-
matthias
I think it is problematically that people in anonymous MUCs think they are anonym but they even leak their IP
-
matthias
In general a good way would be that the client is only in contact with its own server I think. Voice over IP excluded..
-
moparisthebest
it's not like if you get an IP you can ID anyone, it doesn't make anything not-anonymous
-
moparisthebest
it might be less than ideal, but it's not a big problem
-
matthias
but you can easily catch IPs of almost all group members š¤ļø
-
matthias
think of a group of people in iran sharing thougths which the government does not like..
-
moparisthebest
those people should be more careful
-
moparisthebest
but in a sufficiently large group, you paste an image, you have no idea which IP is which
-
moparisthebest
and chances are if someone pastes a link people will click on it too, so same thing
-
rdzior4
Hi!!!
-
matthias
> and chances are if someone pastes a link people will click on it too, so same thing You are right but a link is obvious to people. Media shared inside a group is excepted to be save I think.
-
MSavoritias fae.ve
The problem with this is also that semi anon muc groups are just that. Semi anon. It would be nice to work on a fully anon version but rightnow they only provide privacy under some threat models
-
MattJ
"Fully" anonymous groups are not really a thing anywhere (practically)
-
MattJ
If the group has a server for distribution, the server can determine the members (it needs to, for message distribution)
-
MattJ
If you go serverless (p2p) then ISPs (and group members) can observe IPs
-
MSavoritias fae.ve
yep true
-
Fishbowler
Agree. For TCP/IP based protocol, hiding your IP address is going to be solved with largely IP-level mitigations rather than something at the application layer.
-
Fishbowler
Conversely, to get this level of intel on XMPP activity for individuals requires monitoring at the application and IP layers.
-
Fishbowler
(albeit, an XMPP server is capable of doing this on an actor's behalf)
-
Menel
And at that level it is already irrelevant if one shares a link or picture
-
Menel
It would cause a lot of traffic, and I wouldn't enable it on my sever, but could the already existing proxy65 be easily adapted to parse all the traffic of pictures to the clients?
-
MSavoritias fae.ve
and IP is not the biggest privacy concern at that point anyway
-
MSavoritias fae.ve
i mean it already is not imo
-
matthias
Fully anonymous is difficult, true. But for me it is OK if I trust my server and the muc hosting server. But I can not trust all the other servers which host the media shared in the group you know?
-
matthias
True that it would cause a lot of additional traffic to solve this
-
Fishbowler
With HTTP File Upload, the other servers only get the link rather than the media. Contextual intelligence gathering becomes much more intensive at that point.
-
matthias
Each user uploads his files to his own server. Problem would be solved if uploads go to the muc hosting server only.
-
Trung
Can you upload via tor?
-
Menel
You can. But isn't it the download part the interesting one?
-
Menel
(one could too)
-
Menel
The sever only wants the secret for upload and nothing for download (then the exact path)
-
Menel
It doesn't matter from what ip it is done
-
MattJ
matthias [08:50]: > Each user uploads his files to his own server. Problem would be solved if uploads go to the muc hosting server only. That really depends what "problem" you are trying to solve. Because this leaks the user's IP to the MUC service, which doesn't currently see that info
-
Trung
Yeah. `torsocks -i <you-fav-client>`
-
jonasā
threat models!
-
Trung
Live in the woods, be connected to nature and cut the cable š¤Ŗ
-
jonasā
certainly works
-
Trung
Till you realize satelites are above the clouds (the real ones)
-
matthias
MattJ: true, I forgot that :)
-
matthias
This means problem would be solved, if the users server would download the file from the foreign server instead of the client
-
matthias
Whatever... Just think that it was good that users know about this thing
-
Menel
This all sounds as if concerned people just should use tor end the rest doesn't need to care honestly.
-
Menel
> Whatever... Just think that it was good that users know about this thing That yes ↺
-
Menel
My ip isn't even my ip most of the time. It is a shared dslite thing and also changing every 34hx even the ipv6
-
Menel
*24h
-
matthias
Thanks for your thoughts to all
-
pep.
