XSF Discussion - 2020-05-09


  1. Neustradamus_

    I am not sure but SCRAM-SHA-256(-PLUS) is prefered than SCRAM-SHA-1(-PLUS) no? -> https://xmpp.org/extensions/xep-0438.html

  2. Neustradamus_

    RFC 8600 is not listed -> https://tools.ietf.org/html/rfc8600 "When using the SASL SCRAM mechanism, the SCRAM-SHA-256-PLUS variant SHOULD be preferred over the SCRAM-SHA-256 variant, and SHA-256 variants [RFC7677] SHOULD be preferred over SHA-1 variants [RFC5802])"

  3. Neustradamus_

    -> https://github.com/xsf/xeps/issues/944

  4. pep.

    Neustradamus_, I'm not sure you understand what you just changed. All the SCRAM-*-PLUS are on the same level, they have the same priority

  5. pep.

    Also github is not the venue to discuss specifications

  6. pep.

    The RFC8600 thing seems like a valid concern though (not for me to judge, I'm no crypto-specialist). You should raise this on the standards list

  7. Neustradamus_

    pep.: Thanks for your reply

  8. Neustradamus_

    Prefered is not same

  9. Neustradamus_

    -> "When using the SASL SCRAM mechanism, the SCRAM-SHA-256-PLUS variant SHOULD be preferred over the SCRAM-SHA-256 variant, and SHA-256 variants [RFC7677] SHOULD be preferred over SHA-1 variants [RFC5802])"

  10. pep.

    I'm sorry I don't understand what you're trying to say

  11. pep.

    (and I'm also not the one to be convinced by the way)

  12. Neustradamus_

    SCRAM-SHA-256-PLUS > SCRAM-SHA-256 > SCRAM-SHA-1-PLUS > SCRAM-SHA-1

  13. pep.

    I invite you to raise this issue on the standards list then if you think it's important.

  14. pep.

    I'm going to close the github issue you opened though as it's not what we use github for

  15. Neustradamus_

    pep.: no no no

  16. pep.

    no?

  17. Neustradamus_

    It is important to keep open, the problem is not solved.

  18. pep.

    This is not the place to open it

  19. pep.

    The place is the standards mailing list

  20. Neustradamus_

    I think you can close all opened issues

  21. Neustradamus_

    Look here: https://github.com/xsf/xeps/issues

  22. pep.

    No, opened issues are editorial issues, not issues about standards

  23. pep.

    That is, something not being properly displayed, or broken links etc.

  24. pep.

    Is that ok?

  25. Neustradamus_

    There is an editorial problem here

  26. pep.

    No there isn't.

  27. pep.

    You're trying to change the meaning of a standard

  28. pep.

    Again if you want this to change, it may be a very valid concern, we have processes in place (sometimes annoying I give you that, but there are there nonetheless for reasons)

  29. pep.

    Are you fine with me closing the issue now? :)

  30. Neustradamus_

    No.

  31. pep.

    Well I'm sorry I tried the peaceful way.. but I'm going to close it anyway

  32. pep.

    If it happens I'm wrong I am very sorry but I really don't think this is an editorial issue.

  33. Neustradamus_

    A ticket is here for a trace, we do not close a not solved ticket...

  34. pep.

    So if you open a ticket on my XMPP client tracker saying "There is hunger in the world", should I keep it open forever?

  35. pep.

    Even if it's unrelated

  36. pep.

    (well somewhat..)

  37. pep.

    Does this make sense?

  38. Neustradamus_

    I can create a new ticket for explain missing RFC 8600 in XEP-0438 :)

  39. pep.

    Github is not the place for this.

  40. pep.

    Period.

  41. Neustradamus_

    I can create a new ticket to explain missing RFC 8600 in XEP-0438 :)

  42. pep.

    If you want to change standards, send an email to the standards list, please.

  43. Neustradamus_

    Please re-add the tracker.xmpp.org ^^

  44. pep.

    Raise that to board if that's an issue for you, I'll be happy to raise it

  45. pep.

    (Unfortunately I have an idea of the answer)

  46. Neustradamus_

    We will see the return of stpeter about it.

  47. Neustradamus_

    I know that some people think that SCRAM-SHA-256(-PLUS) is not needed.

  48. pep.

    I hope you understand this is not what I am discussing here

  49. Neustradamus_

    It is the official XSF MUC Room :) Maybe we must talk on jdev?

  50. pep.

    That is not what I mean

  51. pep.

    I'll do it in french quickly: Le fait que SCRAM-SHA-256* soit important ou pas n'est pas la question pour moi ici. La question c'est que Github n'est pas un endroit où on souhaite avoir des discussions concernant les spécifications. Les discussions sur le tracker sont uniquement déstinées à la forme (formattage, liens cassés, etc.). Les discussions sur les spécifications se passent sur la liste « standards »

  52. pep.

