XSF Discussion - 2018-01-29


  1. Guus

    For those that want to attend the Summit, and have not yet send me their email address: _please do so now_. It's needed to generate a wifi code, as well as building access.

  2. Ge0rG

    https://news.ycombinator.com/item?id=16257073 - zero xmpp.

  3. mathieui

    Ge0rG, first post is pidgin/adium + OTR, which includes xmpp

  4. Ge0rG

    Right, which is a set of broken and outdated things.

  5. SouL

    Ge0rG, you can reply recommending XMPP then :D

  6. Ge0rG

    SouL: oh, yes. Which one of the horrible desktop clients shall I recommend?

  7. jonasw

    Ge0rG, tell them that e2e is useless anyways

  8. jonasw

    I thought that’s your speciality? :)

  9. Zash

    Doesn't any mention of XMPP just attract hordes of pro-Matrix trolls?

  10. mathieui

    that it does

  11. Ge0rG

    jonasw: I only hate E2EE over XMPP, because it doesn't match the comms model of XMPP in any reasonable way

  12. SaltyBones

    Ge0rG, why not? Because it is not multi-device?

  13. Ge0rG

    SaltyBones: because it's absolutely decoupled from the XMPP identity model.

  14. SaltyBones

    Ge0rG, but that is rather common isn't it?

  15. SaltyBones

    Or do you mean something like in GPG where a key specifies the e-mail address it is for?

  16. Ge0rG

    SaltyBones: not in protocols where e2ee is a first class citizen

  17. Ge0rG

    SaltyBones: no, I mean things like tox where your public key is your ID

  18. SamWhited

    I haven't used Tox, but that sounds like GPG levels of unusability…

  19. Ge0rG

    SamWhited: take Briar, then.

  20. jonasw invokes Zookos Triangle

  21. SamWhited

    As long as I don't have to remember a key then I'll take just about anything

  22. Zash

    All hail the great Zooko

  23. Ge0rG

    jonasw: thanks very much. XMPP is the crypto protocol that only checks off one of the three points.

  24. moparisthebest

    Ge0rG, a key being inseperable from an identity isn't great either, I lose my phone, and suddenly have to let all contacts know? ew

  25. Ge0rG

    moparisthebest: only if you define key as being the same as phone.

  26. moparisthebest

    how else could you define it

  27. Zash

    Run your own CA

  28. Ge0rG

    moparisthebest: in a dozen of other ways :P

  29. moparisthebest

    how about you have a well defined account name, maybe in the format of local@domain, and then verify keys out of band? :D

  30. Ge0rG

    moparisthebest: that's great, except it doesn't give any strong binding between your identity and your keys.

  31. moparisthebest

    it does if you verify it out of band

  32. Ge0rG

    moparisthebest: in which case you can as well have cryptographic identities

  33. Zash

    Who verifies it?

  34. moparisthebest

    user, if they want

  35. moparisthebest

    my only point is both have upsides and downsides, the upside of xmpp being everything else just works and you don't have to reinvent the wheel

  36. Ge0rG

    except that not everything works in XMPP

  37. moparisthebest

    better than reinventing the wheel

  38. Zash

    And E2EE is actively making things worse for me now. Messages only showing up on my phone :(

  39. Ge0rG

    Zash: what? If only somebody could have warned you!

  40. moparisthebest

    another reason identity-tied-to-key is worse, now you lose multi device support

  41. MattJ

    +1

  42. moparisthebest

    that's just something that can be approved, rather than each user manually trusting all device keys of a contact, once they trust one, they could trust all others based on a signature from the one they trusted

  43. moparisthebest

    s/approved/improved/

  44. Ge0rG

    moparisthebest: exactly my point

  45. moparisthebest

    what is

  46. Ge0rG

    strapping a per-device crypto identity on top of a federated per-account identity is just not going to work. full stop.

  47. moparisthebest

    no, it'll work just fine

  48. moparisthebest

    sure it's not ideal today, but all the building blocks are there to make it ideal

  49. Ge0rG

    moparisthebest: the building blocks are there to make it barely usable.

  50. moparisthebest

    my point is strapping per-device crypto identity mixed with identity-per-contact is unusable with multi device

  51. Ge0rG

    Yes.

  52. moparisthebest

    so the xmpp approach is clearly better

  53. Ge0rG

    looks like we are saying the same.

  54. Ge0rG

    Wait.

  55. Zash

    Ge0rG: It might work but it'll be a hack.

