Modern XMPP project discussion - 2021-02-17


  1. Ge0rG

    You can't have a user account running both on a real domain and on an onion domain. How are other servers supposed to know which of the two JIDs is the real deal?

  2. Ge0rG

    But you could expose a MUC domain under an onion domain simultaneously

  3. Ge0rG

    You could advertise a server's onion domain as an additional s2s connection mechanism, that way Tor-only servers could connect to it. But there's little point to it, because the Onion domain is a cryptographic identity, and there wouldn't be any strong binding of the announcement to that identity.

  4. pep.

    The idea is to do it for MUC yeah, and maybe some more components later

  5. purplebeetroot

    > purplebeetroot, I’m not sure if https://xmpp.org/extensions/xep-0434.html (also cc @ raucao) is a way to establish that transitive trust in MUC context > so at the very least we’d need some explorative implementations around that and see which bits are missing and how to securely distribute the trust and distrust messages Oh, thank you. That seems to be a good starting point. Do you know of any existing client that has implemented XEP-0434?

  6. jonas’

    purplebeetroot, no

  7. purplebeetroot

    > we should probably have a privacy "team" reviewing stuff.. would anyone here would like to be part of that? I would find this usefull. It could also help anyone who's specifically interested in that topic, to organize with others without needing to find first those that might be interested. My resources and skills are very limited, but I'd be happy to support/join such a working team and see where I could contribute to.

  8. jonas’

    purplebeetroot, good thing is: we don’t need a formal team for that

  9. jonas’

    just go ahead, review XEPs and post your findings to standards@

  10. jonas’

    on the mailing list, when XEPs transition in critical stages of their lifecycle (e.g. when they become an Experimental or Draft standard), there is always a discussion thread where such concerns can (and should and are to) be discussed

  11. purplebeetroot

    Right! Having something like a platform, so that those specially interested in that topic can easily meetup and find each other might still be usefull. A MUC for it could do that job. (while I don't see myself fit for a leading role in that subject, I just make suggestions, rather then just opening a MUC)

  12. jonas’

    purplebeetroot, a formal SIG could be instated if need be, but first there should be a few potential members plus a potential leader.

  13. jonas’

    but that’s not necessary

  14. jonas’

    the privacy discussions are perfectly on-topic in xsf@muc.xmpp.org, where chat discussion re protocol standards takes place

  15. jonas’

    larger discussions are better held on the mailing list for a broader audience though

  16. purplebeetroot

    It is. But there you'll will regular encounter people that react with attitudes similiar to: - just fork it - that's not important to XSF - discussion on our openess to non-white cis dudes is offtopic - you should not talk about it, if you can't implement it yourself or pay someone to do it for you - this is a rare usecase, we should focus on what we believe what's app users want - don't bring up create critism here, because we are volunteers - our resources are so limited, that we better focus on something else In my opinion is this noise that can be avoided by having a seperate communication channel. I might be wrong and over reactive to some patterns I observed in that XSF MUC.

  17. purplebeetroot

    It is. But there you'll will regular encounter people that react with attitudes similiar to: - just fork it - that's not important to XSF - discussion on our openess to non-white cis dudes is offtopic - you should not talk about it, if you can't implement it yourself or pay someone to do it for you - this is a rare usecase, we should focus on what we believe what's app users want - don't bring up critism here, because we are volunteers - our resources are so limited, that we better focus on something else In my opinion is this noise that can be avoided by having a seperate communication channel. I might be wrong and over reactive to some patterns I observed in that XSF MUC.

