Hang on, i didnt even check if i support it cause its libstrophe scope not mine, but is it just not used?
qy
What the heck even is it
wgreenhousehas joined
southerntofuhas left
southerntofuhas joined
Zash
SASL mechanism family, i.e. authentication
Titihas left
Titihas joined
florettahas left
qy
Right, whats special about it? Libstrophe definitely does sasl just fine as current 😶
goffihas joined
Zash
Password doesn't need to be stored anywhere or sent during auth, only hashes.
qy
Huh, cool
BASSGODhas left
dwd
It additionally only sends a further hash (a hash of a hash), itself encrypted, over the wire.
lorddavidiiihas left
BASSGODhas joined
sonnyhas left
sonnyhas joined
homebeachhas left
Matthewhas left
Rixon 👁🗨has left
uhoreghas left
Half-Shothas left
Half-Shothas joined
Matthewhas joined
Rixon 👁🗨has joined
uhoreghas joined
homebeachhas joined
wladmishas left
sonnyhas left
sonnyhas joined
mjkhas left
mjkhas joined
wladmishas joined
wladmishas left
chronosx88has left
chronosx88has joined
wladmishas joined
wladmishas left
kurisuhas left
Wojtekhas joined
kurisuhas joined
chronosx88has left
chronosx88has joined
emushas left
wladmishas joined
jl4has joined
john87has left
kurisuhas left
florettahas joined
ti_gj06has joined
kyemxdenhas left
kyemxdenhas joined
kurisuhas joined
wladmishas left
lorddavidiiihas joined
lorddavidiiihas left
lorddavidiiihas joined
chronosx88has left
wladmishas joined
chronosx88has joined
sonnyhas left
sonnyhas joined
sonnyhas left
sonnyhas joined
millesimushas joined
wladmishas left
sonnyhas left
sonnyhas joined
sonnyhas left
sonnyhas joined
sonnyhas left
sonnyhas joined
sonnyhas left
sonnyhas joined
kyemxdenhas left
kyemxdenhas joined
sonnyhas left
sonnyhas joined
kyemxdenhas left
millesimushas left
kyemxdenhas joined
sonnyhas left
sonnyhas joined
marc0shas left
chronosx88has left
kyemxdenhas left
kyemxdenhas joined
chronosx88has joined
emushas joined
ti_gj06has left
kurisuhas left
ti_gj06has joined
Wojtekhas left
jl4has left
Wojtekhas joined
jl4has joined
jgarthas left
millesimushas joined
florettahas left
tykaynhas left
tykaynhas joined
neshtaxmpphas left
neshtaxmpphas joined
Wojtekhas left
Wojtekhas joined
wladmishas joined
florettahas joined
Neustradamushas left
Neustradamushas joined
kurisuhas joined
adiaholichas left
adiaholichas joined
wgreenhousehas left
bunghas joined
lskdjfhas joined
djorzhas joined
ti_gj06has left
ti_gj06has joined
jl4has left
jl4has joined
wladmishas left
kyemxdenhas left
kyemxdenhas joined
wgreenhousehas joined
marc0shas joined
wladmishas joined
qy
Paranoia-level key transfer
bunghas left
bunghas joined
Zash
Unfortunately it's tricky to upgrade that hash without a service-wide password reset, so these efforts to push for SCRAM-SHA-256 and others is mostly harmful and leads to problems.
wgreenhousehas left
millesimushas left
qy
Gotcha
neshtaxmpphas left
neshtaxmpphas joined
wladmishas left
wladmishas joined
adiaholichas left
wgreenhousehas joined
Vidakhas left
jl4has left
Vidakhas joined
ti_gj06has left
bunghas left
xnamedhas joined
wladmishas left
ti_gj06has joined
jl4has joined
adiaholichas joined
kyemxdenhas left
bunghas joined
kyemxdenhas joined
adiaholichas left
papatutuwawahas joined
ti_gj06has left
adiaholichas joined
florettahas left
florettahas joined
adiaholichas left
adiaholichas joined
adiaholichas left
Wojtekhas left
Wojtekhas joined
chronosx88has left
chronosx88has joined
adiaholichas joined
millesimushas joined
xnamedhas left
ti_gj06has joined
wgreenhousehas left
Neustradamus
All major XMPP Servers supports, clients must to support it.
✎
florettahas left
Neustradamus
All major XMPP Servers support it, clients must to support it.
✏
MattJ
The server software may support it, but actual deployments? Almost none.