"moparisthebest> Actually directtls probably needs a default port before we can do that... [..] I'd of course suggest 443 but others won't agree :/" If you do this, you increase deployment complexity much :)
-
pep.
"moparisthebest> those people should be more careful" I'd be careful with such a statement. Victim blaming is easy. Currently with XMPP and clients semi-automatically GET-ing links, anyone pasting a link in the channel gets info about most of the participants. That's not something one can be "careful" about. That's up to clients
-
pep.
(And servers proxying, as was mentioned above)
-
pep.
"Menel> This all sounds as if concerned people just should use tor end the rest doesn't need to care honestly." yikes
-
MSavoritias fae.ve
Yeah tellinp people to install tor to get privacy just says that we dont want to fix our stuff imo
-
MSavoritias fae.ve
Besides the obvious of we dont care about people that dont know tech
-
MSavoritias fae.ve
(Hot take: Tor is a hack for the lack of privacy underneath anyway)
-
pep.
Because people who need privacy (that should be all of us anyway, if we collectively want privacy to be a thing) surely know how to use Tor too :)
-
pep.
(/s)
-
Trung
well if you're on Debian, it's there by default. There's no installing anything.
-
Trung
how harder is it to open a terminal and prefix `torsocks` rather than clicking an icon?
-
MSavoritias fae.ve
i never open terminals so you lost me there
-
pep.
Trung, seriously that's your take on this?
-
pep.
I find this naĆÆve
-
Trung
pretty much
-
Trung
what else are there ?
-
MSavoritias fae.ve
eh we are in the xsf room.
-
MSavoritias fae.ve
so i guess making xmpp more private :)
-
pep.
Trung, well not much indeed. That's what we're saying
-
pep.
And telling people to "just be private" isn't gonna cut it
-
MSavoritias fae.ve
this yeah ^
-
Trung
=]]]]
-
Zash
There's an easy solution: Ban http upload in semi-private group chats.
-
pep.
Well server proxying is one idea
-
pep.
Doesn't work with OMEMO though.. or maybe there could be some kind of iq to request a download instead of a server reading MUC messages, dunno.
-
Zash
Advertise a proxy via XEP-0215 and have clients pick up and use that.
-
pep.
Yeah maybe
-
pep.
Then again I agree some kind of basic thread model needs to be defined to discuss more about this
-
Zash
There's https://www.rfc-editor.org/rfc/rfc7624
-
Zash
But it would be good to develop something specific to XMPP
-
Zash
https://xmpp.org/extensions/xep-0134.html#privacy
-
pep.
> Since the beginning, privacy and security have been important priorities within the Jabber community. That must not change. "words"?
-
Menel
I'm just saying. If you don't want to trust the muc and not the participants, then you need expansive sever support or something tor like anyway. Have xmpp clients to default to tor?
-
pep.
Maybe we can stop about Tor already. It's a great tool but it's not going to fix all the privacy issues of the world
-
Zash
Out with Tor, in with Oblivious HTTP?
-
pep.
:D
-
Menel
Well what's the alternatie? Everything through tor or everything through your server.. Or is there something else. But with tor you even hide from your own sever the ip.
-
qy
The problem is, you can add all the structure you want, but at the end of the day, people will still sent urls mid-text at worst, so you need a solution that can just handle any link clientside, right?
š 1 -
qy
And tor or some other proxy is all that springs to mind
-
pep.
Zash, thanks for the RFC, TIL.
-
MSavoritias fae.ve
> Well what's the alternatie? Everything through tor or everything through your server.. Or is there something else. > But with tor you even hide from your own sever the ip. good question. that should be asked too together with defining a threat model
-
opal
this all seems like an artefact of http file uploads instead of truly-inline file uploads
-
opal
with xml, binary data is a nightmare, and its already kinda that way with omemo
-
opal
ascii/utf-8 serialisation formats on the line showing their age
-
Menel
I still wonder.. If I trust my sever... Could I use the already advertised socks5 proxy to get the http file?
-
MSavoritias fae.ve
> ascii/utf-8 serialisation formats on the line showing their age so what are you proposing?