  18. raucao

    srsly, race, gender, or anything else regarding people's identities and not standards work, has absolutely nothing to do on a standards list or channel

  19. raucao

    and yes, if you do not want to or cannot contribute actual standards work, then everything you say on there is wasting the time of a volunteer who can and will do it

  20. raucao

    there's nobody keeping you from creating your own channel for whatever else you want to discuss, and where you can invite people to

  21. raucao

    you will be the one making the rules for that channel

  22. raucao

    it sounds to me like you want to discuss user experience a lot, and i think that would be much better achieved by contributing to design and UX work for clients

  23. raucao

    it is true and unfortunate, that a lot of open-source software developers don't care enough about design and UX, so that's probably one of the walls you already ran into

  24. raucao

    i think this channel/project is relevant for UX, too. so it's probably not the worst place to discuss general UX issues in my opinion

  25. Ge0rG

    Yes, but as was said before, the XSF is the place to discuss security and privacy implications

  26. raucao

    sure, just trying to help with clearing up what standards bodies are for. "non-white CIS blabla something something" is not it. but culture, economic background, hardware, etc. can all be important factors in considering UX

  27. raucao

    btw, the W3C actually does have a security WG which reviews drafts before they can become recommendations IIRC

  28. raucao

    definitley a model that exists

  29. raucao

    because security is oftentimes requires such specialized knowledge that not every spec author can possess

  30. raucao

    s/definitley/definitely

  31. Ge0rG

    Yes, this is why XEPs have a Security Considerations section, and it would be great if people would read and contribute to the discussion.

  32. raucao

    👍️

  33. mathieui

    raucao, I don’t even know what you are ranting about

  34. raucao

    then you're probably missing channel history

  35. mathieui

    I am not

  36. raucao

    btw, i am not ranting at all

  37. raucao

    i'm trying to help a person who was saying their contributions aren't valued in certain places

  38. raucao

    and that he was shut down

  39. raucao

    where was i ranting?

  40. mathieui

    > srsly, race, gender, or anything else regarding people's identities and not standards work, has absolutely nothing to do on a standards list or channel well, it is not part of standard work for sure, but if you want to not end up with the same people all over the org, something need to be done about it

  41. raucao

    that's not a rant. that is just stating facts to explain why someone is being shut down when being racist and sexist on a standards mailing list

  42. raucao

    you're being racist for saying that all white cis males are "the same people" btw

  43. raucao

    i do not appreciate your discrimination or considering race and gender to be imporant for anything

  44. L29Ah

    omg

  45. mathieui

    That is the dumbest thing I have read today, thank you

  46. raucao

    lol

  47. raucao

    explain how race is relevant for a protocol discussion if you can

  48. raucao

    or for anything for that matter

  49. raucao

    i'll wait while you'll do mental gymnastics and try to form a resemblence of an argument

  50. mathieui

    For a protocol discussion it isn’t, for a healthy organizations made of people, well, it sure is

  51. raucao

    there you go

  52. mathieui

    And it so happens that the XSF is made of people, who write standards

  53. raucao

    the latter is also a pure assertion, but the original point stands

  54. jonas’

    purplebeetroot, the XSF is aware of its lack of diversity (or some of us are, at least), but we’re lacking people who have the motivation and plan to change this. I think this is not due to them being hostile, but (speaking for myself) not knowing what a viable plan is, due to lack of knowledge in that field.

  55. jonas’

    I am also fairly certain that many people will not be able to communicate that clearly, making it come off as dismissive.

  56. jonas’

    purplebeetroot, the XSF chat room is not concerned at all with what "app users" want; valid use cases can be brought up and discussed independent of a specific app. Mind that XMPP is more than just chat, if we only cared about chat users, it wouldn’t make any sense.

  57. jonas’

    same for just fork it really.

  58. jonas’

    the resources argument will *always* stand.

  59. mathieui

    The XSF as-is is already somewhat of a club of people who have know each other for years and have a whole lot of things in common, this is especially visible at summit (and those people work a lot, advance standards, and are very competent, that is not the point I am trying to make)

  60. jonas’

    purplebeetroot, the resources argument will *always* stand. If you only bring up criticism (even if it is senisble and applicable), it only binds peoples time who don’t have enough time anyway. So if you want change, you’ll have to drive it yourself. Just "filing issues" and reminding everyone about them periodically is not going to cut it. That’s how it works in a volunteer run organization, unfortunately.

  61. mathieui

    But that can legitimately be seen as being passively hostile to newcomers because they do not have the unwritten codes & rules to behave as expected, and yes, that is a problem for a standards organization

  62. jonas’

    purplebeetroot, this is not to be dismissive of your list (I am aware that I did one or two of those myself, but see the point re communication); I want to clarify the background and make it clearer.

