XSF Discussion - 2016-12-29


  1. mathieui

    Tobias, what’s the talk that is going to say "federation doesn’t work" again?

  2. Tobias

    mathieui, https://events.ccc.de/congress/2016/wiki/Session:Are_decentralized_services_unable_to_innovate%3F#_0043166f5c425145741cb5a178a7ac3c

  3. mathieui

    oh ok, it’s not a in a big room

  4. mathieui

    that will probably be fun

  5. Zash

    But https://en.wikipedia.org/wiki/Betteridge%27s_law_of_headlines

  6. Tobias

    :D

  7. Flow

    Looking forward to what hanno has to say

  8. Tobias

    Flow, in what talk?

  9. Flow

    Tobias: the one you mentioned

  10. Tobias

    Flow, ah..i thought you meant another talk

  11. Flow

    That was one of the only lectures/sessions relating to XMPP I found at the 33C3

  12. Tobias

    Flow, yeah..there was a ton of matrix related stuff though

  13. daniel

    Tobias: a ton?

  14. daniel

    I've heard of one

  15. Tobias

    daniel, 2-3 i think :)

  16. Flow

    anything interesting amongst that ton?

  17. Tobias

    ah..misread one..so yeah..just one

  18. Tobias

    the other was a different matrix

  19. Flow

    just like the matrix movies: good there is only one

  20. Flow

    erm, *movie

  21. moparisthebest

    Good analogy Flow , matrix is like the matrix sequel to xmpp? :-)

  22. Flow

    which matrix sequel?

  23. daniel

    Imagine they made a sequel. That would probably have been pretty terrible

  24. Flow

    i've heard that sensa8 is not so bad

  25. Flow

    *sense8

  26. edhelas

    Sense8 is great yeah :) Can't wait for S02

  27. Flow

    edhelas: So you say I shall start watching it?

  28. MattJ

    I don't get it, there are (at least?) two Matrix sequels... it was a trilogy

  29. Zash

    MattJ: No, I'm afraid that was all a fever induced nightmare you had.

  30. mathieui

    just submitted a cloudflare abuse report for xmppspam.space

  31. mathieui

    wondering if anything will come out of it

  32. edhelas

    Moar spam ?

  33. mathieui

    not more

  34. Tobias

    mathieui: I doubt they will

  35. Tobias

    wow...MIX is alread 40% of the size of pubsub

  36. Tobias

    wow...MIX is already 40% of the size of pubsub

  37. SamWhited

    ouch

  38. Tobias

    i wonder if one could make that more compact

  39. Zash

    cut up pubsub into pieces, each smaller than MIX?

  40. Tobias

    probably

  41. SamWhited

    I suspect MIX and Pubsub could both be trimmed down. Surely they don't need all those features… (that last statement was only half joking)

  42. ralphm

    I have a physically chopped up XEP-0060 printout for quite a while now. I just haven't gotten to do all the editorial work to actually make it into separate XEPs.

  43. Tobias

    yeah..but with MIX you start fresh...you could already try to not bloat it up from the get go

  44. goffi

    MattJ: https://www.xkcd.com/566/

  45. mathieui

    I may have to hold edhelas back if the speaker reads some more moxie

  46. Zash

    What's the thing?

  47. Zash

    Will it be video'd?

  48. mathieui

    nah

  49. mathieui

    it’s https://events.ccc.de/congress/2016/wiki/Session:Are_decentralized_services_unable_to_innovate%3F

  50. mathieui

    Hanno has good points (that we already know), but some stuff is factually wrong though

  51. Zash

    Hanno who's name I recognize from litsts like oss-sec?

  52. mathieui

    yeah

  53. SamWhited

    That should be good; wish I were there for that.

  54. mathieui

    like, he’s the one who found a nice series of PHP CVEs "reading random code on the train on the way to 33C3"

  55. daniel

    Who cares about facts though

  56. mathieui

    (or raised the "gajim OTR leaks plaintext" CVE)

  57. Zash

    Tell them "Tradeoffs" and "Meh" from me.

  58. SamWhited

    The description sounds pretty bang on; I'd be curious to know what he gets right/wrong in the actual talk.

  59. daniel

    mathieui: did he?

  60. mathieui

    daniel, "raised", after it was fixed

  61. daniel

    I was under the impression that this was lovetox

  62. daniel

    Who found the bug

  63. Zash

    raised as in, so it got a CVE number?

