XSF Discussion - 2014-03-01


  1. dwd

    Kev, WHile I remember, you had objections to my XEP-0001 pass; could you post them to the list so others can agree/disagree?

  2. Kev

    Yes. It's in my todo system. This isn't particularly time-critical though, is it?

  3. dwd

    Kev, I think that the correct thing is that Editor approves Humour, but will run things past COuncil members and other advisors individually to ensure sanity. Possibly mandate that it's never me, since it hasn't ever been as far as I know. :-)

  4. dwd

    I'd like to keep momentum up on the discussion, if possible, then we can get it all over with.

  5. Kev

    OK. I'll try to get to it sooner than later, then.

  6. dwd

    Ta.

  7. Kev

    I'm not really sure I like the thought of there being any XEPs for which the approving body isn't either Council or Board.

  8. dwd

    These *are* Humorous ones. Maybe it needs "in consultaion with the XMPP Council Chair" specifically?

  9. Kev

    It seems somewhat self serving, but I'd be happy with direct approval by council chair, yes.

  10. Kev

    Although TBH I'm not sure what the problem with just using Council is.

  11. Kev

    What usually happens is just someone says to Council, quietly, "I'll be writing along these lines" and Council says "Fine, go ahead".

  12. Kev

    The counter to "These *are* Humorous ones." being "These *are* XEPs".

  13. Kev

    If we went with XEP Editors, we'd need to put in place some sort of rules for meetings and approval process, I think, which we don't currently have.

  14. Kev

    And being able to take a XEP through every step of the process autonomously dramatically changes the scope of the Editor team.

  15. Tobias

    anyone happen to know if XEP-0027 also works for MUCs? and wether that's implemented?

  16. Kev

    27 doesn't even work for presence :)

  17. xnyhps

    27 doesn't work.

  18. Kev

    And no, it wouldn't work for MUC.

  19. Kev

    Basically, don't go near 27.

  20. Tobias

    ok

  21. Tobias

    with doesn't work for presence you mean you can't encrypt presence messages?

  22. Tobias

    with doesn't work for presence you mean you can't encrypt presence stanzas?

  23. xnyhps

    You can sign presence or encrypt (but not sign) messages. That's all.

  24. Kev

    No, I mean that there's no protection against replay attacks.

  25. Kev

    It's full enough of holes that we should just stay well away.

  26. Kev

    Thus the mail I just sent to council@ about getting rid of it.

  27. Tobias

    PGP for email doesn't have that either, not?

  28. xnyhps

    Tobias: PGP signatures contain a datestamp.

  29. xnyhps

    in email.

  30. Tobias

    Kev, http://wiki.xmpp.org/web/XMPP_E2E_Security i've started to collect an overview about all proposals out there

  31. Tobias

    xnyhps, ahh..ok

  32. Kev

    You should probably mention that OTR doesn't have clean discovery.

  33. Kev

    Unless you know the person you're talking to has OTR from out-of-band discovery (e.g. talking to them), the experience is quite horrid.

  34. xnyhps

    I disagree with the "Yes"es for Authenticity and Integrity with PGP.

  35. Kev

    Right.

  36. Tobias

    xnyhps, it doesn't provide those?

  37. xnyhps

    Nope.

  38. Kev

    We should really forget 27 exists, and get rid of it.

  39. xnyhps

    Your messages aren't signed, any attacker can replace them with any other encrypted message.

  40. Kev

    Presumably in the other order, or we wouldn't remember what we were getting rid of.

  41. Tobias

    xnyhps, that's for XEP-0027, not for email usage of PGP right?

  42. xnyhps

    Yes.

  43. Kev

    Tobias: It provides complete protection as long as you have absolute faith in your server, their server, and all the networking in between.

  44. Tobias

    maybe i just expected XEP-0027 to be too much like email PGP

  45. Tobias

    Kev, right...why do i need e2e then

  46. Tobias

    :)

  47. Kev

    Yes.

  48. Kev

    See earlier question about burning 27 with fire.

  49. xnyhps

    +1 for fire.

  50. Kev

    s/question/comment/

  51. Tobias

    !xep 27 doesn't have discovery support either it seems

  52. Tobias

    at least i see nothing about disco in the XEp

  53. Kev

    Fire

  54. Kev

    It

  55. Kev

    Burn

  56. Kev

    With.

