XSF Discussion - 2019-03-12


  1. moparisthebest

    what's the proper thing to use for a new namespace for a ProtoXEP ?

  2. moparisthebest

    like a URL I control, or make something up in urn:xmpp:X ?

  3. moparisthebest

    went ahead with my own URL for now, if that's not right could someone let me know? https://github.com/xsf/xeps/pull/765

  4. zinid

    moparisthebest: `urn:xmpp:X:0`

  5. Wiktor

    Isn't it `urn:xmpp:tmp:X`?

  6. zinid

    Wiktor: I think we got rid of tmp?

  7. Wiktor

    Oh, sorry then, I'm not up to date with this stuff

  8. zinid

    the problem with tmp is that it's quite possible that namespace wouldn't be bumped

  9. zinid

    and tmp will go into final šŸ˜

  10. Wiktor

    Yeah, that's the same with `X-*` headers in HTTP. They are discouraged now.

  11. jonasā€™

    moparisthebest, use something which is sensible from the urn:xmpp: namespace

  12. zinid

    urn:xmpp:dox apparently

  13. jonasā€™

    for example, yes

  14. jonasā€™

    :dox:0 even

  15. zinid

    let's polute the namespace by april 1st jokes!

  16. jonasā€™

    is that an april 1st joke?

  17. zinid

    yes

  18. jonasā€™

    oh

  19. jonasā€™

    I thought moparisthebest was serious.

  20. zinid

    yeah, you never know

  21. jonasā€™

    indeed

  22. zinid

    probably worth adding "humor" to the namespace path šŸ™‚

  23. jonasā€™

    :tmp would be less obvious and still ok

  24. zinid

    whatever, I just think aquiring "dox" acronym is not a very good idea, because it sounds nice and may be reused in more serious xeps šŸ˜›

  25. jonasā€™

    but itā€™s also fun because of doxing

  26. zinid

    yeah, so just append something to the namespace, don't let it be urn:xmpp:dox:*

  27. zinid

    urn:xmpp:humor:dox, whatever

  28. jonasā€™

    moparisthebest, urn:xmpp:tmp:dox seems good for now

  29. jonasā€™

    :tmp shouldnā€™t be used by serious protoxeps, and it looks innocent enough :)

  30. dwd

    We used to use :tmp: for all Experimental XEPs, but dropped it because it wasn't a stable namespace, and we wanted people to implement early and safely with Experimental. Of course, this has other downsides, like deployment pressure, but that's something I'm happier to live with.

  31. dwd

    But loosely, :tmp: was our X-.

  32. dwd

    zinid, urn:xmpp:humor is reserved for Officially Humourous Things, surely? Do we need a work team to decide what is Officially Funny?

  33. zinid

    dwd, sure we can schedule that work at April 1st

  34. Seve

    Not a fan of that personally

  35. Guus

    Seve you might have missed the importance of the suggested date. šŸ™‚

  36. Ge0rG

    https://matrix.org/blog/2019/03/12/breaking-the-100bps-barrier-with-matrix-meshsim-coap-proxy/ šŸ˜

  37. zinid

    Ge0rG: already on HN?

  38. Ge0rG

    No idea. But it's 25bps higher than STANAG XMPP

  39. zinid

    damn

  40. Ge0rG

    Higher = worse.

  41. zinid

    ah, right

  42. zinid

    good then šŸ˜

  43. zinid

    I use stanag all the time in the lift

  44. Guus

    How often are you in a lift?

  45. zinid

    I didn't count šŸ¤”

  46. zinid

    a few times a day?

  47. zinid

    subway is also a good source of high quality stanags

  48. Guus

    Please add a "XMPP STANAG TESTING ZONE" sticker.

  49. Guus

    https://www.lemark.co.uk/custom-printing/printed-barrier-tape/ šŸ˜

  50. Ge0rG

    šŸ‘

  51. moparisthebest

    I updated the namespace on the PR jonasā€™

  52. moparisthebest

    also that was part of my evil plan all along, I'll push this thing all the way to final leaving everyone wondering forever more "wait a second, is this a joke or not" >:)

  53. jonasā€™

    humorous track doesnā€™t have final

  54. moparisthebest

    I have it as Standards Track :D

  55. Zash

    Implement and deploy!

