XSF Discussion - 2020-11-06


  1. Guus

    Is wiki.xmpp.org dreadfully slow for anyone but me?

  2. Guus

    Uhoh.

  3. Guus

    https://igniterealtime.org:443/httpfileupload/jiYCE27cESUD4UHmnYmyBSCeJVg/image.png

  4. Ge0rG

    same here

  5. Ge0rG

    MattJ: are you in a position to look at it?

  6. MattJ

    No :D

  7. MattJ

    Stirring porridge with one hand, holding a baby in the other, not near my laptop

  8. Zash

    How are you typing ! ?

  9. Ge0rG

    "Ok, Google!"

  10. MattJ

    Sorry, just found the gap between being in a position to fix the wiki and my actual situation comically high

  11. Ge0rG

    MattJ: just don't drop the baby, right?

  12. Guus

    or the porridge

  13. Ge0rG

    my priority would be baby > laptop > smartphone > porridge

  14. Guus

    We will take your suggestion under advisement.

  15. jonas’

    MattJ, at least the house isn’t on fire :D

  16. Ge0rG

    everything is fine.

  17. jonas’

    (totally made up combination of events which most definitely did not happen to anyone I know and they most definitely did not prioritize feeding the porridge over getting out of the house. luckily, and most definitely, the fire was small and nobody was harmed in this definitely made up situation)

  18. MattJ

    The wiki might be a bit more responsive now

  19. MattJ

    As far as I can tell it's being aggressively crawled by something

  20. MattJ

    Going into every "What links here" and diff pages, etc.

  21. MattJ

    So it's still slow

  22. dwd

    Do you also have an update on the porridge/baby situation?

  23. MattJ

    The porridge was mostly successfully consumed, even if the messy high chair, table and floor didn't look like it when my wife came in. And now baby duty is successfully handed over. I'm ready to take on the easier part of my day now :)

  24. vanitasvitae

    What happens if XEP-A is having a namespace bump, and XEP-B is depending on XEP-A? Is XEP-B required to bump its namespace as well?

  25. dwd

    Same rules apply. We bump namespaces if not doing so would otherwise cause aa interoperability problem.

  26. jonas’

    vanitasvitae, terror ensues

  27. jonas’

    see MIX

  28. jonas’

    where parts still use an old pam: namespace, which is confusing for implementations

  29. jonas’

    as they now have to support both namespaces for the specs-as-written

  30. vanitasvitae

    Okay, thanks

  31. flow

    vanitasvitae, ideally XEP-B would not simply depend on XEP-A but on (XEP-A, xep-a-namespace)

  32. Guus

    Thanks Matt. Good to know that the wiki isn't broken.

  33. vanitasvitae

    flow: got it. In that case a bump would not be required for XEP-B? Only if XEP-B would be uodated to use XEP-A:++?

  34. jonas’

    vanitasvitae, see what I wrote. that’s a PITA for developers.

  35. jonas’

    there’s not much of a sane way out of that with the way we currently bump namespaces

  36. Kev

    Namespaces should only be bumped if you can't interoperate under the existing namespace - almost always you can. We have bumped too often, I have little doubt.

  37. Ge0rG

    And in most cases you can accomplish the change with a new feature element

  38. Kev

    Yes.

  39. Guus

    There are no circumstances where it would be allowable to use an intermediate as a trust anchor (meaning, not validating the issuer of the intermadiate) when validating a certificate chain, correct?

  40. Zash

    I think in DANE that's a thing

  41. Zash

    You could also cache known indermediates and so allow people to have broken setups.

  42. Ge0rG

    Guus: if the intermediate is in your trusted root set, it should be safe to abort further validation

  43. Guus

    My concern is that any revocation checks are thus bypassed.

  44. Guus

    which arguably is acceptable if the intermediate has been willingly placed in a 'trusted' root set, I suppose...

  45. Ge0rG

    well, CRLs don't work anyway.

  46. jonas’

    Guus, the intermediate could also have its own CRL, right?

  47. jonas’

    thinking about the Let’s Encrypt transition period where they had their "root" signed by another well-known CA to be trusted right away on all systems

  48. Guus

    jonas’ I'm thinking that the CRL as advocated by the intermediate is primarily used to verify certificates issued by it. Should one trust an intermediate-provided CRL to include the intermediate itself, if, for some reason, it should not be trusted anymore? That does not feel particularly safe.

  49. Zash

    Guus, are you working on a crypto library?

  50. Guus

    As in: an intermediate that goes malicious won't ever include itself in the CRL.

  51. Guus

    Zash no, I want to understand how these details are supposed to work.

  52. Zash

    It seems reasonable that the revocation methods listed in a CA cert applies to the certs it issues

  53. jonas’

    Guus, ah, I see; well, what Guus said then; if you have something in your trust store, you don’t check the CRL for it. It’s in your trust store after all.

  54. jonas’

    s/Guus said/Ge0rG said/

  55. Guus

    I'm still not sure if that's correct. The entire reason for having CRL's is to be able to revoke an earlier decision to trust something.

  56. Guus

    What do you do when you have an intermediate as well as its issuer in your truststore, and the issuer adds the intermediate to its CRL?

  57. Guus

    Accept it, since it's in your truststore (which there should not be a need for, so I can understand the argument)

  58. Zash

    I suppose if you kept intermediates, you'd want to treat it as a RLU cache or somesuch, and then peridically check it against CRLs?

  59. Zash

    Isn't OCSP stamping(?) the thing now however? I.e. the server checks its own certificate and includes a "this is still valid" in TLS handshakes.

  60. Zash

    With CRLs and OCSP being fail-open which is weird for a security thing.

  61. flow

    vanitasvitae> flow: got it. In that case a bump would not be required for XEP-B? Only if XEP-B would be uodated to use XEP-A:++? Since there nothing has changed in XEP-B, no bump is required

  62. dwd

    Zash, I believe that given an cert, there are extensions available to find, download, and then cache the signer, so you can keep going until you find a known TA or a self-signed cert.

  63. dwd

    s/signer/issuer/ - I'm not thinking today. I think the AIA extension should help. http://pkiglobe.org/auth_info_access.html

  64. dwd

    Zash, Also, you're thinking OCSP Stapling, and for XMPP servers, I think you fetch the CRL periodically, and use that as a fallback to OCSP (with or without stapling), and if you can't do CRL or OCSP then fail.

  65. dwd

    Zash, My theory here is that there are very few CRLs you actually need as a server, so you're very likely to have that, and an attack which causes OCSP to fail then has a very small window to work with.

  66. Zash

    100% Let's Encrypt probably.

  67. dwd

    Probably 5 or 6 different CRLs, though 99% LE, yes.

  68. moparisthebest

    emus: very good work on newsletter once again, it's much appreciated :)

  69. Guus

    what he said ^

  70. emus

    ❤ Thank you guys, very happy you like it!

  71. jonas’

    Guus, ah, but CRLs are to revoke trust by the signer.

  72. jonas’

    while truststores are configured locally and have nothing to do with the signer

  73. jonas’

    (if it exists at all)

  74. jonas’

    so to revoke trust in a certificate from a trust store, you remove it from the trust store.

  75. flow

    hmm I was assuming that the CRLs override the trust from the truststore

  76. flow

    to check, the truststore is where your trusted root CAs certs are?

  77. jonas’

    yes

  78. flow

    ahh ok, I think I figured out where I went wrong

  79. dwd

    flow, A CRL lists the signatures by an issuer that are no longer valid, in effect. An issuer *could* be a TA, but is more likely to be an intermediate cert.