  57. Tobias

    updated the table...will add a couple sentences in the section above

  58. xnyhps

    I also disagree with the "No" for multiple resources for OTR.

  59. xnyhps

    But maybe it's also not "Yes". :P

  60. Tobias

    right..the detailed answer probably doesn't fit in a table cell

  61. Tobias

    but i could add a paragraph above in the section of OTR to it

  62. Tobias

    also wondering what version we should describe there? OTRv2 or OTRv3?

  63. Tobias

    what's used out there?

  64. xnyhps

    I don't actually know, beyond Pidgin and Adium.

  65. xnyhps

    (I'd also say "Malleable encryption" should be "n/a" for PGP, as it doesn't even have authenticity. Sorry for pestering you, I can't find my xmpp.org login.)

  66. Kev

    I wonder if it'd be interesting to do a 'real' gpg spec.

  67. Tobias

    it'd at least have great support for offline messages :)

  68. Kev

    It would.

  69. Kev

    And at least the methods for trust are established.

  70. dwd

    In fairness, XEP-0027 is better protection than many of the recent commercial "secure IM" services that seem to have sprung up.

  71. Tobias

    dwd, to what are you referring exactly?

  72. dwd

    Tobias, Most of the new security bandwagon services seem based around similarly, or worse, flawed models.

  73. Tobias

    *most* probably qualifies here, considering the ton on new services

  74. Tobias

    you guys know of any implementation of RFC 3923?

  75. dwd

    I don't. I have heard people say there hasn't ever been one.

  76. dwd

    In fairness, 3923 isn't even a bad design, as far as I can tell, it's just ugly.

  77. Tobias

    don't RFCs require implementation at some level?

  78. dwd

    Only to move to Draft, IIRC.

  79. Tobias

    ah..ok

  80. dwd

    Which is vaguely silly - they shifted the meaning of each level while keeping the requirements largely the same.

  81. Ge0rG

    isn't it finally time to consider one-to-one chats as a subclass of multi-user chats, security-wise? After all, you have your smartphone and your desktop connected (or connecting later) and want all your IM backlog there

  82. Ge0rG

    btw, how did WebRTC solbe the certificate/identity management problem for DTLS?

  83. Ge0rG

    *solve

  84. Zash

    There's a fingerprint in the SDP blob.

  85. Ge0rG

    Zash: how is that supposed to solve anything?

  86. Tobias

    users obviously will meet in person to validate those

  87. Zash

    And I don't know if there are actual certificates.

  88. Ge0rG

    if I meet my users in person, what do I need WebRTC for?

  89. Zash

    Ge0rG: Define "anything".

  90. Ge0rG

    Zash: anything is the set of IT security properties that a cryptographic protocol should be able to solve: integrity, authenticity, privacy, nonrepudiation|deniability, and one or more unimportant ones

  91. Zash

    Ge0rG: And a DTLS fingerprint does not?

  92. Zash

    Assuming you shuffle that securely to the other party, along with the rest of the SDP stuff

  93. Ge0rG

    Zash: so you are assuming a secure channel between two parties, which you use to construct a secure channel between these two parties?

  94. Zash

    The connection to a common server, yes. :)

  95. Ge0rG

    Zash: a trusted common server that does not manipulate your packets

  96. Zash

    Yes.

  97. Kev

    If you don't trust the server, when it's the server providing the application, you're in some amount of trouble.

  98. Zash

    That.

  99. Ge0rG

    ok, now that's where XMPP is different from WebRTC

  100. Kev

    Yes.

  101. Ge0rG

    does WebRTC support federation?

  102. Kev

    Different layer.

  103. Kev

    Or, kinda.

  104. Ge0rG

    (actually, that question does not matter.)

  105. Ge0rG

    I just realized that me trusting my own server does not help at all in establishing a federated session through a different, untrusted, server

  106. Ge0rG

    who can contribute to the xmpp.org wiki?

  107. Zash

    A bunch

  108. Zash

    You, if someone gets you an account :)

  109. Ge0rG

    ah, so the formal requirement is "get yourself added"

  110. Tobias

    right

  111. Tobias

    basically you just ask for an account in the jdev chatroom and some admin will likely create an account for you