  63. mathieui

    (and I am not saying I have a magical solution for that situation, but dismissing a way of stating the problem does not make it go away)

  64. jonas’

    purplebeetroot, this is not to be dismissive of your list (I am aware that I did one or two of those myself, but see the point re communication); I want to clarify the background and actually encourage you to step up and do things.

  65. mathieui

    (Also most of the people are stretched thin and do not have time for other additional unpaid work)

  66. mathieui

    (if they ever wanted to)

  67. jonas’

    everyone in the XSF, I presume, has learnt the lesson "you have to pick your battles" the hard way

  68. jonas’

    I for one picked my battle to be "I want free, open, trustworthy instant messaging to be available for anyone, without the data going through silos".

  69. jonas’

    regarding my consciousness, I feel like I’m contributing to the betterment of the world, and I’m investing a lot of time and energy in that. that also means that I can’t invest the same amount of energy in other causes. I try to not actively make things worse regarding e.g. gender equality, but noone can expect me to put the same energy in that cause as I do for the battle I picked for myself.

  70. raucao

    mathieui: i thought you wanted to explain why you insulted me earlier? calling someone dumb for simply stating that race and gender should be kept out of standards discussions, only to then go on and explain why you yourself are keeping it out of standards discussions, is pretty darn hypocritical. i do appreciate that the rest of purplebeetroot's feedback was addressed in detail however. thank you!

  71. raucao

    (and no, you don't have to do it now. i appreciate the diversion)

  72. raucao

    it's a difficult topic, which is why i think you should consider not insulting people over your personal sensitivities when someone actually does touch it in a way you don't directly agree with

  73. raucao

    thanks

  74. mathieui

    raucao, I did not insult you, I stated a fact, that this is the dumbest things I read today, but even smart persons can say dumb things! Now if you want I can tell you that saying "telling people they are cis white men" is racism is utterly stupid (and also part of alt-right discourse), because that is name-calling at best, but if you feel you have ever been discriminated for being a man in something that really affects you, like access to healthcare, housing, or a job (for this

  75. mathieui

    particular reason)

  76. mathieui

    then that would make sense

  77. mathieui

    but otherwise you are just offended for no reason whatsoever

  78. raucao

    aaaand you checked out of logic again

  79. raucao

    good bye for now

  80. mathieui

    and I do not waste time with people who believe in sexist against men or racism against what people in occidental societies either

  81. raucao

    lol, fuck off you racist

  82. mathieui

    and I do not waste time with people who believe in sexism against men or racism against what people in occidental societies either

  83. raucao

    srsly

  84. raucao

    not cool

  85. raucao

    if you think you can insult and disrespect people because of the color of their skin, you are simply a racist asshole

  86. jonas’

    mathieui, okay, I need to stop you there.

  87. jonas’

    there definitely exists sexism against men.

  88. jonas’

    I know people affected by it

  89. jonas’

    it is not as widespread, mind, but it *does* exist.

  90. mathieui

    jonas’, I am not saying you cannot be discriminated again as a man (for being a man), that can certainly happen

  91. mathieui

    but I only consider structural racism

  92. jonas’

    okay, that’s *probably* fair

  93. jonas’

    I’m not deep enough in the matter to know when it starts to be structural

  94. jonas’

    maybe be a bit more differentiated in a statement like the one above then, because especially in such a situation like here it’s important to not make these blanket statements

  95. southerntofu

    Ge0rG, why would other servers have to choose "which" is real if both exist? just like mail aliases you can send/receive emails with different addresses mapping to the same mailbox, there's no reason we can't do that over XMPP :)

  96. southerntofu

    Ge0rG, discovery of keys (eg. onion public key in this case) is out of the scope or supporting vhost aliases, though it's an interesting problem. current status quo is operators sign a list of onions with PGP (alla riseup), and use HTTP headers to let browsers know of an upgrade.. a much better way would be something like the GNU Name System to act for both name resolution and public key resolution, but that's yet another topic ;)