  56. Ge0rG

    moparisthebest: what you just described as unusable _is_ the XMPP approach.

  57. Zash

    Model conflicts all over

  58. moparisthebest

    no

  59. moparisthebest

    what you said is ideal, the key *is* your identity

  60. moparisthebest

    is not compatible with multiple devices

  61. Ge0rG

    moparisthebest: you can export the key.

  62. moparisthebest

    do any current systems work that way?

  63. Ge0rG

    I surely hope so.

  64. moparisthebest

    I seriously doubt it, if you are routing based on key not quite sure how you route to 2 different places

  65. moparisthebest

    sounds hard

  66. Ge0rG

    moparisthebest: either all of your devices use the same identity key, or you have device keys that are all maintained under your identity key.

  67. moparisthebest

    by the way, it doesn't actually solve any problem, before you had a *name* and have to out-of-band ensure it matches a *key*

  68. moparisthebest

    and now you have a *key* and can't match it to a *name*

  69. moparisthebest

    how is it different?

  70. Zash

    The direction of authority in XMPP is from DNS to servers to accounts to clients. E2E wants it in the other direction, sorta

  71. moparisthebest

    it's not that straightforward anymore when you add DNSSEC and CAs either

  72. moparisthebest

    the root problem is how do you match a key to a person

  73. moparisthebest

    and, iirc, that's not solved in any system

  74. Zash

    That's a hard problem

  75. MattJ

    It's just impractical to solve in the real world

  76. MattJ

    It's a nice technical challenge for ideological geeks

  77. Zash

    When everyone learns to do cryptographic signature algorithms in their heads then maybe

  78. MattJ

    and then SHA256 gets broken

  79. moparisthebest

    the best we can do is 'good enough' for most people and 'rock solid' for the people who really care, which I think is basically what we have

  80. Zash

    Then having users as the root of trust might work

  81. SaltyBones

    I like ideas like certificate transparency and CONIKS

  82. SaltyBones

    combining that with some good old WoT and a nice scan-barcode-to-verify should actually be pretty good

  83. moparisthebest

    today you can meet people in person, or call them, or whatever, and verify identity, that's the rock solid for people who care

  84. moparisthebest

    on the 'good enough' front, if bob from the xsf messages me, whatever, talking with him for a bit is 'good enough'

  85. moparisthebest

    I mean here I am talking with Ge0rG in an anonymous muc, he might not even be the same Ge0rG from yesterday, clearly we couldn't care less about identities in XMPP :P

  86. Zash

    People can grasp hierarchical systems, we have them everywhere, in companies and organizations. P2P and WoT is like anarchy :)

  87. SaltyBones

    Zash, actually I think WoT is very natural for people but the WoT for e-mail is not explicit enough for people to get it and it is too complicated to maintain it

  88. SaltyBones

    The bigger issue is that WoT has huge privacy issues

  89. Ge0rG

    > the root problem is how do you match a key to a person http://web.archive.org/web/20110501005631/http://thealiceandbobsuicide.org/

  90. SaltyBones

    I think a combination of a public ledger for assigning jid<->key combined with automatic WoT verification with known users would be cool

  91. SaltyBones

    Ge0rG, indeed but if you meet the person that is rather easy to do

  92. SaltyBones

    the question is how do you distribute that information so that it is readily accessible

  93. Ge0rG

    SaltyBones: the WoT for mail is absolutely broken.

  94. moparisthebest

    the people on my contact list fall into 2 categories, 1. People I know in-person and have verified keys in-person 2. People I don't know in person so who cares

  95. Zash

    Did you just suggest a blockchain?

  96. Ge0rG

    SaltyBones: just one keyword as explanation: transitive trust.

  97. SaltyBones

    Zash, I almost certainly did not, sir!

  98. moparisthebest

    you said public ledger

  99. SaltyBones

    But yeah, the implication is there, but something like certificate transparency does would work as well

  100. moparisthebest

    if you trust the certificate transparency servers I guess

  101. SaltyBones

    you guess correctly

  102. Ge0rG

    the blockchain is a complex solution to a single problem of a distributed currency: double-spending.

  103. Ge0rG

    I wonder how double-spending is a problem with public identities.

  104. moparisthebest

    easy, because key X signs a message saying they own me@mydomain.com

  105. moparisthebest

    now if key Y comes along and signs they own me@mydomain.com you know it's not valid

  106. Ge0rG

    moparisthebest: how do you know that key X is legitimate?

