am I missing it somewhere or does the DNS method here have a giant security hole https://xmpp.org/extensions/xep-0156.html ?
nycohas left
APachhas left
moparisthebest
you want to connect to example.org , _xmppconnect.example.org tells you to connect to wss://evil.com/xmpp , is that ok?
moparisthebest
if you grab host-meta from https://example.org/ that doesn't have the same problem, also if you have DNSSEC on example.org you have no issue, but it doesn't mention either
Alexhas left
florettahas left
Calvinhas left
chronosx88has left
chronosx88has joined
վարյաhas left
վարյաhas joined
intosihas left
florettahas joined
pasdesushihas joined
msavoritiashas joined
rafasaurushas joined
վարյաhas left
վարյաhas joined
marc0shas left
marc0shas joined
stphas left
adiaholichas left
chronosx88has left
chronosx88has joined
karoshihas left
restive_monkhas left
adiaholichas joined
intosihas joined
qwestionhas left
վարյաhas left
վարյաhas joined
atomicwatchhas left
վարյաhas left
վարյաhas joined
Tobiashas joined
mdosch
Doesn't evil.com still have to present a cert valid for example.org like with normal SRV records?
atomicwatchhas joined
Sevehas joined
pasdesushihas left
millesimushas left
restive_monkhas joined
intosihas left
վարյաhas left
վարյաhas joined
adiaholichas left
gooyahas joined
adiaholichas joined
pasdesushihas joined
jcbrandhas joined
moparisthebest
that would be trustworthy, but XEP-0156 doesn't mention that as far as I see ?
moparisthebest
and which domain do you send in SNI ?
restive_monkhas left
wladmishas left
restive_monkhas joined
me9has joined
serge90has left
restive_monkhas left
restive_monkhas joined
atomicwatchhas left
restive_monkhas left
Mikaelahas joined
moparisthebest
I'm also unsure if XEP-0368 is correct in relation to SNI, if example.org 's SRV DNS response is DNSSEC signed and it says xmpp.example.org is the target, which name do you include in SNI ?
intosihas joined
restive_monkhas joined
Menelhas joined
norkkihas joined
norkkihas left
Paganinihas left
dwdhas joined
վարյաhas left
վարյաhas joined
atomicwatchhas joined
ti_gj06has joined
wurstsalathas joined
rafasaurushas left
restive_monkhas left
dwdhas left
intosihas left
Andrzejhas joined
restive_monkhas joined
me9has left
rafasaurushas joined
վարյաhas left
harry837374884has joined
adiaholichas left
kurisuhas left
kurisuhas joined
adiaholichas joined
jgarthas left
Andrzejhas left
Steve Killehas left
Steve Killehas joined
karoshihas joined
Steve Killehas left
marc0shas left
marc0shas joined
BASSGODhas left
adiaholichas left
adiaholichas joined
Steve Killehas joined
matkorhas left
guus.der.kinderenhas left
guus.der.kinderenhas joined
marc0shas left
marc0shas joined
Titihas left
marc0shas left
marc0shas joined
djorzhas joined
emushas joined
BASSGODhas joined
marc0shas left
marc0shas joined
marc0shas left
marc0shas joined
florettahas left
intosihas joined
marc0shas left
marc0shas joined
matkorhas joined
marc0shas left
marc0shas joined
adiaholichas left
marc0shas left
marc0shas joined
marc0shas left
marc0shas joined
florettahas joined
djorzhas left
վարյաhas joined
intosihas left
u70jfzo5eyeb468b9ohas joined
harry837374884has left
florettahas left
վարյաhas left
վարյաhas joined
adiaholichas joined
mdosch
Is this the stuff in RFC7712?
intosihas joined
flow
moparisthebest, it's the same situation with aunauthenticated DNS SRV RRs, isn't it?✎
flow
moparisthebest, it's the same situation with unauthenticated DNS SRV RRs, isn't it? ✏
flow
so you perform the authentication of the XMPP service the same way as you would if it was an unauthenticated DNS SRV RR that pointed you to wss://evil.com/xmpp
flow
that is, check if the presented x509 certificate authenticates example.org
Menel
The only question is: do the available web clients do it correctly...
ti_gj06has left
Titihas joined
harry837374884has joined
flow
I wouldn't restrict that question to web clients, websockets are used by others too
jonas’
never!
flow
That said, we do a terrible job documenting best practices regarding authentication and authorization in XMPP
flow
it appears, as moparisthebest already found, that the related information is scattered around multiple places
Alexhas joined
BASSGODhas left
Menel
If I've time, I'll try to mitm conversejs later this day...