  97. jonas’

    southerntofu, no, it’s not that easy

  98. jonas’

    there’s no such thing as an inbox in XMPP

  99. jonas’

    not any which is separate from the address anyway

  100. southerntofu

    purplebeetroot, maybe xmpp:privacy@joinjabber.org?join could be a place to get the discussion going? :)

  101. purplebeetroot

    > > btw, i am not ranting at all > i'm trying to help a person who was saying their contributions aren't valued in certain places > and that he was shut down > where was i ranting? Shut up miss gendering me. No you're not helping me, you're validating my critism by reproducing what I see as toxic working culture. And yes internalised racism and sexism does also matter to the development of open standart, because if not, you simply have a bunch of white cis-males that make it uncomfortable for most/many others to join.

  102. Ge0rG

    southerntofu: the lookup from xmpp domain to serving host is done via SRV records. You can't usefully lookup SRV over Tor. If you could, you still would have no guarantee that you connect to the authentic server.

  103. jonas’

    purplebeetroot, see, that attitude there, is not helpful in changing things

  104. jonas’

    purplebeetroot, getting people to change for the better by blaming them is... rarely helpful

  105. jonas’

    ("you simply have a bunch of white cis-males that make it uncomfortable for most/many others to join." is what I’m talking about, not your interaction with raucao)

  106. southerntofu

    raucao, i hear you when you say XSF is the place to review security implications, however given real-time chat reactions of people who are exhausted volunteers, and given that writing a detailed email with formulated criticism takes a lot of mental energy, i can see it as a good solution to have an in-between space where short-lived debate/questions about privacy/opsec can be asked which can lead to more formal review :)

  107. southerntofu

    to be fair, i did not suspect the W3C had a security WG given all their many (obvious) failures at designin privacy-friendly standards.. but yes in my view it's important to have a security team, not necessarily because they're so much more skilled, but only because they are not dozens of hours deep into your own spec/work and can review/criticize from an outside perspective (focused on security)

  108. southerntofu

    raucao, sorry the discussion derailed greatly, but technical concerns can never be neutral, and we live in a deeply racist/patriarcal society where technology has helped maintain and foster this state of things (you may ask questions about IBM/Bayer/Monsanto/Thalès/BAE...) so no it's not unrelated to protocol/standards, concerns of social justice and who the software's empowering/dispowering is really valid argument

  109. southerntofu

    jonas’, you may be interested to checkout how the Tor community operates, they are (to my knowledge and from what i could see) a rather inclusive community where people are not judged solely on technical skills, and where people from different cultural background feel empowered and a sense of belonging

  110. southerntofu

    (in fact, nobody has "knowledge in that field", most people who sell "inclusion seminars" and whatnot are just scams, but reflecting on our own privileges and setting up gateways to enter the community without resembling everyone else is always a good way to go)

  111. jonas’

    southerntofu, sorry, "please see this and there" is not going to cut it with undertimed volunteers

  112. purplebeetroot

    > purplebeetroot, getting people to change for the better by blaming them is... rarely helpful And how is your reply helping in that regard? You blame me for articulating anger for sexism that was explicitly directed towards me, as a behaviour that is bad, because it is ineffective. What are you doing to counter sexism that is part of XSF? In which way do you believe is your reply helpfull for those effected by sexism, rather then a justification of the status quo?

  113. jonas’

    purplebeetroot, sorry, I did not want to blame you. I wanted to show you why your statement, in my view, was problematic and how to improve it

  114. jonas’

    no harm intended, sorry if that did hurt you

  115. mathieui

    jonas’, yeah, sorry, I did not expect "white male CS engineers from europe & US show some form of cultural homogeneity" to be controversial (anyway that’s the last of me today on that topic, and I’ll retract the "dumbest thing today" part as I have just opened twitter)

  116. southerntofu

    jonas’, i agree with your criticism of valid involvement.. however i believe reporting issues is a valid contribution to a community, and a healthy community should embrace valid criticism, not disregard it.. i understand this is harder when mental energy is scarce, but it's very important for potential future contributors to feel welcome.. i'm not going to write a single line of code for a maintainer who dismisses my concerns, i may take days learning new things to come up with a patch if the maintainer is friendly to criticism

  117. jonas’

    purplebeetroot, you might’ve also missed my clarification: I was not criticizsing your exchange with raucao, but your statement about the XSF in general.