  56. Zash

    Like the JSON for BOSH XEP

  57. moparisthebest

    Zash, already done! https://github.com/moparisthebest/jDnsProxy/tree/dox deployed at xmpp:dns@moparisthebest.com/listener

  58. Zash

    !

  59. moparisthebest

    run it on your router, force your whole network DNS queries over XMPP

  60. MattJ

    and one day it will surface that DNS over HTTP was actually a similar joke that went too far?

  61. moparisthebest

    actually in ways this is better than DoH because of the long lived connection, no TLS setup each time etc

  62. jonasā€™

    you can have long-lived connections with HTTP, too

  63. Zash

    You can.

  64. Zash

    But do you?

  65. moparisthebest

    not quite *as* long lived, or as easily

  66. moparisthebest

    that is to say, the server is gonna disconnect you regularly

  67. jonasā€™

    a DoX server might as well

  68. MattJ

    DoXoH

  69. jonasā€™

    DoX-over-BOSH?

  70. MattJ

    Yes

  71. moparisthebest

    DoX isn't necessarily a server, my implementation of it right now is a client

  72. Zash

    over IP-over-DNS?

  73. jonasā€™

    moparisthebest, but you need a server as entry-point

  74. moparisthebest

    sure

  75. jonasā€™

    and that might disconnect you

  76. moparisthebest

    use it in combination with ping?

  77. Ge0rG

    moparisthebest: does it respond to plaintext requests?

  78. Ge0rG

    You always need to introduce a legacy mode

  79. moparisthebest

    nope needs raw DNS bytes

  80. Ge0rG

    How am I supposed to operate it from mobile, then? šŸ˜œ

  81. moparisthebest

    make a program to convert text to raw bytes, I use dig :D

  82. moparisthebest

    from mobile, use dig from Termux

  83. Guus

    At some point I'm going to throw a bucket full of ice cold water over you guys.

  84. jonasā€™ steps away

  85. jonasā€™ holds and caresses his sed(1)

  86. jonasā€™

    my preciouuusssss

  87. Guus adds more ice to the bucket.

  88. jonasā€™

    speaking of twisting stuff in ways to have fun with it: jslinux (<https://bellard.org/jslinux/vm.html?url=https://bellard.org/jslinux/buildroot-x86-xwin.cfg&graphic=1>) supports X11 and networking by now, networking happens via a general ethernet-layer WebSocket VPN (see http://www.benjamincburns.com/2013/11/10/jor1k-ethmac-support.html )

  89. flow

    moparisthebest, I am not sure that DoX should be humorous, it could prove useful

  90. moparisthebest

    I agree

  91. flow

    uh, it is standards track

  92. moparisthebest

    yep I did that on purpose, I'd still like it released on April 1st just for the ensuing hilarity and confusion though :D

  93. flow

    I was assuming it to be a <type>humorous</type> XEP based on your comment to accept it on 1.4

  94. flow

    mission accomplished I'd say ;)

  95. Zash

    Master level trolling you got there :)

  96. moparisthebest

    yay

  97. ralphm

    moparisthebest: https://xmpp.org/extensions/xep-0053.html#namespaces

  98. ralphm

    (for reference)

  99. Seve

    >Seve you might have missed the importance of the suggested date. šŸ™‚ Yes, I was saying that I don't feel very comfortable using XEPs for humorous things, just my personal opinon. I would just use a blog page or something that 1st of April and that's all.

  100. ralphm

    What is officially funny is up to the Editor.

  101. ralphm

    Seve: tough luck

  102. Guus

    who is German.