վարյաhas left
harry837374884has left
marc0shas left
marc0shas joined
marc0shas left
marc0shas joined
restive_monkhas left
marc0shas left
marc0shas joined
Zash
Converse.js doesn't do DNS TXT lookups
marc0shas left
marc0shas joined
Menel
Was already doubting if it does, thanks for the info..
andrey.ghas joined
marc0shas left
marc0shas joined
վարյաhas joined
harry837374884has joined
Steve Killehas left
ti_gj06has joined
Steve Killehas joined
marc0shas left
marc0shas joined
Steve Killehas left
Kevhas left
florettahas joined
Kevhas joined
Kevhas left
Kevhas joined
marc0shas left
marc0shas joined
restive_monkhas joined
Friendly Resident Cynichas left
Friendly Resident Cynichas joined
tykaynhas joined
վարյաhas left
վարյաhas joined
Andrzejhas joined
stphas joined
վարյաhas left
վարյաhas joined
huhnhas joined
Mikaelahas left
վարյաhas left
վարյաhas joined
florettahas left
xeckshas joined
Andrzejhas left
stphas left
harry837374884has left
harry837374884has joined
huhnhas left
florettahas joined
BASSGODhas joined
stphas joined
վարյաhas left
վարյաhas joined
marc0shas left
marc0shas joined
Friendly Resident Cynichas left
Friendly Resident Cynichas joined
debaclehas joined
stphas left
lskdjfhas joined
huhnhas joined
stphas joined
andrey.ghas left
millesimushas joined
Steve Killehas joined
Wojtekhas joined
Steve Killehas left
Steve Killehas joined
millesimushas left
Andrzejhas joined
emus
Hey Board,
if one if you wants to be invited as Org Admin too just let me know
Steve Killehas left
u70jfzo5eyeb468b9ohas left
Wojtekhas left
Wojtekhas joined
Guushas joined
u70jfzo5eyeb468b9ohas joined
վարյաhas left
Wojtekhas left
Wojtekhas joined
վարյաhas joined
ti_gj06has left
millesimushas joined
ti_gj06has joined
millesimushas left
millesimushas joined
antranigvhas left
rafasaurushas left
Wojtekhas left
Wojtekhas joined
adiaholichas left
adiaholichas joined
վարյաhas left
neshtaxmpphas left
neshtaxmpphas joined
antranigvhas joined
վարյաhas joined
argentumhas left
florettahas left
adiaholichas left
adiaholichas joined
Rixon 👁🗨has left
uhoreghas left
homebeachhas left
Matthewhas left
Half-Shothas left
Half-Shothas joined
Matthewhas joined
Rixon 👁🗨has joined
uhoreghas joined
homebeachhas joined
adiaholichas left
adiaholichas joined
restive_monkhas left
Steve Killehas joined
pasdesushihas left
harry837374884has left
harry837374884has joined
goffihas left
BASSGODhas left
pasdesushihas joined
Rixon 👁🗨has left
uhoreghas left
homebeachhas left
Matthewhas left
Half-Shothas left
Half-Shothas joined
Matthewhas joined
Rixon 👁🗨has joined
uhoreghas joined
homebeachhas joined
BASSGODhas joined
intosihas left
intosihas joined
wladmishas joined
florettahas joined
restive_monkhas joined
pasdesushihas left
millesimushas left
pasdesushihas joined
intosihas left
intosihas joined
adiaholichas left
Steve Killehas left
robertooohas left
adiaholichas joined
xnamedhas joined
վարյաhas left
վարյաhas joined
intosihas left
intosihas joined
Paganinihas joined
Mikaelahas joined
neshtaxmpphas left
neshtaxmpphas joined
adiaholichas left
florettahas left
Steve Killehas joined
dwdhas joined
Steve Killehas left
Steve Killehas joined
adiaholichas joined
huhnhas left
homebeachhas left
Matthewhas left
Rixon 👁🗨has left
uhoreghas left
Half-Shothas left
Half-Shothas joined
Matthewhas joined
Rixon 👁🗨has joined
uhoreghas joined
homebeachhas joined
Steve Killehas left
ti_gj06has left
wgreenhousehas left
Steve Killehas joined
Steve Killehas left
homebeachhas left
Matthewhas left
Rixon 👁🗨has left
uhoreghas left
Half-Shothas left
Half-Shothas joined
Matthewhas joined
Rixon 👁🗨has joined
uhoreghas joined
homebeachhas joined
Steve Killehas joined
wgreenhousehas joined
intosihas left
intosihas joined
Steve Killehas left
Calvinhas joined
florettahas joined
intosihas left
intosihas joined
ti_gj06has joined
Calvinhas left
dwdhas left
millesimushas joined
adiaholichas left
adiaholichas joined
marc0shas left
marc0shas joined
neshtaxmpphas left
neshtaxmpphas joined
u70jfzo5eyeb468b9ohas left
u70jfzo5eyeb468b9ohas joined
adiaholichas left
neshtaxmpphas left