  118. raucao

    purplebeetroot: the very line before i accidentally said "he" is this: "a person who was saying their contributions". clearly i'm making an effort to use neutral language. sorry for failing in the next line. i come from a native language that is gendered for neutral nouns, making it more difficult in general, but especially in the heat of the moment. a simple "i'm not he, please refer to me as [insert whatever you want]" is sufficient to make me use a different pronoun.

  119. jonas’

    southerntofu, agreed, issue reports need to be taken positively.

  120. jonas’

    but only if no hard expectations are attached to them

  121. jonas’

    and that’s what I often miss on the side of the reporters.

  122. southerntofu

    jonas’, there may be resentment against men and/or white people, but nothing we could call sexism/racism, or as mathieui said structural oppression.. "structural" as in the society is ordered around segregating/oppressive principles and materially-speaking one side has way more privileges. which is not to say all middle-class white men have to be bastards their entire lives, but higher level of privileges tends to decrease the capacity to empathy (there's real studies on that). so for whatever reason a white man may be resented, there is no structure in society making sure white men have more difficulty for housing/jobs, or have more chances to end up in prison (white/brown people commit just as much crime, but white crime is less reported and even when reported is rarely punished in the same manner), etc..

  123. southerntofu

    jonas’, establishing a mapping of two JIDs to a single inbox shouldn't be hard..

  124. jonas’

    southerntofu, that’s easy. The transmission side is harder

  125. southerntofu

    Ge0rG, once onion discovery is achieved (whether with manual mapping alla OnionMX or with a well-known discovery mechanism) .onion doesn't need to read any SRV because .onion resolve to a revese proxy on the server which will serve ports 5222/5269 (without TLS on that virtualhost) and the guarantee is embedded in the onion public key itself (the onion name is the fingerprint of the onion public key)

  126. jonas’

    southerntofu, and thanks for clarifying the "structural" side of things.

  127. purplebeetroot

    raucao: ok, fair enough. I might overreacted in this particual case then. Thought reason for my harsh reply wasn't just based on the accidental miss gender, but you claiming that racism and sexism is offtopic...and then continuing to explain why my points are invalid rather then tryn to understand.

  128. jonas’

    southerntofu, I’d like to add that to gain support even from the privileged ones, it might still be sensible to acknowledge their struggles.

  129. raucao

    southerntofu: there is a lot factually, provably wrong in what you said, and my entire point is that these things have to be discussed in groups that try to solve societal problems, not technical ones. i have literally travelled the globe for 10.5 years straight to date, and about half of the time in non-predominantly-white countries. i think you're very wrong, and i think this is entirely the wrong place to discuss it

  130. jonas’

    in the end, there will always be a purple dot, and the subjective experience matters

  131. southerntofu

    jonas’, would you be interested if i compiled some interested resources from eg. Debian/Tor about their strategies for inclusion and community-building? i understand you may not have the time to review those yourself :)

  132. jonas’

    southerntofu, I would be interested, but I cannot promise anything resulting from taht

  133. jonas’

    southerntofu, I would be interested, but I cannot promise anything resulting from that regarding the XSF specifically

  134. southerntofu wonders where the gender pronouns in client UX/UI XEP is.. :P (sorry just trying to blow off some steam after your argument)

  135. jonas’

    (as I’m not an XSF board member, nor interested in becoming one, as I am more focused on the technical side of things)

  136. jonas’

    southerntofu, that’s out of scope for a XEP, as it mainly concerns UI/UX :)

  137. jonas’

    but it might be in scope for modernxmpp

  138. southerntofu has finally reached the bottom of the backlog (lol)

  139. jonas’

    welcome down here, it’s fun

  140. southerntofu

    jonas’, why would transmitting with several aliases be hard?

