-
icebound.dev
itsjustmyluck@xmpp.is --> PMing NSFW without consent
-
icebound.dev
not sure if the admin is here or not :)
- icebound.dev retracted a previous message, but it's unsupported by your client.
- icebound.dev retracted a previous message, but it's unsupported by your client.
-
icebound.dev
Sorry spoke too soon, someone thought they were funny pretending to be a fucking NSFW spammer, disregard my report.
-
icebound.dev
shit was meant to retract that not delete it locally 🤦♂️
-
icebound.dev
I am starting to realise that the servers I often get spam/abuse from are not in this channel, and are the ones which ignore reports :/
-
broke
you mean xmpp.is admin?
-
broke
is it a single person?
-
broke
there's something I wanna ask that seems to fit here the most, I asked this on the prosody chat and they pointed me to a very important thing. And that is server compliance with what restriction I am creating. I personally wanted less ports to be open and wanted to only support legacy ssl, meaning only tls (no starttls). But most servers seems to probe 5222 if there is an SRV with that, and if there is literally no 5269 or any port mentioned for xmpp-server, they reach me late because of doing starttls first. On clients I find the same thing as well. Clients always tries 5222 first. And servers always try 5269 first, Is there a reason to still do this?✎ -
broke
there's something I wanna ask that seems to fit here the most, I asked this on the prosody chat and they pointed me to a very important thing. And that is server compliance with what restriction I am creating. I personally wanted less ports to be open and wanted to only support legacy ssl, meaning only tls (no starttls). But most servers seems to probe 5269 if there is an SRV with that, and if there is literally no 5269 or any port mentioned for xmpp-server, they reach me late because of doing starttls first. On clients I find the same thing as well. Clients always tries 5222 first. And servers always try 5269 first, Is there a reason to still do this? ✏
-
broke
And here's the weird part for me...
-
broke
If I DO block 5269, sometimes s2s completely fails and servers doesn't even try 5270.
-
broke
Some servers do, others don't.
-
Samson Smith
icebound.dev what happened?
-
moparisthebest
that shouldn't be the case, clients and servers should only try those if all the srv records failed
-
broke
moparisthebest: If there is no SRV record for xmpp-server, It completely fails.
-
icebound.dev
> icebound.dev what happened? just sexual harassment lol ↺
-
icebound.dev
I thought it was a wider attack but it wasnt so I was just gonna drop it
-
broke
and If there is, but the port is blocked it _then_ tries 5270.✎ -
broke
and if there is, but the port is blocked it _then_ tries 5270. ✏
-
broke
I find this very very weird.
-
moparisthebest
> moparisthebest: If there is no SRV record for xmpp-server, It completely fails. that shouldn't be the case either... maybe time to report bugs to servers Conversations is a client that for sure won't do that ↺
-
broke
well, c2s works tbh, just not s2s.
-
broke
nonetheless you can even specify legacy ssl directly in conversations.
-
broke
which I do, that helps in faster connection.
-
broke
(which is the main reason to even do this)
-
icebound.dev
> there's something I wanna ask that seems to fit here the most, I asked this on the prosody chat and they pointed me to a very important thing. And that is server compliance with what restriction I am creating. I personally wanted less ports to be open and wanted to only support legacy ssl, meaning only tls (no starttls). But most servers seems to probe 5269 if there is an SRV with that, and if there is literally no 5269 or any port mentioned for xmpp-server, they reach me late because of doing starttls first. On clients I find the same thing as well. Clients always tries 5222 first. And servers always try 5269 first, Is there a reason to still do this? I do not see the benefit of reducing ports ↺
-
icebound.dev
any decent firewall lets you chain ports
-
broke
well, no starttls.
-
broke
big plus.
-
broke
legacy ssl is always great.
-
icebound.dev
funny enough starttls was picked over direct a while back, and up until recently openfire called direct "legacy"
-
broke
well, some people told me not to call it "direct tls"...
-
broke
;-;
- icebound.dev shrugs
- broke sighs
-
icebound.dev
anyways startls is too common, disabiling it is like disabling IPv4
-
broke
disabling IPv4 is a good thing though.
-
broke
I'd expect IPv6s to be the norm starting next decade.
-
broke
And deprecate IPv4.
-
broke
Please.
-
broke
s/next/next next//
-
icebound.dev
alright thats a second JID on my server itsjustmyluck@xmpp.is has spammed with nsfw, so I will now put it here in case others have issue with this JID.
-
Samson Smith
>> icebound.dev what happened? > just sexual harassment lol WTF ↺
-
broke
icebound.dev: err wait, how do you know this?
-
broke
that nsfws
-
icebound.dev
> that nsfws because they are spamming asking for help c**ing ↺
-
icebound.dev
I believe I know which spammer it is too
-
broke
spamming where?
-
broke
on dms?
-
icebound.dev
I thought they gave up months ago but seems like they are back, and im being targeted as I am the one which kept reporting them last time.
-
icebound.dev
> on dms? yes, but now has joined channels too ↺
-
broke
wait how did they get spammed in dms?
-
icebound.dev
because the MUC they joined doesnt protect JIDs :)
-
broke
...
-
broke
that's a stupid thing to do..
-
icebound.dev
doesnt matter, watch out for that JID
-
broke
alr.
-
broke
and iirc, gajim has anti-spam things if I heard this correctly.
-
Samson Smith
> I believe I know which spammer it is too Who ↺
-
broke
they probably should use one of those things now ig.
-
broke
I thought pubmucs with open JIDs were only used for private members only encrypted mucs. Don't you think it should be disallowed from pubmucs?✎ -
broke
I thought rooms with open JIDs were only used for private members only encrypted mucs. Don't you think it should be disallowed from pubmucs? ✏
-
broke
(Infact, that's required for omemo)✎ -
broke
(Infact, that's required for omemo, I mean encryption) ✏
-
Menel
> I thought rooms with open JIDs were only used for private members only encrypted mucs. Don't you think it should be disallowed from pubmucs? Moderators can always see all jids, and public rooms cam be configured that everyone sees that ↺
-
broke
The former is acceptable, the latter isn't.
-
moparisthebest
your client should warn you before you join if it doesn't report a bug
-
Menel
That's for each admin to deside. And your client to warn your when joining broke
-
broke
"your client to warn you" oh it does?
-
moparisthebest
conversations and forks for sure do
-
icebound.dev
> your client should warn you before you join if it doesn't report a bug I don't think gajim does but I know conversations does ↺
-
icebound.dev
not hiding JIDs can be useful sometimes, it is not so useful in public channels, but in private channels it can be useful to see other peoples JIDs
-
TheCoffeMaker
gajim does tell if MUC is anon, semi-anon or if your jid is publicly listable before u enter to that room
-
icebound.dev
> gajim does tell if MUC is anon, semi-anon or if your jid is publicly listable before u enter to that room oh right yeah, it tells you but doesn't warn you, its up for you to review the settings :P ↺