neshtaxmpphas joined
Calvinhas joined
adiaholichas joined
arcxihas left
pasdesushihas left
pasdesushihas joined
millesimushas left
arcxihas joined
Danielhas left
adiaholichas left
Danielhas joined
adiaholichas joined
huhnhas joined
robertooohas joined
L29Ahhas left
phrykhas left
antranigvhas left
florettahas left
florettahas joined
huhnhas left
marc0shas left
djorzhas joined
marc0shas joined
djorzhas left
harry837374884has left
harry837374884has joined
L29Ahhas joined
adiaholichas left
adiaholichas joined
L29Ahhas left
moparisthebest
flow: with the additional wrinkle of SNI
restive_monkhas left
flow
Isn't SNI deprecated in favor of ALPN or so?
flow
but in any case, SNI or ALPN, I don't see where the problem is?
moparisthebest
What web server let's you configure the domain "evil.com" to be served when you send "example.org" in sni ?
moparisthebest
No, both are used
flow
so client wants to connecto to example.org, via some opaque mechanisms, he is told to connecto to foo.hosting.org via websocket
flow
so without SNI/ALPN je would just check that foo.hosting.org presents a valid cert for example.org (assuming no DNSSEC was involed in the endpoint discovery)✎
marc0shas left
flow
so without SNI/ALPN he would just check that foo.hosting.org presents a valid cert for example.org (assuming no DNSSEC was involed in the endpoint discovery) ✏
marc0shas joined
marc0shas left
marc0shas joined
flow
I don't remeber the details of SNI/ALPN, but isn't it like the client requests to talk to example.org when connectiong to foo.hosting.org? and the server at foo.hosting.org tries to present the correct cert with that information send by the client?
moparisthebest
Right, but he has to request the right cert with sni, it's basically "give me the certificate valid for domain X"
moparisthebest
Which if we pick the secure way, there is no webserver in the world that implements that
marc0shas left
marc0shas joined
flow
ok, but that's a common theme that most TLS thingies that aren't used by HTTP are not widely available in libraries
Guus
Doesn't alpn negotiate a protocol to be used over the encrypted connection, while SNI defines a target?
Zash
Yes
Zash
You use both today
Zash
Congratulations on giving OpenSSL responsibility of virtualhost and application dispatching
MattJ
moparisthebest, FWIW this is an issue I've known about for a long time, and I thought it was just listed in the security considerations
L29Ahhas joined
millesimushas joined
MattJ
I thought there had been previous discussion about it, but I can only find a lonely post from 2011 on the standards list, so... I don't know
flow
the "issue" here is that websocket delegation is problemeatic because websocket servers are likely unable to hand out the correct certificate?
Zash
What libraries let you connect to https://xmpp.example.com/bosh and expect a certificate for 'example.net' ?
Andrzejhas left
Andrzejhas joined
moparisthebest
the libraries aren't as much of an issue as the servers, what server lets you host https://xmpp.example.com/bosh providing a certificate for example.net via SNI ? I'm fairly confident the answer is "none"
Zash
Wasn't this one of the things preventing proper SRV support in Thunderbird? NSS just couldn't have a different identity
moparisthebest
we can handwave and put in some security considerations telling people to do what we know 0 servers are capable of but... :'(
moparisthebest
sending a different name in SNI and Host: has a name, it's called domain-fronting, and apparantly XMPP invented it first :)
Zash
One name in SNI, a different name in Host:, a third name in <stream to=...>
moparisthebest
(also google+amazon ban it from being used on their infrastructure, so anyone in AWS for instance)
kurisuhas left
moparisthebest
so a related but different question, when you get XEP-0368 records over DNSSEC and can therefore allow *either of two* domains in the cert, which single domain do you send in SNI? :/
Zash
and if you send SNI: A, do you allow <stream to=B> ?
moparisthebest
not specified !