  141. jonas’

    southerntofu, so first of all, right in RFC 6120 it says that on a client-to-server connection, the server MUST stamp the @from attribute (the sender address) with the address which is associated with the stream

  142. southerntofu

    i mean some servers expect a message from tofu@foobar.com, others from tofu@foobar.onion.. some servers may expect both for different clients of theirs

  143. jonas’

    which means that to stay within RFC 6120 (the very foundation of XMPP), you have to use separate streams

  144. jonas’

    at which point it’s most sensible to use two different accounts.

  145. southerntofu

    why? i don't understand why a stream should have a single address?

  146. jonas’

    because that’s how it’s defined in RFC 6120

  147. jonas’

    changing this would require changing every single piece of XMPP client and server software out htere

  148. jonas’

    changing this would require changing every single piece of XMPP client and server software out there

  149. jonas’

    it makes sense to keep things simple

  150. southerntofu

    i mean yes i understand that having a unique identifier for a resource is useful.. but having different representations for this resource does make sense, no?

  151. southerntofu

    jonas’, no only the server changing this would have to do anything..

  152. jonas’

    southerntofu, many clients don’t set @from because they rely on the server doing it

  153. jonas’

    (because it’s much simpler than passing the correct address around the entire codebase)

  154. jonas’

    soo... yeah.

  155. southerntofu

    lt's take example of the simplest approach, mapping .onion vhost to a DNS vhost.. my server S1 knows it can be reached on S1.org and S1.onion (i'm C1)

  156. jonas’

    it requires touching all the softwares.

  157. southerntofu

    you are C2, and foobar is C3

  158. southerntofu

    C2 adds C1@S1.org, my server acts as usual

  159. purplebeetroot

    > southerntofu: i think you're very wrong, and i think this is entirely the wrong place to discuss it You are basicly saying, that because you are mostly white-cis dudes, it is important to keep a working culture that is non-welcoming to those that differ from that. You can only change a working culture by either reflecting on it and changing based on that or top-down command. Since top down command is not suitable for such a community, what else is there, beside reflecting, learning and adabting accordingly

  160. southerntofu

    C3 add C1@S1.onion, my server will translate the to="" field in subscribe request, from S1.onion to S1.org

  161. jonas’

    (clients would also have to distinguish the @to address on inbound messages, which they most likely don’t even look at today, because why would they; they know that their stream only has a single identity)

  162. southerntofu

    so when i C1 send a message to C2, message is sent from="C1@S1.org", but when i send to C3, it's sent from="C1@S1.onion"

  163. jonas’

    southerntofu, okay, so the server would be keeping a mapping?

  164. southerntofu

    YES :)

  165. jonas’

    for each possible destination address?

  166. jonas’

    the question then becomes: from which address are messages sent to destinations which are not part of that mapping yet?

  167. jonas’

    e.g. when you send a subscription request to a foreign user

  168. southerntofu

    jonas’, this remains to be seen.. i'd say yes for every destination address, with a preference for DNS connection, unless you add an onion contact in which case it would be sent from your onion JID

  169. southerntofu

    why DNS connection fallback ? for retro-compatibility with servers who are not federated over Tor (i.e. > 99%)

  170. jonas’

    that’d mean specialcasing .onion, which is ... not sometihng I’m fond of in a generic protocol but may be worthwhile if we consider Tor usage the only usecase for this

  171. southerntofu

    and also because then we can add new mapppings in the future for .i2P for instance

  172. jonas’

    (please don’t make it sound as if Tor is the way to go for everything, thanks)

  173. southerntofu

    no Tor is just one crypto-secure transport, there are many others and i think a protocol should support all transport mechanisms available, then let implementations and server operators decide on their own usecase

  174. Ge0rG

    jonas’: you might be able to cheat the mapping by routing all stanzas directed to a .onion JID from the respective local account .onion JID instead of the clearnet JID

  175. jonas’

    Ge0rG, that’s what southerntofu just said :)