-
opal
nothing since thats out of the scope of xmpp to bother with
-
opal
notice how i stop talking when i have nothing good to say
-
MSavoritias fae.ve
i would like http upload to be replaced with an xmpp "native" solution that is
-
MSavoritias fae.ve
but i havent heard of any problems with omemo and xml /shrug
-
opal
the "problem" is base64 inflation
-
opal
same thing inherent (probably worse cus more needs escaping) with json
-
pep.
What does this have to do with anything
-
opal
well, idk if more needs escaping in json than xml, never mind
-
pep.
I think we've very far away from privacy
-
opal
>what does this have to do with anything check which room youre in again, we're talking about the xmpp protocol
-
pep.
We were talking about privacy and suddently XML is the enemy :)
-
opal
we were talking about http URLs being a vector for leaking PII to third parties
-
pep.
Yes
-
opal
ok we're on the same page, have fun
-
pep.
?!
-
qy
pep.: i think the headline is "BoB bad"
-
pep.
Yes surely BoB is bad, but I doubt that's because of XML.
-
qy
Server rewites of http uris? Optionally check HEAD first to be sure its a valid link and not garbage, rewrite it to go through a server defined proxy?
-
qy
Clients dont need to change anything
-
qy
Covers any link sent, not just http upload
-
pep.
Probably not the best idea as you need to scan for URIs in plaintext
-
qy
Do you forsee that being problematic?
-
pep.
Always?
-
qy
I guess the IRC in me is showing...
-
pep.
qy, that's the base of the flam^Wdebate around 0071/0393
-
qy
Heh, oh yes
-
opal
> I guess the IRC in me is showing... it was problematic even on irc
-
opal
neither ircd2 nor ratbox does *anything* related to message texts, not even filter out ctcps
-
opal
either the message is sent or it isnt
-
singpolyma
I agree to wanting to push more towards more native file transfer solutions, but this is unlikely to be helpful privacy wise. And as others have stated http download media vs having clickable links is the same thing for privacy (unless your client auto downloads http from strangers, which would be bad of course)
-
singpolyma
To the can I http via my socks proxy. No, you cannot, because the xmpp socks proxies are very specific
-
singpolyma
You can jingle via your socks proxy or via your turn server or do IBB all of these fit in this threat model somewhere
-
jonasā
huh, why can't you do HTTP via a SOCKS proxy?
-
jonasā
I'm doing that all the time
-
Zash
Confusing it with the subset done in XEP-0065 ?
-
singpolyma
jonasā: you can, but not via the XMPP "socks proxies"
-
jonasā
then they're not socks proxies :>
-
singpolyma
indeed they are not
-
singpolyma
They just use the same protocol and also do proxying, but in an xmpp specific way
-
Zash
Mostly custom auth
-
moparisthebest
I just don't think there is much value in building a 10% solution when you can just use tor for a 100% solution
-
pep.
Tor isn't a 100% solution though
-
pep.
Here we're just talking about leaking IPs during file transfer but we're missing all the other things that privacy means
-
moparisthebest
"just have the users server fetch the image" isn't even helpful in my ideal future where each user runs their own server
-
moparisthebest
pep.: right I'm just talking about hiding IPs though, Tor is the only 100% solution for that
-
pep.
It's not, but it's close
-
pep.
But depending on your threat model you may not be needing 3 hops between every single of your requests and that'd be ok
-
pep.
Also 3 hops that are likely to be blacklisted everywhere you go
-
pep.
Not helpful.
-
Zash
Matrix-style replication of all media onto every server? Makes sense in some ways, but total storage requirements go up.
-
moparisthebest
Upload to ipfs and have everyone fetch it over the cloudflare node since cloudflare has everyone's IP anyway? š
šÆļø 1 -
pep.
You mean get blocked when trying to get anything from clownflare cause you're using Tor? :)
-
Zash
Cloudflare is your Tor now!
-
MSavoritias fae.ve
> Here we're just talking about leaking IPs during file transfer but we're missing all the other things that privacy means yep. we dont even have basic stuff never mind IP leaking.