Zash
moparisthebest, isn't that mentioned in DANE or DNA or somesuch?
Wojtekhas left
Wojtekhas joined
moparisthebest
hmm, will see
Zash
`SNI: xmpp.example.com._or_.example.com` :evil:
վարյաhas left
վարյաhas joined
moparisthebest
oh, one more thing about websocket, *if* we say send "example.org" in SNI instead of "evil.com", that means you have to have *different* websocket endpoints for DNS advertisement vs host-meta, because a web client certainly can't do that
Zash
Can't we just go full DANE, with raw public keys instead of certificates?
moparisthebest
Zash, please !!!!
moparisthebest
that would solve all problems forever
flow
that's crazy talk!
antranigvhas joined
adiaholichas left
ti_gj06has left
adiaholichas joined
moparisthebest
anyway if someone wants to check if you can MITM gajim with a bad _xmppconnect record pointing to the wrong cert before I get to it let me know :) my guess is you can
Zash
badxmpp.eu?
pasdesushihas left
restive_monkhas joined
Zash
but then, BOSH is specified as a proxy which in turn connects to the actual XMPP server, so you'd authenticate the proxy...?
L29Ahhas left
վարյաhas left
վարյաhas joined
վարյաhas left
վարյաhas joined
moparisthebest
yea I've been focusing on websocket but bosh has the same problem(s)
Zash
oh right, ws has an rfc
Andrzejhas left
moparisthebest
the RFC get around this by not specifying the DNS method, other than "look at XEP-0156"
Zash
> but the identity to be authenticated is the connection endpoint address instead of the XMPP service domain
https://www.rfc-editor.org/rfc/rfc7395.html#section-6
Guus
utterly off-topic, but does someone know of a nice DIFF tool (maybe as a website) that is useful to compare two very long lines?
Zash
RIP the DNS method (unless DNSSEC) then?
restive_monkhas left
Zash
Guus, `wdiff` ?
moparisthebest
*because*:
> delegation from the XMPP service domain to the connection endpoint address (if any) is accomplished via the discovery method described in Section 4.
which only specifies host-meta and is secure delegation when https is used
pasdesushihas joined
moparisthebest
yes, I unfortunately think the only answer is "_xmppconnect is insecure and cannot be used unless DNSSEC"
moparisthebest
"or the host happens to have a single certificate and ignores SNI in which case go for it"
But there are missing XEP-XXXX versions on xmpp.org
adiaholichas left
adiaholichas joined
goffihas joined
Neustradamus
Guus: Example which works, here: http://www.aptest.com/standards/htmldiff/htmldiff.pl?oldfile=https://xmpp.org/extensions/attic/xep-0384-0.3.0.html&newfile=https://xmpp.org/extensions/attic/xep-0384-0.4.0.html
restive_monkhas joined
papatutuwawahas joined
adiaholichas left
atomicwatchhas left
Neustradamus
After several recalls, to have the following, I have done a ticket here about missing XEP-XXXX versions: https://github.com/xsf/xep-attic/issues/3 :)
About the Diff tool: https://github.com/xsf/xmpp.org/issues/412, originally posted on the very old-dead tracker.xmpp.org JIRA issue tracker, I think 10yo.
Andrzejhas joined
marc0shas left
marc0shas joined
Guus
Thanks Zash. Neustradamus, I have no clue what missing XEPs have to do with my request. It feels to me that you're trying to re-purpose my question to push forward your own agenda - exactly that what I asked you to stop doing.
adiaholichas joined
Neustradamus
Guus: The original is the diff website :)
You must to compare XEP versions, and by extension, I speak about it
Guus
I didn't ask about comparing XEP versions at all.
Steve Killehas joined
Neustradamus
You can compare RFCs, or all others too, it is very easy, I use often for many years.
Guus
That's nice. It is not what I asked for.
Kev
Guus: Sometimes I like a glass of water.
Guus
I'm going to get one myself...
Zash
☕️
moparisthebest
other than gajim and pidgin, anyone aware of other clients using _xmppconnect ?
moparisthebest
maybe I'll ask in jdev...
ti_gj06has joined
me9has joined
atomicwatchhas joined
վարյաhas left
wladmishas left
L29Ahhas joined
Andrzejhas left
wladmishas joined
L29Ahhas left
huhnhas joined
Andrzejhas joined
robertooohas left
Steve Killehas left
florettahas left
neshtaxmpphas left
neshtaxmpphas joined
Steve Killehas joined
harry837374884has left
L29Ahhas joined
harry837374884has joined
atomicwatchhas left
Andrzejhas left
wladmishas left
Andrzejhas joined
wladmishas joined
wladmishas left
florettahas joined
wladmishas joined
robertooohas joined
antranigvhas left
Daniel
Tbh I was never really sure why we even have the DNS method in the first place. From a web client perspective it always seemed more natural to just do it over http
moparisthebest
and if you have a client capable of doing DNS + TLS, well then it can also do https ?