  176. jonas’

    southerntofu, Ge0rG, actually, that starts to make a lot of sense

  177. Ge0rG

    Sorry, I'm still catching up

  178. Ge0rG

    jonas’: I still think it doesn't make sense because it doesn't give you any benefit over .onion SRV for the clearnet xmpp domain

  179. jonas’

    conceptually, this would treat *.onion as a separate network with separate (but bijectively mappable) addresses and the mapping would happen automagically on the server side

  180. Ge0rG

    also having a clearnet server with an .onion address leaks its identity to LE

  181. southerntofu

    purplebeetroot, i don't think that was his intention but i see your point. if you feel like XSF is not very inclusive and newcomer-friendly, maybe try joinjabber.org? we explicitely try to be those things, and while i can't speak for everyone, i'm happy to receive criticism :)

  182. jonas’

    note that AFAIK raucao is not an XSF member, nor is modernxmpp an XSF project

  183. jonas’

    so please don’t take what happens here as "the XSF did that"

  184. southerntofu

    Ge0rG, the threat model for onion services is rarely to hide the server, it's to promote secure name resolution with transport security tied to the name (eg. DNS + DANE all in one)

  185. purplebeetroot

    Right!

  186. Ge0rG

    also telling the white cis dudes that they are doing it wrong because they are white cis dudes won't improve anything.

  187. jonas’

    I need to step out and do some work now

  188. Ge0rG

    regardless of which subset of white cis dudes you address.

  189. southerntofu

    Tor explicitely supports this usecase with what they call Single Onion Services, i.e. don't do any hopping on server side (i.e. only 3 hops to reach server) so connection is faster but has onion security properties :)

  190. Ge0rG

    southerntofu: well, tying the user JID to the .onion domain will solve those two issues. But do you still need to have a clearnet JID in that case?

  191. southerntofu

    Ge0rG, running an onion-federating Jabber server is the easy part.. people have been doing this for what? 8 years now?

  192. southerntofu

    the "hard" part (not too much) is to map the two virtualhosts together

  193. Ge0rG

    southerntofu: onion federating is again different from merging JIDs.

  194. Ge0rG

    southerntofu: so why would you want the latter?

  195. southerntofu

    (eg. you can use your onion address to federate with onion folks, and your DNS address for other cases)

  196. southerntofu

    ^ for this reason

  197. Ge0rG

    Yes, but why not having two different JIDs? Would also give better opsec!

  198. Ge0rG

    Also how is that more useful than s2s to the clearnet domain over onion?

  199. southerntofu

    currently it's possible to have either: a DNS address (but then servers federating with you will need to operate over DNS), or an onion address (but then servers federating with you need to operate on Tor)

  200. southerntofu

    i'd like to have both :)

  201. southerntofu

    Ge0rG, well using Tor without .onion does not fix DNS/BGP security, an exit node may be subject to active attacks (and they often are)

  202. southerntofu

    .onion addresses on the other hand provide secure name resolution and transport security at the same time, that's why many people use them to expose user-facing services

  203. Ge0rG

    southerntofu: can't you do TLS over Tor, to ensure the server's certificate identity?

  204. raucao

    > You are basicly saying, that because you are mostly white-cis dudes, it is important to keep a working culture that is non-welcoming to those that differ from that. that's a gross misinterpretation of what i said. also i'm not a member of said group and you're assuming my race and gender without asking

  205. southerntofu

    Ge0rG, you can and we do, but it means placing trust in the CA mafia who are known to be untrustworthy.. i understand why we daily make the tradeoff of DNSSEC+TLS (with browser CA) however i appreciate that other projects are coming up with alternative solutions (i2p/onion is one example approach, GNS+Dane is another even more interesting)

  206. southerntofu

    i simply believe when developing protocols/applications we should make sure all the moving parts are interchangeable to be future proof.. eg. hashing algorithms, versioned protocols, or in this case swappable naming/transport

  207. Ge0rG

    southerntofu: fundamentally, I think that XMPP is the wrong protocol to run over Tor, because there is no useful binding between JIDs as the routing and identity mechanism and private keys.