-
singpolyma
what kind of basic stuff?
-
MSavoritias fae.ve
like why cant i have different profile picture per group?
-
MSavoritias fae.ve
its trivial to dox people even behind tor with this
-
pep.
singpolyma, all the "how to have different identities on XMPP"
-
MSavoritias fae.ve
^
-
pep.
That is often shoved off as "get another account" (and hope clients handle it well and easy)
-
singpolyma
Get another Jabber ID for sure. Whether that's an "account" or some other thing (burner jid, etc) is an interesting question. Probably need to design the UX first then work backward to the best tech for that
-
moparisthebest
That is the easiest way to do it now, and the least likely to have bugs even if there's another way in the future
-
singpolyma
Different profile picture per groups is different from different identity I guess because you might want that for style reasons. This we don't need new protocol for though, "just" new implementation
-
MSavoritias fae.ve
probably. i am talking about current xmpp
-
MSavoritias fae.ve
apps i mean
-
moparisthebest
Back to file transfers, it would be interesting if all parties (including s2s link) were connected with quic to support a "hey I'm gonna send you a file, ID x" and then the sender could open a uni-directional outgoing stream on their existing connection and send the file
-
moparisthebest
Servers in the middle would just forward the bytes, reciever could accept on their end
-
opal
> I just don't think there is much value in building a 10% solution when you can just use tor for a 100% solution as a tor user, tor isnt a 100% solution, and we arent there yet with widescale internet routing that can be done anonymously
-
moparisthebest
So kinda proxy65 but no new connections needed, so no one can learn any more IPs or anything than they knew before
-
moparisthebest
>> I just don't think there is much value in building a 10% solution when you can just use tor for a 100% solution > as a tor user, tor isnt a 100% solution, and we arent there yet with widescale internet routing that can be done anonymously Well nothing is going to get closer than Tor to the 100% mark ↺
-
opal
>nothing lol you havent went far down that path yet
-
Zash
I don't think there's a 100% solution because privacy means different things to different people in different situations.
-
opal
shit exists already its just deployment thats the issue
-
moparisthebest
Such as?
-
moparisthebest
Just like how many new things spring up that try to reinvent XMPP poorly, many have tried and failed to reinvent Tor in the past too
-
opal
im not talking about reinventions of tor
-
moparisthebest
Can you say what you are talking about
-
singpolyma
> Back to file transfers, it would be interesting if all parties (including s2s link) were connected with quic to support a "hey I'm gonna send you a file, ID x" and then the sender could open a uni-directional outgoing stream on their existing connection and send the file Yes, true binary transfer in XMPP is always "out of band" but with this we could get it *almost* in band
-
singpolyma
but it only works if the whole path is quic otherwise you need to convert somewhere or fail it
-
opal
>Can you say what you are talking about none of it will help with the topical issue, so no not really the time or place
-
moparisthebest
> but it only works if the whole path is quic otherwise you need to convert somewhere or fail it Right that's the hard part ↺
-
moparisthebest
I'll let other people bikeshed about whether this is "in-band" or not but it would only be going over already established and authenticated connections so...
-
MSavoritias fae.ve
isnt there a binary xml standard or a way to put binary data in xml?
-
pep.
MSavoritias fae.ve, that's what BoB is, discussed earlier, but it's quite slow because of all the back and forth (iqs) with the server(s) and payload limits
-
moparisthebest
> isnt there a binary xml standard Kinda, won't help with this though > or a way to put binary data in xml? Only one, we use it all the time now, it's just encoding it a base64 (and then it's bloated by % and limited to stanza size when we really want a stream)
-
singpolyma
pep.: There's no back and forth for BoB
-
pep.
Ah that's ibb?
-
singpolyma
There's bloat because base64 and size limit so it's not useful for large files
-
singpolyma
Yes, ibb is lots of back and forth
-
MSavoritias fae.ve
moparisthebest, is that EXI?
-
singpolyma
Especially since most people use an extremely small size for ibb as per the xep
-
moparisthebest
MSavoritias fae.ve: the "binary XML" is exi yes
-
singpolyma
You say EXI doesn't help mostly because it won't solve some of the factor that lead to size limit yeah?