  103. Guus ducks, runs.

  104. ralphm

    Guus: tsk

  105. Seve

    ralphm, I'm not asking to change anything, just mentioning how I see it :) Never in my life encountered this, maybe that is english culture I don't know, but I'm not used to have official stuff being used for jokes, let's say. Again, this has been like that for ages, not going to ask for a change :)

  106. ralphm

    Seve: welcome to the world of standards bodies

  107. ralphm

    This might be a good start: https://tangentsoft.net/rfcs/humorous.html

  108. moparisthebest

    Seve, yea there is already a long history https://xmpp.org/extensions/xep-0183.html

  109. ralphm

    http://www.openrfc.org/humour.pl

  110. Seve

    moparisthebest, I'm aware :)

  111. moparisthebest

    besides in my opinion DoX is no more or less silly than DoH and everyone and their brother implements that so... :)

  112. ralphm

    I'm not sure if I agree DoH is silly in and of itself. I do think that having only two services for it (Google and Cloudflare) is terrible.

  113. moparisthebest

    and that quad9 one and anyone else that wants to run one

  114. moparisthebest

    but I agree with what I think your point is, that sending all DNS queries to a much smaller number of resolvers is a bad idea :)

  115. ralphm

    Right

  116. ralphm

    But as a protocol concept I'm not against.

  117. Zash

    But I am! HTTP-ification of all the things annoy me!

  118. moparisthebest

    start a DoX resolver now! be the change you want to see!

  119. Zash

    moparisthebest: Adding support to unbound you say?

  120. moparisthebest

    my resolver asks unbound yes

  121. moparisthebest

    which asks jdnsproxy, which asks a random dns-over-tls resolver over tor :)

  122. moparisthebest

    but you don't have to be *as* crazy

  123. moparisthebest

    you can just configure it to ask unbound

  124. ralphm

    I thought this was a great overview of this topic: https://blog.powerdns.com/2019/02/07/the-big-dns-privacy-debate-at-fosdem/

  125. Ge0rG

    Indeed, thanks for the link!

  126. moparisthebest

    the way I solve that personally is by querying DNS-over-TLS servers from a range of providers over tor

  127. moparisthebest

    I can trust I'm talking to who I think I am and evil exit nodes aren't modifying anything, they don't know who I am, no 1 provider has all queries, and I validate DNSSEC myself anyway

  128. Ge0rG

    That's... complicated

  129. moparisthebest

    what is?

  130. Ge0rG

    Your setup of DNS over Tor

  131. moparisthebest

    well I did end up writing jDnsProxy to support it yea, existing options weren't that great

  132. moparisthebest

    but *now* it's seamless :P

  133. Ge0rG

    Except for the 300ms latency?

  134. moparisthebest

    that's what serve-stale is for https://tools.ietf.org/html/draft-ietf-dnsop-serve-stale

  135. moparisthebest

    also unbound has various options to keep well used queries refreshed and such, overall it works quite well

  136. Ge0rG

    Some days ago I realized that the smack socks proxy client doesn't work with orbot.

  137. ralphm

    moparisthebest: is DNSSEC really a good thing, though? I've always wondered about its true utility and this thread didn't make it better. https://news.ycombinator.com/item?id=19241225

  138. Zash

    Are you reading the comments? On HN of all places?

  139. moparisthebest

    ralphm, eh it's totally different, a CA can issue a cert, not put it in the (new) cert log, and browsers etc still mostly trust it

  140. moparisthebest

    while .com *could* falsely sign a bad key, it's crazy public to do so

  141. ralphm

    Because many comments are bad, that doesn't mean all of them are. If you take your position to the extreme, you can stop reading on the internet. Or anywhere, I suppose.

  142. moparisthebest

    basically impossible to do targetted attacks with DNSSEC

  143. ralphm

    moparisthebest: so I understand you trust the security aspects of DNSSEC itself?

  144. Zash

    HN seems to think that anything that isn't HTTPS needs to die. If it's not JSON over HTTPS, then why even care?

  145. moparisthebest

    ralphm, I think by itself it's better than the current CA setup we have now, but combining them would be even better

  146. Zash

    And in that world, where HTTPS protects you from everything harmful, there's no need for anything else. DNSSEC is useless. IPv6 is useless.

  147. Ge0rG

    moparisthebest: I think you can do a targeted attack if you have control over a TLD zone and mitm your victim.

  148. Zash

    And XMPP is the most useless thing of all, it's not even JSON over HTTPS. Why even bother!

  149. Zash

    SCRAM is also useless. Why not just send plain text passwords over HTTPS? Can't be more perfectly secure than that!

