not be distributing the software directly to users. We will remain vigilant for potential attempted abuse of the platform, and will take prompt action as necessary. ✏
-
tom
cloudflare calling themselves a unfair monopoly and saying that destributing the tool would facilitate a better ecosystem but refusing to do so
- tom retracted a previous message, but it's unsupported by your client.
-
tom
sending fuzzyhashes of all the files on my CDN to a big tech monopoly, or worse reverse proxying all my traffic unencrypted through would is not an acceptable proposition and seems to present an undue privacy risk to users.✎ -
tom
sending fuzzyhashes of all the files on my CDN to a big tech monopoly, or worse reverse proxying all my traffic unencrypted through one is not an acceptable proposition and seems to present an undue privacy risk to users. ✏
-
tom
We don't accept this kind of risk with the use of RTBLs for handling email small so I fail to see why a similar approach or distributing fuzzy hashes couldn't be applicable to monitoring our http-upload cdn servers for csam abuse.✎ -
tom
We don't accept this kind of risk with the use of RTBLs for handling email spam so I fail to see why a similar approach or distributing fuzzy hashes couldn't be applicable to monitoring our http-upload cdn servers for csam abuse. ✏
-
tom
We don't accept this kind of risk with the use of RTBLs for handling email spam so I fail to see why a similar approach for distributing fuzzy hashes couldn't be applicable to monitoring our http-upload cdn servers for csam abuse. ✏
-
tom
I am considering upgrading prosody v12->v13 tonight
-
tom
I am moving from RSA encryption to elliptic curve cryptography
-
tom
the old keys were 2048 bits in length and I think that keysize has been weak for a while
-
tom
switchover from RSA-2048 to ECC-256 complete
-
Samson Smith
> I am moving from RSA encryption to elliptic curve cryptography How does this work Tom ↺
-
Samson Smith
What exactly is using RSA
-
Samson Smith
Your SSL certs?
-
tom
tls encryption
-
Samson Smith
Oh okay
-
Samson Smith
I didn't know that ECC-256 was available from let's encrypt
-
tom
RSA is an old algo from the 90s we kept increasing the modulous size of to keep it secure
-
Samson Smith
I'm not even sure how to configure my acme client to request 4096 bit size RSA keys
-
Samson Smith
Tom I am familiar with RSA, and how we keep increasing the bit size
-
Samson Smith
PGP also uses RSA
-
tom
we were supposed to switch to ECC because of this back in the 90s but the NSA probably backdoored DUAL_EC_DRBG so I and many others put off implementing it in favor of increasing to RSA3072
-
tom
but now with daniel j berstein's work I think we have safe ecc primitives to start using ECC in favor of RSA
-
Samson Smith
A lot of algos are considered unsafe due to relying on the NIST
-
Samson Smith
Ed25519 is safe
-
tom
> I didn't know that ECC-256 was available from let's encrypt they will if you specificlly ask for it. From E5 instead or R11 ↺
-
Samson Smith
I'm pretty sure
-
Samson Smith
>> I didn't know that ECC-256 was available from let's encrypt > they will if you specificlly ask for it. From E5 instead or R11 What do you mean by E5 and R11? Sorry I'm on my phone and I setup SSL years ago (over half a decade) and forgot about it ↺
-
tom
> PGP also uses RSA GnuPG implements ECC as well. I've started generating more ecc subkeys to replace my rsa subkeys. However one of these days i'm going to have to replace my root gpg key with something ecc based as well since the whole thing is only as secure as the root of trust ↺
-
tom
thankfully all those years ago when i made my gpg key I used rsa3000+
-
Samson Smith
How do sub keys work? I'm not super familiar with gpg and only have used it intermittently
-
tom
> What do you mean by E5 and R11? Sorry I'm on my phone and I setup SSL years ago (over half a decade) and forgot about it look at the chain of certificates on my XMPP server. Let's encrypt RSA chain of trust top is R11 ↺
-
tom
the current ECC chain of trust is E5
-
tom
https://letsencrypt.org/certificates/
-
Samson Smith
The other day I generated a 4096 RSA key and enabled all capabilities on it, signing, certify, authentication, and encryption. Is that a bad idea?
-
tom
yes
-
tom
if your using lets encrypt, it's only as secure as 2048
-
Samson Smith
Oh wow
-
Samson Smith
I'm not sure how secure EDSA is
-
Samson Smith
I think it relies on the NIST (at least for ssh?)