-
moparisthebest
I mean it won't help us send binary streams
-
moparisthebest
Plus it's not really usable on the public federated network but that's a different topic :)
-
MSavoritias fae.ve
EXI is not mentioned anywhere in 231 /thinking
-
moparisthebest
(it's not usable because you have to negotiate all schemas you are going to use per hop and only closed systems will have that full list)
-
MSavoritias fae.ve
damn :/
-
moparisthebest
ie currently servers pass stanzas they don't know the schema for all the time, and exi doesn't support that, at least that's my understanding, arc is the (only?) expert here
-
singpolyma
That's a solveable problem if it would help enough in other ways. But I think I agree size limit is the main issue so it wouldn't be enough
-
MSavoritias fae.ve
is the size limit of the stanzas documented or is it basically common wisdom?
-
Zash
Not aware of FOSS EXI implementations.
-
MSavoritias fae.ve
i remember the xep with limits a few ago
-
MSavoritias fae.ve
but it wasnt about specific i thing
-
MSavoritias fae.ve
think*
-
moparisthebest
> is the size limit of the stanzas documented or is it basically common wisdom? Finally prosody and ejabberd share a default, so that's the one to use ↺
-
jonasā
MSavoritias fae.ve, well the RFC says something of "at least 10 kiB"
-
singpolyma
Of course when you're gonna base64 you still need some logic around that. I think my limit for BoB right now is 192k
-
jonasā
and someone had a path-MTU XEP in the pipeline :)
-
moparisthebest
262_144 bytes
-
jonasā
(a.k.a. 256 kiB)
-
pep.
That's probably ok for avatars, not for 100MiB uploaded videos :x
-
pep.
I don't upload files this size but I certainly remember people vehemently arguing about 1MiB limit being nowhere near enough for them :x
-
singpolyma
For sure. BoB is good for thumbnails, previews, emoji, stickers, stuff like this
-
singpolyma
Stuff were the experience is ruined by a "do you want to expose if address" button but also the size is small✎ -
singpolyma
Stuff were the experience is ruined by a "do you want to expose ip address" button but also the size is small ✏
-
Guus
> Not aware of FOSS EXI implementations. Openfire has one: https://discourse.igniterealtime.org/t/developing-openfire-efficient-xml-interchange-exi-functionality
-
moparisthebest
> Using EXI format reduces ... the cost of parsing. In what way?
-
Guus
> ie currently servers pass stanzas they don't know the schema for all the time, and exi doesn't support that, at least that's my understanding, arc is the (only?) expert here In my understanding it still passed the 'unrecognised' stanzas, but either not compressed, or after a compression handshake that is not very efficient compared to being able to use a predefined set of schemas.
-
Guus
>> Using EXI format reduces ... the cost of parsing. > In what way? I'm far from an expert, but: it's smaller, but not compressed data, meaning that it can be operated on directly when your app doesn't 'translate back to XML' but speaks EXI directly.
-
Guus
Which I expect can be very applicable to software running on embedded devices, with a predictable data set.
-
Guus
But, one of the reasons that I built that Openfire plugin is that I'd like to test it. I'm waiting for clients to become available š
-
moparisthebest
Even embedded devices today are by and large very powerful and have no problem with TLS and XML etc etc
-
Guus
Sure
-
moparisthebest
Basically exi is very complicated and it's not clear to me that it offers any advantages at all over, day, compressing individual stanzas with zstd
-
Zash
Probably easier to bring back compression.
-
Guus
I'm not claiming that this is a silver bullet to anything.
-
Guus
At least in the Java space, a implementation was pretty straightforward.
-
moparisthebest
I'm certainly glad you are doing the harder legwork :)
-
Guus
So I figured: why not?
-
Guus
Afk wife is making me do the dishes.
-
opal
> I'll let other people bikeshed about whether this is "in-band" or not but it would only be going over already established and authenticated connections so... for purpose of this discussion i'd say same-host is in-band enough
-
opal
or at leasted trusted host for an xmpp component