MattJ
As mentioned earlier, it would require every user to reset their password
wgreenhousehas joined
BASSGODhas left
guus.der.kinderen
As an aside: Martin was more than right in his response in the 'renew Mozilla Thunderbird' PR. We must not repeat this behaviour.
guus.der.kinderen
Thanks for responding immediately, emus.
emus
yes, sure
adiaholichas left
mathieui
Neustradamus: there is an acceptable level of nudging volunteer/unpaid projects into doing more work, and that limit can be reached very very quickly
Holgerhas left
mathieui
(Randomly pinging people on github crosses the threshold in a single step, obviously)
adiaholichas joined
Sam
It's really not worth engaging with this user; they love to ping tons of people all at once constantly. I can never tell if they're trolling, or if it's a language barrier, or if they just have some social problems but I can never get them to actually respond in a useful way either no matter how patient I was so I just gave up, it's not worth the time when they won't actually engage in discussing whatever perceived problem they think they're helping with.
pasdesushihas left
pasdesushihas joined
neshtaxmpphas left
neshtaxmpphas joined
Holgerhas joined
adiaholichas left
ti_gj06has left
Wojtekhas left
Wojtekhas joined
florettahas joined
neshtaxmpphas left
neshtaxmpphas joined
mjkhas left
mjkhas joined
adiaholichas joined
Guushas joined
Guushas left
Guushas joined
adiaholichas left
adiaholichas joined
eevvoorhas left
eevvoorhas joined
Guushas left
Guushas joined
Wojtekhas left
Guushas left
Wojtekhas joined
Calvinhas joined
Guushas joined
BASSGODhas joined
bunghas left
bunghas joined
BASSGODhas left
adiaholichas left
Guushas left
adiaholichas joined
jl4has left
Guushas joined
emus
I have excused to the two big teams that got multiple pings
papatutuwawahas left
papatutuwawahas joined
wladmishas joined
bunghas left
bunghas joined
Guushas left
xnamedhas joined
mjkhas left
mjkhas joined
Wojtekhas left
Wojtekhas joined
mhhas joined
wladmishas left
wladmishas joined
adiaholichas left
xnamedhas left
xnamedhas joined
ti_gj06has joined
restive_monkhas left
wladmishas left
wladmishas joined
BASSGODhas joined
adiaholichas joined
restive_monkhas joined
kurisuhas left
COM8has joined
COM8has left
uhoreghas left
homebeachhas left
Rixon 👁🗨has left
Matthewhas left
Half-Shothas left
Half-Shothas joined
Matthewhas joined
Rixon 👁🗨has joined
uhoreghas joined
homebeachhas joined
COM8has joined
COM8has left
adiaholichas left
sonnyhas left
sonnyhas joined
sonnyhas left
sonnyhas joined
adiaholichas joined
kurisuhas joined
adiaholichas left
papatutuwawahas left
restive_monkhas left
restive_monkhas joined
kurisuhas left
rafasaurushas left
reimarhas joined
rafasaurushas joined
emus
I reached out personally to the Thunderbird developer. Everything is alright and they understand.
kurisuhas joined
kurisuhas left
kurisuhas joined
adiaholichas joined
serge90has left
restive_monkhas left
kurisuhas left
serge90has joined
pjnhas left
pjnhas joined
neshtaxmpphas left
neshtaxmpphas joined
jl4has joined
restive_monkhas joined
papatutuwawahas joined
florettahas left
emushas left
rafasaurushas left
COM8has joined
COM8has left
mjkhas left
mjkhas joined
Wojtekhas left
Wojtekhas joined
rafasaurushas joined
eabhas left
restive_monkhas left
wladmishas left
chronosx88has left
chronosx88has joined
matkorhas left
matkorhas joined
restive_monkhas joined
florettahas joined
restive_monkhas left
rafasaurushas left
rafasaurushas joined
Kev
Thanks emus.
Ge0rGhas left
junaidhas left
Kev
This sort of thing really isn't a good look.
junaidhas joined
jl4has left
uhoreghas left
homebeachhas left
Rixon 👁🗨has left
Matthewhas left
Half-Shothas left
Ge0rGhas joined
Half-Shothas joined
Matthewhas joined
Rixon 👁🗨has joined
uhoreghas joined
homebeachhas joined
jl4has joined
rafasaurushas left
Neustradamushas left
Neustradamushas joined
Neustradamushas left
rafasaurushas joined
rafasaurushas left
rafasaurushas joined
ti_gj06has left
rafasaurushas left
COM8has joined
COM8has left
rafasaurushas joined
neshtaxmpphas left
neshtaxmpphas joined
djorzhas left
BASSGODhas left
BASSGODhas joined
djorzhas joined
dwd
Fun fact: On one of my Board stints I got quite far with getting DNSSEC support into the Isle of Man (.IM) registry, using various personal contacts through to their technical director, until someone decided to contact them directly without any introduction or coordination and just demanded they support DNSSEC because XMPP. I stopped getting replies after that, and I'm not surprised.
Zash
Sadness
rafasaurushas left
rafasaurushas joined
adiaholichas left
millesimushas left
jgarthas joined
kyemxdenhas left
kyemxdenhas joined
jl4has left
dwd
In the specific case of SCRAM, the SHA-3 variants have recently had push back at the IETF (as Sam and others will know) because of the problems of hash agility in deployment that Zash mentions earlier. SHA-1 isn't "great", certainly, but we need a better story for migrating than "Everyone change your password today!"
jl4has joined
jonas’
"everybody change your password soon" and have a transition period where you collect both hash types during password changes
jonas’
but it's messy nontheless
Zash
And with a sufficiently large site, there will be at least one straggler that _never_ changes password and halts that migration attempt.
dwd
jonas’, Yeah, nah. You can only usefully offer SCRAM-SHA-3 (yes, I know) once all users have changed.
adiaholichas joined
moparisthebest
Use plain, if you use your XMPP password elsewhere you are a bad person and should be ashamed
Zash
moparisthebest, looks like a downgrade attempt, won't work, clients will balk
Kev
I think they mean 'use only PLAIN, ever', which is how lots of deployments have to work anyway.
dwd
moparisthebest, Also allows credential theft and impersonation attacks, which SCRAM doesn't. Well, not trivially, anyway.
dwd
Kev, Indeed.