-
Samson Smith
Unless ed25519 is a variant of EDSA and I just don't realize it
-
tom
Samson Smith: if your interested in this stuff here is a great read https://blog.cryptographyengineering.com/2015/10/22/a-riddle-wrapped-in-curve/
-
Samson Smith
Thanks tom
-
Samson Smith
Are there providers for free SSL certs other than let's encrypt? It's the only one I know about and what everyone seems to use
-
Samson Smith
I'm partly worried if I change certs from RSA it will break compatibility with a lot of software so it might be a good idea to get both honestly. I'm sure simply using a higher bit size RSA cert would have minimal issues with compatibility
-
Samson Smith
Maybe there is a different provider with at least 3072 sized certs
-
tom
> Are there providers for free SSL certs other than let's encrypt? It's the only one I know about and what everyone seems to use yes but lets encrypt is hosted by the Electronic Frontier Foundation while others like ZeroSSL don't have quite the reputation ↺
-
tom
> I'm partly worried if I change certs from RSA it will break compatibility with a lot of software so it might be a good idea to get both honestly. I'm sure simply using a higher bit size RSA cert would have minimal issues with compatibility I think the days of not having ECC compatibility are behind us which is why I switched my certs over just now, but if you'd like I can report back here if there are any interoperability/federation issues from this switchover ↺
-
Samson Smith
>> Are there providers for free SSL certs other than let's encrypt? It's the only one I know about and what everyone seems to use > yes but lets encrypt is hosted by the Electronic Frontier Foundation while others like ZeroSSL don't have quite the reputation I understand I guess I'm stuck with let's encrypt then, especially because I use wildcard certs to make my life easier, I'm sure those cost a fortune elsewhere ↺
-
Samson Smith
>> I'm partly worried if I change certs from RSA it will break compatibility with a lot of software so it might be a good idea to get both honestly. I'm sure simply using a higher bit size RSA cert would have minimal issues with compatibility > I think the days of not having ECC compatibility are behind us which is why I switched my certs over just now, but if you'd like I can report back here if there are any interoperability/federation issues from this switchover That would be nice to know Tom, I think you have my contact as well and we share a few other MUCs you could let me know in any of those places as well ↺
-
Samson Smith
I just know already as it is some programs have issues with certs
-
tom
just message me here then, I'll probably forget
-
Samson Smith
I had to generate new ones to get everything to work nicely, like I think I generate a different cert from the one let's encrypt gives me for DNS over TLS
-
Samson Smith
Android doesn't like to use the cert they give me directly, I don't remember why
-
Menel
Ecc certs are old by now, I don't know software that doesn't work with it. I'm using Ecc certs since at least 5 years I think. I don't think you'll have to worry. And if something actually breaks you can just switch back
-
Samson Smith
Menel I can also just have both certs as well can't I
-
Samson Smith
Renew both monthly
-
tom
kalli.st, your cert expired
-
xa0.uk
more spam from jasjsnsnjsjs@c0nnect.de in c-o and biboumi@
-
xa0.uk
probably a target for rtbl?
-
xa0.uk
(not like i'm salty)
-
xa0.uk
also, some are saying this is probably the same group of spammers associated with syn.rip
-
Kris
already added to rtbl
-
Kris
these channels either don't subscribe to it, or it is a different jid
👍 1 -
jonas’
likely
-
jonas’
(likely they do not subscriber✎ -
jonas’
(likely they do not subscribe) ✏
-
j.r (jugendhacker.de)
jjsjaksj@c0nnect.de also seems to be a similar spammer
-
polarian
Hmmm seems depeering from c0nnect.de might be wise
-
polarian
Has anyone contacted them yet?
-
Kris
also already added
-
polarian
The whole server?
-
Kris
no the above JID
-
polarian
> Has anyone contacted them yet? I meant contacted the server admins ↺
-
polarian
I will do it then ig
-
trashserver.net Admin
> Has anyone contacted them yet? I have. No response so far.
-
trashserver.net Admin
Unfortunately the servers website is blank. No info about the admin.
-
trashserver.net Admin
I've reached out to the server Hoster / IP owner. Not sure if these are the same guys. Nevertheless, I've filed an Abuse message.
❤️ 3 -
Martin
Guus managed to contact them in the past.
-
xa0.uk
> I've reached out to the server Hoster / IP owner. Not sure if these are the same guys. Nevertheless, I've filed an Abuse message. ❤️ ↺
-
マリウス
does anyone have experience with ejabberd and know why its beam might end up going berserk at 99% on a CPU, with /var/log/messages filling up with `epmd[96954]: epmd: invalid packet size` messages?
-
tom
I don't, sorry.
-
polarian
> Guus managed to contact them in the past. I have attempted to contact them, no response yet ↺