  64. mathieui

    yeah

  65. mathieui

    so he still is kind of up-to-date and knowledgeable, I mean

  66. daniel

    Should have brought some straw for all the men he is building

  67. mathieui

    :D

  68. SamWhited

    Oh joy, another one of those; *sigh* I keep hoping someone will have an actual talk about this.

  69. xnyhps

    Haha

  70. Link Mauve

    Zash, https://www.zash.se/xmpp-features.html is now zero bytes.

  71. Zash

    Link Mauve: now then

  72. Link Mauve

    Zash, thanks.

  73. Link Mauve

    Oh, I didn’t contribute the server part of 0375?

  74. daniel

    I like how his rhetorical question bomb completely. 'who here ever received xmpp spam?' almost nobody raises hand. 'who here ever used xmpp video chat?' lots of people raise hand

  75. mathieui

    well, if he asked if people were using video chat often, it might have been a different answer

  76. Link Mauve

    :)

  77. daniel

    mathieui: :-)

  78. Link Mauve

    I actually use Jitsi Meet as my sole personal video chat client.

  79. edhelas

    mathieui, I'll call you after the conference to talk about it ;)

  80. mathieui

    sure

  81. mathieui

    I used XMPP video chat, 5 years ago, twice

  82. Link Mauve

    I helped ThibG test his implementation in Gajim 0.14, twice.

  83. Zash

    Didn't we use Jitsi meet at some recent summit?

  84. SamWhited

    We used it at the Austin one (it worked very well, if I do say so myself)

  85. Zash

    Link Mauve: That sounds like thing I might have done as well.

  86. mathieui

    so if I hear correctly one guy just suggested we should contribute to signal instead of writing XEPs

  87. Zash

    What's the point when I can't run my own server?

  88. edhelas

    incoming XEP-xxxx : Signal over XMPP

  89. xnyhps

    Zash: You can, but you're on there alone.

  90. SamWhited

    I wonder why we should contribute to signal instead of signal contributing to us… or why signal over <insert other favorite messaging app here>

  91. SamWhited

    Or why these two things are even related at all

  92. mathieui

    SamWhited, it has to mostly open-source

  93. Zash

    Isn't that basically OMEMO?

  94. mathieui

    SamWhited, although, I kind of agree that people complaining that signal uses GCM should just finish the pull request adding websocket support

  95. mathieui

    but I personnally don’t care obviously

  96. SamWhited

    I don't care about any of that; I was just pointing out that the argument could go either way

  97. Zash

    No, everyone should go invent yet another messaging thing from scratch for no reason!

  98. mathieui

    Zash, innovate!

  99. Link Mauve

    Zash, disrupt!

  100. waqas

    Zash: The big issue here is a lack of JSON. XEP-0295 has been out for years, yet implementations are scarce.

  101. Zash

    Try adding more JSON?

  102. Tobias

    Nobody was ever fired for using JSON

  103. SamWhited

    Were there any good points in the talk? We can mock, but this is an actual problem and it would be nice to solve some of XMPP's random incompatibilities.

  104. SamWhited

    This is why I still think we need to deprecate privacy lists, and XHTML-IM, and Message Archiving, etc. even if no full replacement exists yet. It just leads to confusion, a fragmented ecosystem, and talks like this.

  105. Zash

    Yes, a summary would be neat to hear before I run out of Futurama episodes to watch instead of going to sleep.

  106. waqas agrees with SamWhited about it being an actual problem to be discussed and solved

  107. Zash

    XHTML-IM is bad now?

  108. SamWhited

    I certainly think so; nothing that supports it renders anything the same as anything else that supports it, and I have yet to find a web client that supports it which I couldn't script inject.

  109. SamWhited

    Even if you only look at a single client and don't care if things render exactly the same between clients, you can pretty much always break that particular clients UI with it (by introducing images or huge text or whatever)

  110. SamWhited

    I don't know if that was one of the specific complaints people had; I was just trying to think of examples of things that I think break XMPP clients UX

  111. Zash

    Not that I personally would miss it, but I would care more for semantics than exact rendering.

  112. Zash

    Also, you should try to find the giant stick labeled 'Is the new MAM revision done yet?' and poke MattJ with it.

  113. Zash

    And whatever happened with Carbons?

  114. Zash

    Wasn't it supposed to be Draft-ified or updated or something?

  115. SamWhited

    The Carbons last-call kind of died out; I should bring that back up again.