  107. moparisthebest

    they signed it first!

  108. Ge0rG

    moparisthebest: okay, so if we have a public ledger, the first to sign a JID wins.

  109. moparisthebest

    yep

  110. moparisthebest

    first come first served

  111. Ge0rG

    how does that prevent me from signing *@xmpp.org

  112. moparisthebest

    it doesn't

  113. moparisthebest

    well * isn't valid so you'd have to sign a lot

  114. moparisthebest

    but yea

  115. Ge0rG

    So it's worthless as an identity tracking device. Good.

  116. moparisthebest

    no it'd track identity perfectly

  117. Ge0rG

    Claimed identity.

  118. jonasw

    I’d argue that you shouldn’t be able to claim something@domain, but only domain

  119. moparisthebest

    I just said earlier I think no one has solved this and it's basically impossible to solve :P

  120. jonasw

    (and then delegate claims for something@domain)

  121. Zash

    But xmpp.org is the authority over *@xmpo.org

  122. Ge0rG

    moparisthebest: so you are trying to solve a problem you think is impossible to solve?

  123. moparisthebest

    and PIR is the authority over .org and ICANN over that and US govt over that Zash , what's your point

  124. moparisthebest

    Ge0rG, nope it's solved good enough

  125. Ge0rG

    Except it's not.

  126. Zash

    moparisthebest: adding another name authority will create a mess

  127. Ge0rG

    jonasw: what you describe is the trust model of XMPP, without any need for E2EE

  128. jonasw

    Ge0rG, I admit I didn’t take a close look :)

  129. Ge0rG

    jonasw: servers are responsible for user identities on their service. XMPP.

  130. Ge0rG

    Now one _could_ add OMEMO keys in PEP on individual JIDs and encrypt-by-default, and have E2EE with server-trusted manually-verifiable identity.

  131. moparisthebest

    isn't that exactly how it works?

  132. SaltyBones

    I think he is missing the server-trusted...?

  133. moparisthebest

    I'm not really sure what that means then, the server doesn't need to trust anything

  134. SaltyBones

    I read it as "the server should provide trust in the identities it provides"

  135. SaltyBones

    Like signing the users keys or similar

  136. Zash

    Having the server sign user identities somehow ?

  137. SaltyBones

    Well, you could also use IBE if you want to go really crazy. :)

  138. moparisthebest

    the server does basically

  139. moparisthebest

    I mean the server should only allow those to be set from the account setting them

  140. moparisthebest

    alice@server can't set bob@server's pep nodes can she?

  141. Ge0rG

    I meant that the server is trusted by default

  142. moparisthebest

    Ge0rG, uh again that's how it works now

  143. Ge0rG

    moparisthebest: in the single-device case.

  144. SaltyBones

    I don't see what this has to do with e2e

  145. moparisthebest

    Ge0rG, https://gultsch.de/trust.html

  146. SaltyBones

    If you combine that with a CONIKS like transparency approach it is actually very good.

  147. Ge0rG

    coinks sounds like a pig.

  148. SaltyBones

    if you spell it like that it sounds like COIN-X another cryptocurrency

  149. Ge0rG

    or that.

  150. jonasw

    moparisthebest, didn’t you set up some ALPN test host?

  151. jonasw

    or domain?

  152. moparisthebest

    haven't set up the tests yet no, but mine requires alpn on the first record over ipv4

  153. jonasw

    I’d need something which always requires ALPN for the tests to be useful

  154. jonasw

    (I want to add that to the aioxmpp test suite)

  155. moparisthebest

    no don't have that yet sorry

  156. jonasw

    ah, pity

  157. moparisthebest

    you could use firewall rules to fake it, but then tests might only pass/fail on your machine

  158. jonasw

    yeah, I want to run that in travis CI

  159. moparisthebest

    probably easier to set up a test host yourself honestly :P

  160. Zash

    Can openssl s_server?

  161. edhelas

    https://blog.status.im/status-invests-5m-in-riot-im-4e3026a8bd50

  162. Ge0rG

    > Status - A Mobile OS, Built for Ethereum. No further questions. I rest my case.

  163. Zash

    Objection, relevance?

  164. Ge0rG

    Bullshit Bingo Strike.