    (And that's it for baguette)

  53. pep.

    And I'm going to sleep now :x night

  54. Daniel

    Fwiw the benefits PLUS offers definitely outweigh the downsides of Sha1 over over sha2

  55. flow

    I have the same feeling, but that it's crypto territory, so I'd really like if someone could provide some arguments in either direction ;)

  56. flow

    I can 't find anything in my notes, but wasn't there something like tls-server-end-point being broken (or "broken")? it's been a loooong time since I looked deeply into the various channel binding types and TLS.

  57. flow

    hmm sam writes that tls-server-end-point is not specified(/avaialble?) in TLS 1.3? I'd assume that is the cb type that would also work, since IIRC it's simply the hash of the server certificate

  58. flow

    hmm sam writes that tls-server-end-point is not specified(/avaialble?) in TLS 1.3? I'd assume that is the cb type that would always work, since IIRC it's simply the hash of the server certificate

  59. Zash

    The TLS 1.3 RFC says in an appendix that channel bindings are not defined.

  60. Zash

    In a (oh btw those aren't defined), in the cellar behind a locked door marked "beware the otter"

  61. flow

    Zash, thanks. But does this mean it is impossible for technical reasons to use tls-server-end-point with TLS 1.3?

  62. Zash

    The only reason I know of is the parenthesis in https://tools.ietf.org/html/rfc8446#appendix-C.5

  63. Neustradamus_

    Zash: maybe but software can add it

  64. Neustradamus_

    I will show you examples

  65. Zash

    flow: the main implementation issue for me is that you need to know the signature algorithm used in the cert and I don't know it because all I have is a cert object with very limited introspection

  66. Zash

    tho 99% of the time it'll be SHA-256, so you could just guess that

  67. Zash

    because of how anything less than that should use SHA-256, but if someone somewhere has a cert with SHA-512 signatures then it'll break

  68. Zash

    and according to OpenSSL tls-unique works just fine in TLS 1.3 and I hadn't even noticed that it wasn't supposed to

  69. Neustradamus_

    A lot of RFC has been done before TLS 1.3 but it is not a problem to add support.

  70. Neustradamus_

    Example: http://w1.fi/cgit/hostap/plain/hostapd/ChangeLog - added experimental support for EAP-TLS server with TLS v1.3 EAP-TLS in not normally with TLS v1.3.

  71. jonas’

    Daniel, Ge0rG, please reply to my message on standards@ re message routing sprint

  72. jonas’

    Daniel, Ge0rG, I sent the announcement for the sprint just now and you’re welcome to join in :)

  73. Zash

    jonas’, do you have a *huge* whiteboard?

  74. jonas’

    Zash, I hear there are online whiteboard things

  75. jonas’

    I think they even have "infinite" scroll :)

  76. Zash

    on .. line? but I want 2d, not 1d! :P

  77. Zash

    infinite zoom too?

  78. jonas’

    not sure

  79. Ge0rG

    A Turing board?

  80. jonas’

    if only we had networked Inkscape already :)

  81. Ge0rG

    jonas’: thanks, I'll look into it

  82. Zash

    Yeah, that, be great, eh, Link Mauve?

  83. larma

    flow, > Actually the schema is irrelevant when it comes to RFC compliance. Schemas are non-normative. This is explicitly noted in the RFC. true, but the fact that this is described explicitly in the non-normative part thus very much clarifies that the lack of explicit prohibition is intentional and not by accident. Thus it's still relevant, even if non-normative. After all, the non-normative part isn't there just for fun. That's one thing I learned in law classes 😉

  84. jonas’

    good that you two agree (I read flows email saying essentially the same)

  85. moparisthebest

    Do any other protocols do TLS channel binding?

  86. Link Mauve

    Zash, if only I didn’t lose an important part of it from svn being terrible.

  87. Link Mauve

    I’m not done rewriting it yet. :/

  88. Zash

    moparisthebest: Yes. Probably LDAP and protocols like that.

  89. Zash

    moparisthebest: But HTTPS doesn't so who cares, right?

  90. moparisthebest

    Pretty much yes :)

  91. moparisthebest

    People: XMPP is too complicated XSF: hold my beer *writes more complicated authentication mechanisms with no real benefit*

  92. Zash

    I'd feel real special if the IETF & co invented channel bindings just for us :)

  93. jonas’

    As if HTTP was simple

  94. jonas’

    That’s a lie people can tell themselves because of widespread library support for their *simple* usecases.

  95. Zash

    It's so simple you just GET and POST and wait what's this section about caching and content negotiation?

  96. Carlito

    Hello

  97. Zash

    Hi