  116. SamWhited

    I don't remember why; I'm sure there was some update that needed doing.

  117. mathieui

    SamWhited, all in all it was a pretty balanced talk

  118. mathieui

    slides will be online

  119. SamWhited refreshes the page a bunch :)

  120. Zash

    SamWhited: Tell me when to refresh the page so I can refresh the page.

  121. SamWhited

    Zash: wilco

  122. Tobias

    SamWhited, will write some mail to standards/members ML...the manifesto as nice, but is outdated for nowaday security standards

  123. SamWhited

    Zash: refresh the page

  124. Tobias

    compliance suites are nice, but the latest one doesn't include E2E security (OMEMO wasn't a XEP yet then)

  125. SamWhited

    (the website is the slides, I just discovered)

  126. SamWhited

    Ooh yah, we should definitely add it now that it is.

  127. Zash

    Hold on, I closed the page, let me just scroll up and find the link again so I can open it and refresh it.

  128. Zash

    Oh neat, only 22 hits for "Signal" in the slides

  129. SamWhited

    It seems to me that his core premise is that all messages should be e2e encrypted all the time and that there should be no plaintext fallback, but I disagree with that as a valid assumption. His foundation feels a bit shakey.

  130. Tobias

    SamWhited, we should have the client list on xmpp.org sorted by support of compliance suite features...simular to that page from daniel where he shows what service support which XEPs

  131. mathieui

    SamWhited, I agree with you, but I see his point

  132. mathieui

    I mean, ideally you should choose your admin, but ideally you should still not be 100% hoping on his goodwill

  133. Tobias

    SamWhited, and modernize that manifesto for requiring TLS 1.2 support, cleaning up inconsistencies, etc.

  134. Zash

    Ideally you should choose an admin within range of a tactical ballistic stones throw.

  135. moparisthebest

    But you can have that now with omemo, hell you could have it 10? Years ago with pgp xep27

  136. SamWhited

    I do agree with his assertion that having OMEMO and new-PGP is poor and not well justified; we should fix that too.

  137. moparisthebest

    Different use cases SamWhited

  138. moparisthebest

    Omemo forces forward secrecy, sometimes you don't want that

  139. SamWhited

    I don't disagree with that, but I don't think it's a good enough reason to have two separate crypto protocols.

  140. Tobias

    moparisthebest, it only forces it as implementation detail, doesn't it?...if you never delete your keys, you won't have FS, not?

  141. SamWhited

    His very next slide says "Is it good to idealize choice and sacrifice interoperability and security?" and I think the answer is no; we should only support OMEMO even if it means the no-FS use case isn't covered.

  142. SamWhited

    (in my mind)

  143. moparisthebest

    So I use xep27 for notifications from my servers, cronjobs and such I used to use email for

  144. Tobias

    right..but in the end it's protocol choice

  145. moparisthebest

    I'm not clear I could use omemo for that

  146. Tobias

    if hte new PGP XEP won't be part of the compliance suite, but omemo will, client devs have less incentive to implement it

  147. moparisthebest

    At least without keeping my keys too long etc

  148. Tobias

    moparisthebest, i'm sure omemo could also be used by notification bots

  149. SamWhited

    If it's a notification from your server isn't it already end-to-end encrypted (from the server to you) by virtue of using TLS?

  150. moparisthebest

    Tobias: well it connects, send the message and then disconnects

  151. SamWhited

    oh, not from your XMPP server, just "from my servers"; nevermind.

  152. moparisthebest

    SamWhited: yes, but why not pgp also? :-)

  153. Tobias

    right..but as long as it fetches the correct prekeys from the receipient via PEP

  154. SamWhited

    moparisthebest: because you've just increased your attack surface drastically and your reasoning is "why not"

  155. mathieui

    SamWhited, we usually refer to TLS as point-to-point, obviously

  156. Tobias

    daniel, there's nothing preventing a script from connecting, sending a omemo message, and disconnecting, right?

  157. Zash

    That Prosody bug possibly.

  158. moparisthebest

    SamWhited: I think it reduces attack surface, like if a tls bug happens, I'm fine

  159. SamWhited

    Adding more things with the argument "why not" is *never* an okay way to engineer anything. Redundancy can be good, but it generally needs justification. In this case you're just introducing more dependencies to a system that's complex already (more dependencies that can have their own vulnerabilities and issues which I could potentially attack).