  150. Seve

    True dat

  151. Ge0rG

    I think the biggest selling point of DNSSEC got lost with letsencrypt.

  152. Zash

    Ge0rG: The price? Yes.

  153. Zash

    Let's Encrypt also killed CAcert.org

  154. Ge0rG

    (you can get a free trusted certificate for your deployment)

  155. Ge0rG

    Zash: that's not true. CACert perfectly killed itself.

  156. Zash

    And they're well on their way to killing all other CAs and becoming ultimate gatekeeper for everything. Especially since everything must be HTTPS

  157. Ge0rG

    Zash: you need to take your depression medicine! šŸ˜œ

  158. moparisthebest

    Ge0rG: moparisthebest: I think you can do a targeted attack if you have control over a TLD zone and mitm your victim.

  159. moparisthebest

    if they also control a CA key and the victim isn't using DNS-over-$something_secure ???

  160. moparisthebest

    that seems like a pretty hard attack to pull off

  161. Ge0rG

    The second biggest selling point in my eyes would be secure delivery of client certificates, eg. for S/MIME

  162. Ge0rG

    moparisthebest: DANE can override Root CA trust. Any nobody is using Do# yet

  163. moparisthebest

    android ships by default using DNS-over-TLS so that's basically the opposite of nobody

  164. Ge0rG

    The biggest problem of DNSSEC isn't browsers but lack of support on TLDs and in resolvers

  165. Ge0rG

    moparisthebest: android 8?

  166. ralphm

    Regarding the targeted attacks, doesn't that depend on who the attacker is? E.g. I think state level actors get more control if you depends on DNSSEC. This problem also exists in the current public CA system, with countries like mine running an included CA. I'm not saying this is bad per se, but interesting if you're making threat models.

  167. moparisthebest

    I *think* it started with android 9

  168. Ge0rG

    So it's like 0.5% of Android devices? šŸ¤£šŸ¤£

  169. Ge0rG

    ralphm: yes, your conclusion is right. However, with certificate transparency, things have shifted again

  170. moparisthebest

    ralphm, I'm saying for a targeted attack with current CA setup, the attacker needs to MITM you and have *any* CA cert, with DNSSEC in the mix they'd need the DNSSEC root key, plus to compromise all the DNS servers from root all the way down to your domain, plus a CA cert

  171. ralphm

    Ge0rG: for CAs, yes

  172. moparisthebest

    it's just substantially harder

  173. ralphm

    moparisthebest: hence my reference to state actors

  174. Ge0rG

    moparisthebest: they only need to compromise one level of DNS on your domain path...

  175. moparisthebest

    and yes certificate transparency fixes a bit of that, but iirc only browsers check that?

  176. Ge0rG

    moparisthebest: if you have the signing key for domain.com from the crappy DNS cloud provider, you only need to mitm the victim

  177. ralphm

    Well certificate transparency fixes that for future occurrences by the same CA maybe, not individual cases.

  178. zinid

    moparisthebest: I think anyone can monitor CT logs?

  179. moparisthebest

    I pin the public key of my resolvers so owning any CA key won't help, they'd have to hack the specific provider

  180. Zash

    CT for DNSSEC. There, all problems with DNSSEC solved!! :)

  181. moparisthebest

    zinid, right but if you steal a CA cert and sign your own certificates those aren't in the CT logs, you have to check if it's in the CT log when deciding whether to trust it or not, I think only browsers do his right now

  182. ralphm

    I also like to point out that many companies have internal CAs to issue their own certs to be trusted. Once you include that in your list of trusted CAs, it also means that they can issue and thus MitM all the things.

  183. zinid

    stealing CA certificate sounds like a thing šŸ˜‚

  184. ralphm

    Unless you have some form of cert/key/CA pinning

  185. Ge0rG

    ralphm: and they often do traffic inspection

  186. Ge0rG

    ralphm: luckily for them, modern browsers don't enforce pining if the server certificate is signed by a locally installed CA

  187. Ge0rG

    So corporate mitm still works

  188. Ge0rG

    Did I just spoil your day?