  165. moparisthebest

    that's really all XSF is missing

  166. moparisthebest

    a marketing team full of master bullshitters

  167. vanitasvitae

    I read the URL like "status invests 5 minutes in riot im" :D

  168. moparisthebest

    hey, that's the same amount I invested in riot im

  169. SaltyBones

    pfff

  170. SaltyBones

    Furthermore, the collaboration between Status and Matrix is expected to: Utilize the Status Network token within Riot.im by enabling crypto assets

  171. SaltyBones

    they are bying influence and users

  172. vanitasvitae

    I actually tested it for a few weeks. The thing that dragged me back to xmpp/conversations was that the app could not receive messages when closed.

  173. vanitasvitae

    SaltyBones, sounds a little bit like the Telegram blockchain thingy

  174. SaltyBones

    vanitasvitae, did you test riot/matrix or whisper?

  175. moparisthebest

    I found it more confusing than any other IM app I've ever used

  176. moparisthebest

    and then I tried installing it on my wife's phone and messaging my username

  177. vanitasvitae

    SaltyBones, I tested the app from fdroid

  178. moparisthebest

    but then my IRC account on freenode got the message instead

  179. SaltyBones

    I mean, the fact that the app cannot receive messages while closed it unlikely to be a protocol restriction

  180. moparisthebest

    wtf

  181. SaltyBones

    I mean, the fact that the app cannot receive messages while closed is unlikely to be a protocol restriction

  182. vanitasvitae

    yeah, my phone doesnt have gcm

  183. vanitasvitae

    but I gave it the same permissions I also gave conversations

  184. jonasw

    moparisthebest, wtf

  185. moparisthebest

    jonasw, well turns out they have an always on freenode gateway, so if you search 'moparisthebest' in riot.im that came up before my new username :P

  186. moparisthebest

    still was confusing before I figured it out

  187. moparisthebest

    basically would not mark it 'easy to use'

  188. jonasw

    so you can search arbitrary users on freenode in riot.im?

  189. moparisthebest

    I've never accidentally messaged someone on freenode from conversations

  190. moparisthebest

    yep

  191. jonasw

    aha.

  192. moparisthebest

    but nothing clearly said 'this is an IRC user on freenode'

  193. edhelas

    who want to write some BS articles on the XMPP blog ? then we can get some funding to buy pizzas and stickers for the next Summit ?

  194. moparisthebest

    that's the problem, we need a master BS artist, and we are (all?) programmers

  195. edhelas

    like "5 steps to transfer your BTC with XMPP", "VR over XMPP, we tested it and it's trully amazing", "You'll never guess what they've done with XMPP"

  196. edhelas

    (for the last one just write how you can change the lights colors by sending <messages> :D)

  197. jonasw

    or maybe my actual thing which transports sensor data over XMPP

  198. jonasw

    and public transport departure times

  199. jonasw

    and shows it on an LCD

  200. Dave Cridland

    5 facts about XMPP: You'll never believe number four!

  201. moparisthebest

    is it that it uses XML

  202. Dave Cridland

    XMPP uses XML and people just can't handle it!

  203. jonasw

    There is a binary serialization of XML which is very compact!

  204. moparisthebest

    so compact that no one even uses it!

  205. Guus

    Dave, if you keep this up, I'm taking away your Facebook access again.

  206. moparisthebest

    so there are some interesting articles about XMPP and such, it just doesn't always call-out THIS IS XMPP https://motherboard.vice.com/en_us/article/595zg5/sopranica-jmp-wom-cell-network-diy-anonymous

  207. moparisthebest

    it might be neat to have an xmpp dedicated blog to talk about cool stuff being done with xmpp today, but I couldn't write articles, I'm bad with words :)

  208. moparisthebest

    here's another one https://motherboard.vice.com/en_us/article/8xm5v3/this-software-developer-is-making-a-surveillance-free-cell-phone-network (same topic)

  209. jonasw

    do we have a planet XMPP?

  210. jonasw

    like planet python

  211. moparisthebest

    maybe the xsf should just hire ossguy / Denver Gingerich to do it's marketing :)

  212. SamWhited

    We do have a planet XMPP… but I don't think anyone has used planets in years, so I'm not sure how much good it does. I don't even remember where it lives

  213. SamWhited

    jonasw: https://planet.jabber.org/

  214. SamWhited

    ossguys marketing works because he's marketing a service; the XSF doesn't have a service to market.

  215. moparisthebest

    that's basically half the problem, some of us want to market cisco's trademarked term, others don't :P

  216. SamWhited

    I don't think that's a problem or matters at all; the problem is that we want to market an abstract network and ecosystem of different products. Regardless of what we call it, people aren't going to be able to grasp that and it's just going to sound too confusing.