Zash
Kev, but that makes me sad.
moparisthebest
Correct, always use plain always
moparisthebest
For those who already use scram, oops
dwd
moparisthebest, Of course, the correct solution is "use X.509 always", and then frantically handwave when someone mentions key distribution.
Zash
You can force PLAIN and collect everyones password in plain text, then upgrade them to SCRAM-whatever
moparisthebest
Haha yea dwd
Zash
Dance Dance Key Distribution
kyemxdenhas left
moparisthebest
Everyone should authenticate with their OMEMO key
kyemxdenhas joined
moparisthebestruns away before being asked practical questions
Zash
Never!
Zash
Buuuuuut ... there's an RFC for using OpenPGP keys in TLS
Zash
and then SASL EXTERNAL
kyemxdenhas left
kyemxdenhas joined
dwd
Actually, OMEMO for subsequent auth isn't a bad idea. I think there's enough cryptomagic in the prekeys for the server to authenticate, right?
dwd
That leaves initial auth, and I think there's enough evidence that initial and subsequent authentication are radically different things now.
Zash
Does this magically solve the device tracking thing too?
dwd
Zash, Well, it begins to throw everything in a big pile together that looks like it might all be related, I think.
rafasaurushas left
Kevhas left
Zash
Like everything isn't already in a big pile.
dwd
Zash, Back when I was looking at MLS - and I still think that might eventually be a good idea - I was thinking that a dedicated client init key service made more sense than PEP. And tying that into device registration/management also makes sense. If you can unify subsequent authenticaiton into that, then there's only device feature publication and push left I *think*, both of which could connect in nicely.
dwd
Zash, And by "nicely" I mean "horribly", but you knew that.
millesimushas joined
ti_gj06has joined
Zash
Everything is PEP these days.
Zash
Finally living the dream of "everything is pubsub" !
rafasaurushas joined
dwd
Zash, Yes, but for prekeys/client init keys, PEP means that an attacker - in principle - could deliberately pick the same prekey as another conversation and therefore could - in theory - mount some kind of hithertofore undiscovered attack on the cryptography. Or could pick a weak (unspecified what this means) prekey. The other systems using similar hide the keys to avoid these attacks. They're theoretical - there's no known weakness in different keys, or key reuse, but the cryptanalysis of both Axolotl/Signal and MLS is predicated on the prekeys not being reused, so in theory blah-de-blah. Plus there's slightly more visibility on how many conversations the target is having, I think.
mhhas left
dwd
Zash, PEP is a load more immediately deployable though.
Zash
You had me at blah-de-blah.
dwd
Zash, I hoped you'd stopped reading by that point.
Zash
I do wonder if maybe it's time to have a dedicated roster-of-sorts for MUC bookmarks.
mhhas joined
dwd
Zash, Well, I occasionally wonder about MUC-PAM and things, so yeah.
Zash
And a crypto key thingymajigger for OMEMO
dwd
Zash, Oh, a thingymajigger. Yeah.
Zash
Surely there's a yet to be discovered section of XEP-0060 that would solve this problem with some sort of FIFO queue
Zash, But prekeys (and MLS client init keys) benefit from a random "grab and remove" until the bucket runs low, then a "grab and mark used" such that when the bucket is refilled, the used ones can be removed.
sonnyhas left
sonnyhas joined
dwd
Zash, It's an unusual pattern elsewhere. Plus it benefits from the contents of the bag being unknown.
dwd
Zash, I mean, the benefit is only marginal. But still.
BASSGODhas left
BASSGODhas joined
Tobiashas left
papatutuwawahas left
Tobiashas joined
papatutuwawahas joined
Tobiashas left
Tobiashas joined
Wojtekhas left
Wojtekhas joined
rafasaurushas left
rafasaurushas joined
jl4has left
Steve Killehas left
adiaholichas left
emushas joined
emushas left
adiaholichas joined
djorzhas left
djorzhas joined
emushas joined
Menelhas joined
debaclehas left
andrey.ghas joined
rafasaurushas left
Steve Killehas joined
Steve Killehas left
Steve Killehas joined
rafasaurushas joined
emus
dwd: Of course. I apologized and made clear this is not how we act here and he fully understood and said it did not affect him, he was just sorry for the volunteers and not related people. I hope most of them got this info.
jonas’
we should seriously consider blocking them from the xsf org for this.
jonas’
I thought about reporting to github, but all the reporting reasons require that you're affected directly, which I personally am not in this instance.