  189. ralphm

    No, I refused to install the company CA

  190. ralphm

    (or software that could do that)

  191. Ge0rG

    Not something one can typically do on company provided gear

  192. ralphm

    Yes, this is another thing I managed to avoid for all employers so far. All of my machines (usually ThinkPads) came fresh out of the vendor-sealed box.

  193. Ge0rG

    Only intercepted by the government once.

  194. moparisthebest

    I just wipe the corporate windows image and install linux :/

  195. moparisthebest

    had a friendly sysadmin get me a virtualbox corporate windows image to use for skype etc

  196. moparisthebest

    he's gone now though, don't know what I'll do when the forced windows 10 upgrade comes around :'(

  197. ralphm

    Upgrade the virtualbox?

  198. moparisthebest

    upgrade the windows 7 running in the virtualbox

  199. ralphm

    Or backup/clean your drive, have them install it, then convert the disk to a virtual one?

  200. moparisthebest

    I tried all ways of doing that before and none would work, always windows BSOD after conversion

  201. moparisthebest

    it might be different now though, that was windows 7 and also years ago

  202. Ge0rG

    Cool, Firefox now implemented HTTP upload! https://blog.mozilla.org/blog/2019/03/12/introducing-firefox-send-providing-free-file-transfers-while-keeping-your-personal-information-private/

  203. ralphm

    Make sure you keep hold of your license key

  204. ralphm

    Ge0rG: nice

  205. zinid

    Ge0rG, at what servers get those files uploaded?

  206. Ge0rG

    the Firefox cloud servers!

  207. moparisthebest

    firefox has DoH implemented too I think

  208. moparisthebest

    just not on by default, yet

  209. zinid

    Ge0rG, wow such private, much security

  210. zinid

    Why does Firefox Send require JavaScript? Firefox Send uses JavaScript to: Encrypt and decrypt files locally on the client instead of the server. Render the user interface. Manage translations on the website into various different languages. Collect data to help us improve Send in accordance with our Terms & Privacy. <------- PRIVACY

  211. moparisthebest

    I was going to say firefox *probably* encrypts locally, that's how their sync stuff works, it's pretty good

  212. moparisthebest

    unlike google who's entire business model is scraping all your info

  213. zinid

    so far google's business model works better šŸ˜€

  214. moparisthebest

    for google, not for users :)

  215. zinid

    right, that's _google's_ business model, not yours šŸ˜€

  216. zinid

    but collecting data?

  217. zinid

    "we collect your DNA to improve our DNA analyzer"

  218. jonasā€™

    send us your nudes to help us protect them! #facebook

  219. bowlofeggs

    i hate the "are you a human" google things because you are helping them train their AI bots for free

  220. bowlofeggs

    they should pay me for doing that

  221. jonasā€™

    they "pay" you by allowing you to access content \o/ (sarcasm)

  222. bowlofeggs

    well these things are often used by non-google sites

  223. bowlofeggs

    but yeah i catch your drift ā˜ŗ

  224. bowlofeggs

    there was a planet money where they talked about the inequity between what google makes per user and what they give that user for that data

  225. bowlofeggs

    iirc, google makes something around $1200 per year per user

  226. bowlofeggs

    and in exchange, that user getsā€¦ e-mail

  227. bowlofeggs

    anyways, they interviewed some economist who thinks that someone will eventualyl start to pay users to use the services, in actual cash

  228. bowlofeggs

    to compete

  229. bowlofeggs

    the only problem is it that it would require enormous capital to compete with google, and you'd be competing by undercutting them, which requires even more enormous capital

  230. bowlofeggs

    well, "only" problem

  231. bowlofeggs

    there's also the network effect too of course

  232. zinid

    "also"

  233. ralphm

    Imagine they'd be good at doing social.

  234. Zash

    Google? Haven't they repeatedly failed at "social" things?

  235. zinid

    bowlofeggs, paying money to users is a huge taxing problem, especially when users come from many different countries, not sure how the tax will be administered in any particular country

  236. bowlofeggs

    true

  237. bowlofeggs

    so yeah, lots of problems ā˜ŗ

  238. bowlofeggs

    but the larger point was that users are not getting a good deal

  239. moparisthebest

    they have plenty of users using them for free...