  217. moparisthebest

    that makes sense, what about just marketing FOSS stuff that uses XMPP though

  218. moparisthebest

    jmp.chat being one example of many

  219. SamWhited

    Yah, that seems good to me. People can grasp what jmp.chat or Conversations.im is; they don't need to know the protocol, just that there's a cool new chat service

  220. SamWhited

    And maybe somewhere it has an "XMPP Certified" or "Jabber Compatible" badge or something along those lines; most people won't care, those that do can find it.

  221. SamWhited

    Guus, Kev: I just noticed some XEPs that shouldn't be in the list and the website build appears to have failed 4 days ago and not run since then, FYI

  222. Kev

    Ta. something for after the summit, I think.

  223. Ge0rG

    SamWhited: "Jabber Compatible" is what we need a new Jabber Software Alliance for!

  224. Zash

    No, first we need a funny backronym and a shiny website and a billion dolares in marketing budget

  225. Guus

    Sam, I'm not understanding the details of what you're writing. I'm missing a comma, somewhere, I thnk :)

  226. Ge0rG

    Zash: we are full of "funny" backronyms, like SCAM. And nobody is going to give us billions, nor even millions of dollars.

  227. Ge0rG

    Maybe we can make a JabberCoin ICO.

  228. SamWhited

    Guus: sorry, that was confusing. The website hasn't been rebuilt for 4 days so the /extensions list is not up to date.

  229. SamWhited

    Guus: https://hub.docker.com/r/xmppxsf/xmpp.org/builds/ba3edxw2vyssrdcnovd6gps/

  230. Guus

    that's light on details :/

  231. Guus

    I can try to kick it off again?

  232. SamWhited

    sounds good, thanks

  233. Guus

    SamWhited: it's building now. For future reference: it should pick up any change in github (so you can trigger it by committing something). It should also be triggered by a successful build of the XEPs repo.

  234. SamWhited

    oh, I should have thought of that, thanks

  235. Guus

    (or rather, github pushes to XEPs will cause the XEPs dockerhub to kick off, which in turn will kick off the website one)

  236. SamWhited

    I just made a change, so I guess that would have rebuilt it soon anyways

  237. Guus

    ah, probably. I've now only delayed your change by triggering a manual build.

  238. jjrh

    A weekly "whats going on in XMPP" would be cool sorta like http://sachachua.com/blog/2018/01/2018-01-23-emacs-news/

  239. jjrh

    But I feel like that would have already happened if someone had the time.

  240. jjrh

    I have planet jabber in my rss reader though and it picks up a lot of stuff. It misses is what's happening in XSF-Standards that I gotta actually read my email ;)

  241. edhelas

    jjrh you should have Planet Jabber in your Pubsub feed reader :p

  242. edhelas

    you know "eat your own food" :p

  243. jjrh

    edhelas, any client recommendations?

  244. edhelas

    Movim :)

  245. jjrh

    I'll have to try it out.

  246. edhelas

    just wait ~10min, i've added the feed, it will appears soon

  247. edhelas

    but there's already a bunch of them :

  248. edhelas

    https://nl.movim.eu/?node/news.movim.eu/ArsTechnica for example

  249. jjrh

    so they are called 'communities' ?

  250. edhelas

    yup :)

  251. edhelas

    because "Pubsub Node" is too mainstream

  252. jjrh

    Gajim apparently has pubsub support but I never really figured out how to make it work.

  253. jjrh

    Thought it would be good for stuff like notifications/alerts and the like for the office. Better than spamming the group chat with a bot :P Folks can easily opt in or out

  254. jjrh

    https://de.movim.eu/?community/news.movim.eu/PlanetJabber there it is :D

  255. edhelas

    :)

  256. Neustradamus

    Any news about clients and servers removed on XMPP.org lists?

  257. Neustradamus

    "After a verification on xmpp.org, I found that the list has been changed, in the past when I managed the list, it will be more important. Psi and Psi+ have not in list, why? https://xmpp.org/software/clients.html http://psi-im.org/ + http://psi-plus.com/ Really strange for historical XMPP clients Metronome is not listed too on https://xmpp.org/software/servers.html https://metronome.im/ It was before ;)"

  258. moparisthebest

    Neustradamus: they need renewed annually or get removed automatically

  259. Neustradamus

    moparisthebest thanks for your reply! it is strange