Zash
There are other things than web clients
MattJ
Which of those things can do DNSSEC but not HTTPS?
MattJ
(oh, and you need HTTPS for BOSH anyway, so... it's pretty much certain you support it)
moparisthebest
nothing can do DNS+TLS and *not* HTTPS, since that is just DNS+TLS
Daniel
> (oh, and you need HTTPS for BOSH anyway, so... it's pretty much certain you support it)
This
L29Ahhas left
moparisthebest
so I'm inclined to put a PR @ '156 to just remove the DNS method, with a note marking it existed, but was impossible to use securely
Zash
So why was it TXT only in the beginning?
Zash
Who has a time machine to go back to 2005 and ask?
MattJ
IIRC it also had a fallback SRV alternative originally?
L29Ahhas joined
Daniel
> so I'm inclined to put a PR @ '156 to just remove the DNS method, with a note marking it existed, but was impossible to use securely
Well DNSSEC could become a thing one day. You know right after we roll out ipv6
Daniel
But yes I'm in favor of removing it
MattJ
So it was probably not expected to be used solely by web clients, and also CORS and such didn't exist at that point (flXHR was still cool)
moparisthebest
yes, it's *only* possible to use securely with DNSSEC, which I'm a big fan of, but that pesky "in practice" thing
Zash
When was XHR even invented?
MattJ
I think reducing the number of mechanisms in 156 is beneficial anyway
flow
moparisthebest, removing a method completely, just because the ecosystem of implementations does not support it, seems a bit harsh. But given that it has a security implication, and that we suspect that there are already vulnerable implementations out there, it sure would be a good idea to mention that in the XEP
moparisthebest
well author-wise I think we could probably reach 2 of them
MattJ
It's already too much that it supports both XML and JSON encodings
flow
Dunno, I see the point in support both XML and JSON✎
Zash
Daniel, maybe if you make Conversations stop preferring IPv4 it won't look like nobody uses IPv6
moparisthebest
MattJ, I was thinking that too but thought it might be too much :)
harry837374884has left
MattJ
Currently we have a random selection of (DNS, JSON, XML) for every XMPP service
MattJ
Some do all, some do some, some do none
MattJ
So it's not like a client can just implement one method and just work
flow
<strike>Dunno, I see the point in support both XML and JSON</strike> or maybe not ✏
MattJ
and it's not like an operator can only advertise via one method and expect it to just work
MattJ
Interoperability is decreased by having so many options, with little to be gained
moparisthebest
let's recap, to make an XMPP connection, you must:
1. lookup 2 sets of SRV records
2. lookup 1 TXT record with DNSSEC
3. Grab+parse both a JSON and XML file over HTTPS
4. Grab+parse a JSON file over HTTPS for POSH
5. look up TLSA records over DNSSEC
moparisthebest
I might have missed something...
MattJ
Very possible :)
Zash
You forgot the other JSON file for POSH
moparisthebest
oh right, POSH supports 2 different types of redirects right ?
Zash
🤷️
moparisthebest
http redirects and also "url in the json file" redirects
atomicwatchhas joined
moparisthebest
and therefore 2 layers of TTL
moparisthebest
https://www.moparisthebest.com/images/fine.gif
վարյաhas joined
Zash
Wait, did you edit in POSH or were there too many lines for me to see the POSH in?
Zash
Hey let's throw DANE in there
moparisthebest
no edit, I swear on the XML
moparisthebest
I mentioned dane too, TLSA records :)
Zash
moparisthebest: Weren't you the one who pushed for the extra set of SRV records???!
moparisthebest
and I'm about to push for another !