  160. moparisthebest

    Then take out tls all together

  161. Tobias

    SamWhited, true

  162. moparisthebest

    After all these messages don't matter

  163. SamWhited

    In this case I'd argue that adding more stuff is at best pointless, and at worst dangerous.

  164. Tobias

    i hope the MIX step has nothing redudant in it...i'll have to read it :)

  165. moparisthebest

    They are like, just renewed a cert

  166. SamWhited

    Those slides were pretty excellent; now I'm even more sad I wasn't there. Thanks for the link!

  167. Tobias

    what was daniel's webpage that shows what service supports which XEP?

  168. SamWhited

    Tobias: https://gultsch.de/compliance.html

  169. Tobias

    thx

  170. SamWhited

    Tobias: Added it; although pretty soon these will need to be updated to "2017 compliance suites": https://github.com/xsf/xeps/pull/335

  171. Tobias

    SamWhited, thx...currently proof reading my mail about the talk and will send it in a bit..looking forward to a healthy discussion and ideally rather soon actions

  172. SamWhited

    Tobias ++; I'm looking forward to that. I'll try to be productive and not just gripe :)

  173. Tobias

    sent..didn't know if jdev or standards would be better...so i send it to both..but probably makes sense to continue the discussion on one of the lists

  174. Holger

    There's a version of Daniel's table ranked by greenness BTW: https://gultsch.de/compliance_ranked.html

  175. Tobias

    Holger, damn..wanted to link to that...thanks

  176. SamWhited

    Tobias: I added compliance suites/encryption to the council's agenda too. I think we should discuss it as a group, even thoug technically the PR doesn't need discussion.

  177. SamWhited

    Obviously I have views about what we should do, but I think it's important that we get this one right, so I'd like everyones feedback before merging that PR.

  178. Zash

    SamWhited: I think Conversations does 377 actually

  179. SamWhited

    Zash: Does it? I've been meaning to add it thinking it wasn't in there yet

  180. SamWhited

    I haven't been paying as much attention lately though, so I could have missed it quite easily

  181. SamWhited

    Oh hey, yup, there's a bunch of references that look about right in the source. Nifty.

  182. Zash

    Should be a checkbox or something when you block someone.

  183. SamWhited

    Maybe it doesn't show up because I have nothing to handle it on my server. I should add that plugin you made a while back.

  184. Zash

    The prosody module I wrote doesn't do anything besides loudly logging it yet tho.

  185. Zash

    And fires an event so you can write another module to do .. something .. sensible perhaps

  186. SamWhited

    Yah, not sure what I'd actually do with it yet. Maybe just collect stats for pretty graphs later.

  187. Zash

    Kinda tricky when we're doing Real Time(tm) things in that we might not know what the spammer/abuser sent because we already delivered and forgot all about it.

  188. Zash

    Otherwise we could do spam filter training

  189. Ge0rG

    Wow, all it takes to get people started about Easy XMPP is a 33c3 talk?

  190. Zash

    Started with what?

  191. SamWhited

    What's Easy XMPP?

  192. mathieui

    Ge0rG, yeah, I thought about that :D

  193. mathieui

    you need a better marketing

  194. mathieui

    I mean, I had https://wiki.xmpp.org/web/Easy_Onboarding open even before hearing about that talk

  195. Ge0rG

    SamWhited, https://wiki.xmpp.org/web/Easy_Onboarding

  196. Ge0rG

    https://wiki.xmpp.org/web/Easy_XMPP has some more, but it's lacking group chats

  197. Tobias

    Ge0rG, there have been some XMPP devs interest in Easy XMPP before, Swift was started to provide an easier to use/better UX client in comparison to Psi.

  198. Ge0rG

    mathieui, I'm sure the term is right, we just need more attention from developers...

  199. daniel

    We need more developers

  200. daniel

    Developers. Developers. Developers.

  201. Ge0rG

    Or maybe we need a different front person. My style just isn't popular

  202. Tobias

    daniel, yeah..especially that

  203. Tobias

    daniel, if only half of the room where involved in XMPP client dev :P

  204. Zash

    Marketing marketing marketing

  205. daniel

    Framing

  206. Ge0rG

    Flaming?! I'm in!

  207. Ge0rG

    Could somebody please send a link to https://wiki.xmpp.org/web/Easy_Onboarding to the ML thread? I'm on my mobile device and only have half the thread available...

  208. Zash

    Hey MattJ