  240. moparisthebest

    I don't honestly know the solution there, it's easy enough for me to run xmpp+email etc for family, but if I get hit by a bus they'll all move back to gmail for sure :'(

  241. moparisthebest

    at least until my kids get older and I train them >:)

  242. bowlofeggs

    well you could pay a company to host you, that has acceptable ToS

  243. bowlofeggs

    the key is that the company should make money from being paid for the service, instead of making money by selling data

  244. bowlofeggs

    obvs, you have to trust them too

  245. bowlofeggs

    but even if you self host, you have to trust the vendors for the software and hardware you use to do that

  246. bowlofeggs

    so you can't escape trust, it's just a matter of where you want to draw the line

  247. ralphm

    Zash: my point?

  248. bowlofeggs

    i personally self host, but it's more because i find it kind of satisfying

  249. moparisthebest

    also legally at least in the USA if your data is on a 3rd party server, the govt can access it any time without a warrant or notice, for any reason

  250. bowlofeggs

    it's sort of the proof of how cool open source software is ā˜ŗ

  251. bowlofeggs

    moparisthebest, indeed

  252. moparisthebest

    https://en.wikipedia.org/wiki/Third-party_doctrine

  253. moparisthebest

    so just from a principle point of view, you have to self-host on a server in your house :'(

  254. Alex

    hey guys, anyone ready for our member meeting?

  255. Zash

    Hey!

  256. Guus

    O/

  257. moparisthebest

    been waiting for it all day

  258. Alex

    LOL

  259. Alex

    okay

  260. Alex bangs the gavel

  261. Alex

    here is our Agenda for today: https://wiki.xmpp.org/web/Meeting-Minutes-2019-03-12

  262. Alex

    1) Call for Quorum

  263. Alex

    as you can see 31 members voted via memberbot. So we have a quorum

  264. Alex

    2) Items Subject to a Vote

  265. Alex

    new and returning members. You can see all applicants here: https://wiki.xmpp.org/web/Membership_Applications_Q1_2019

  266. Alex

    3) Opportunity for XSF Members to Vote in the Meeting

  267. Alex

    anyone here who has not voted yet and wants to vote here in the meeting?

  268. Alex

    looks like nobody want to vote in the meeting

  269. Alex

    then I can start counting and work on the result

  270. Guus šŸ„

  271. Alex

    4) Announcement of Voting Results

  272. Alex

    When you reload the page you can see the results: https://wiki.xmpp.org/web/Meeting-Minutes-2019-03-12#Announcement_of_Voting_Results

  273. Alex

    All applicants were accepted

  274. Alex

    All Reappliers except of Bartlomiej Gorny were accepted

  275. Ge0rG

    Yay!

  276. Alex

    5) Any Other Business?

  277. Neustradamus

    Thanks!

  278. Alex

    and congrats to everyone ;-)

  279. Ge0rG

    Congrats to everyone but the person who didn't fill out the application

  280. Alex

    6) Formal Adjournment

  281. Alex

    I motion that we adjourn

  282. Zash

    šŸ‘

  283. Guus

    Seconded

  284. Alex bangs the gavel

  285. Guus

    Thank you once again, Alex

  286. Alex

    I am travelling right now. Willl send out the minute sand create the application page for the next quarter asap

  287. Guus

    Alex: thanks, safe travels!

  288. Zash

    Thanks, Alex.

  289. Syndace

    Weee thanks :D Happy to be an official member now!

  290. Guus

    Welcome to the dark side

  291. Zash

    Welcome to the sharp side, here's your angles: <<<<<

  292. Ge0rG

    Zash: we also need the closing ones!

  293. Zash

    Just turn them around! :)

  294. Neustradamus

    Syndace: Welcome :)

  295. zinid

    > All applicants were accepted šŸ¤£šŸ¤£šŸ¤£

  296. ralphm

    Interesting blog post + comments (hi Zash)

  297. ralphm

    news.ycombinator.com/item?id=19370281

  298. ralphm

    Surprisingly positive about (and reminiscent of) XMPP.

  299. Ge0rG

    Represented by pidgin.

  300. Zash

    Kev, my server tells me your cert expired