Zash
DANG IT
moparisthebest
it's highly tempting to push for 1 connection discovery method that replaces all of these, but that's clearly XKCD territory
Daniel
oh til that there is mod_posh for prosody
moparisthebest
https://xkcd.com/927/
Zash
and I think there's aproximately 1 server in the whole universe that it can be used with✎
Zash
and I think there's aproximately 1 server in the whole universe that it can be used to authenticate ✏
Zash
99% of POSH deployments only have the client file
Daniel
there is a server file?
florettahas left
Daniel
shocked emoji
moparisthebest
I've got c2s and s2s working over both QUIC and WebSocket by the way, that's what brought all this up
moparisthebest
I really don't want 2 new methods to discover each but eh, it's hairy
moparisthebest
could always resurrect https://xmpp.org/extensions/inbox/hacx.html as the One True Way (tm)
Zash
then add 3 more
harry837374884has joined
MattJ
moparisthebest, maybe for QUIC require advertisement through SVCB (wait, bear with me!) - and state that if SVCB records are present, don't do anything else??
atomicwatchhas left
Wojtekhas left
Zash
what if your enterprise/university firewall block UDP port 443?
moparisthebest
MattJ, yep, and SVCB could also advertise at least starttls and direct tls too
moparisthebest
*maybe* websocket
MattJ
Exactly
Wojtekhas joined
MattJ
So a SVCB spec that combines as many of the existing steps as possible, and we keep '156/HTTPS for web stuff
Wojtekhas left
moparisthebest
yea I think that's the way to go for sure, downsides are SVCB is so new support lags behind, upsides are https needs it so that'll accelerate adoption :'(
Wojtekhas joined
Zash
https has its own variant, HTTPS
Zash
As a cynic I have to bet that HTTPS will become widely supported very quickly, while nothing will support SVCB
homebeachhas left
Rixon 👁🗨has left
uhoreghas left
Matthewhas left
Half-Shothas left
Half-Shothas joined
Matthewhas joined
Rixon 👁🗨has joined
uhoreghas joined
homebeachhas joined
MattJ
Zash, so obviously everything will only suppo... right
moparisthebest
it's been too long since I looked at those, need to refresh
moparisthebest
my current impl is using _xmppq._udp records like '368 but I really really don't want to spec that out in a XEP if it can be avoided at all
djorzhas joined
Zash
MattJ, but that's all right because you can get those records from Google / Cloudflare with DNS over HTTPS!!!111!!!
Zash
HTTPS all the way down 😭️
Zash
DNS is HTTPS, TCP is replaced by HTTPS, will the come for IP next?
moparisthebest
also WebSocket is not coming to http3, it's being replaced by the new hotness, WebTransport
moparisthebest
so obviously we'll need a XMPP-over-WebTransport also
moparisthebest
also seen rumblings that WebTransport will replace WebRTC so that'll also be fun
Zashsquints at 'Subject: Protocol Action: 'Bootstrapping WebSockets with HTTP/3' to Proposed Standard'
update about _xmppconnect TXT record, a lot more things than I suspected use this, and so far, all of them are vulnerable to trivial MITM by DNS spoofing
papatutuwawahas left
Zash
modulo how trivial DNS spoofing really is
moparisthebest
pretty trivial no ?
moparisthebest
but https://datatracker.ietf.org/doc/html/rfc7395#section-4 defines a single way to grab an XML host-meta file, so I think I'll propose littering '156 with warnings and obsoleting it, I'll also create a summary on standards and will be filling 9000 github issues with links to it for the vulnerable projects
Alexhas left
tykaynhas left
millesimushas left
Andrzejhas left
jcbrandhas left
intosihas joined
lskdjfhas left
lskdjfhas joined
florettahas left
marc0shas left
marc0shas joined
intosihas left
gooyahas left
intosihas joined
gooyahas joined
goffihas left
ponymontanahas joined
emushas left
florettahas joined
lskdjfhas left
qwestionhas joined
Sevehas left
Sevehas joined
ponymontanahas left
qwestionhas left
ponymontanahas joined
ponymontanahas left
qwestionhas joined
intosihas left
huhnhas left
intosihas joined
archas left
andrey.ghas left
վարյաhas left
վարյաhas joined
pasdesushihas left
debaclehas left
debaclehas joined
intosihas left
intosihas joined
wurstsalathas left
moparisthebest
well whenever the mailing list gets back to me I'll respond with:
https://github.com/processone/docs.ejabberd.im/issues/113
https://github.com/JustOxlamon/TwoRatChat/issues/2
https://github.com/poVoq/converse_wp/issues/2
https://github.com/BombusMod/BombusMod/issues/130
https://github.com/hesa2020/Twitch-To-League-by-Hesa/issues/1
https://github.com/xmppjs/xmpp.js/issues/933
https://github.com/tigase/tigase-http-api/issues/8
https://github.com/tigase/tigase-extras/issues/3