  208. southerntofu

    i believe there was a talk from Our Networks (a community networks conference) called "Protocol tactics" addressing such concerns :)

  209. Ge0rG

    Briar is using Tor identities for users, which is a significant improvement on that front.

  210. Ge0rG

    But you probably know what they say about Zooko's triangle

  211. southerntofu

    Ge0rG, this is barely a JID concern.. having aliases for vhosts is an interesting property, but considering Tor is barely a concern for XMPP, it's just a replacement for DNS+TLS to establish the TCP socket to the server :)

  212. Ge0rG

    southerntofu: having aliases in XMPP would be a significant change of the basic protocol

  213. southerntofu

    Ge0rG, fuck Zooko's triangle, GNU Name System has proven by taking a different angle (eg. hyper-hyper local root zone) we can achieve maximum user-friendliness and security

  214. southerntofu

    (sorry i didn't mean it in an offensive way :P)

  215. Ge0rG

    southerntofu: I tried fucking it, but it fucked back. So please stop the profanity and try to convince me with arguments instead.

  216. Ge0rG

    I haven't encountered a proposal that would actually solve the triangle, only some magic handwaving from some cryptocoin shitheads.

  217. southerntofu

    but my understanding of the XMPP protocol is that a Vhost Aliases XEP would not require core changes to the protocol.. a server MAY have different vhosts serving the same accounts (maintaining an internal mapping so that clients only know of one address, to preserve backwards-compatibility), while other servers MAY federate with each or both of my domain aliases without even knowing they're the same one and that wouldn't be a problem

  218. Ge0rG

    southerntofu: well, you'd have to rewrite the server implementations to achieve that, but yes, it would probably be possible.

  219. Ge0rG

    the only way I see to cheat around a foundational rewrite is if it's a 1:1 mapping between clearnet and onion, which can be achieved with a "simple" mapping rule on the s2s side of things

  220. southerntofu

    only weird stuff may happen if a client tries to add my two addresses in their roster, in which case my server would probably reply that we're already subscribing to one another.. it may confuse the user a little but not too much because the local parts of the two JIDs will be the same so..

  221. Zash

    Thing is that there are expectations of symmetry in replies to things everywhere. If you send a query from A1 to B1 and it replies from its alias B2 then things break down. Works in email becasue email doesn't require that symmetry, so you can end up leaking your aliases instead.

  222. Ge0rG

    southerntofu: yes, the server would have to filter that out

  223. Ge0rG

    Zash: you'd have a mapping of (local_domain, remote JID) for all remote JIDs

  224. southerntofu

    Ge0rG, about GNS you may be really interested in the draft RFC to replace DNS (in backwards-compatible manner): https://lsd.gnunet.org/lsd0001/ short version is https://git.gnunet.org/gnunet-videos-2019.git/plain/ICANN66/GNU_Name_System_-_2019_ICANN66__Martin_Schanzenbach.webm (conf from ICANN)

  225. southerntofu

    Zash, yes symmetry would have to be applied everywhere by keeping an internal mapping

  226. Ge0rG

    southerntofu: the "short version" is 37 megabytes, there is no way I can read that any time soon.

  227. southerntofu

    short version is video :P

  228. southerntofu

    like 15min

  229. Ge0rG

    southerntofu: that's actually the long, inaccessible version than.

  230. Zash

    Ge0rG: I'm wondering how far you get by just keep on swapping (to,from), even if the thing replying has adifferent address

  231. southerntofu

    it is! :)

  232. southerntofu

    Zash, i think that's precisely what we were discussing

  233. Ge0rG

    southerntofu: so can you give me a real short version please? two paragraphs at most?

  234. Ge0rG

    Zash: might work out indeed

  235. southerntofu

    at least for exposing MUC as .onion i'm SURE it's entirely possible and not hard to achieve, by having a second component keep track of subscribers to the onion room, and translating to/from fields between onion users and the MUC

  236. southerntofu

    Ge0rG, short version: DNS data lives in a DHT signed by public keys, delegation is achieved via public key (not location), and the system is made to be resistant to enumeration, DOS, etc.. while retaining entire compatibility with DNS because existing records are kept and a GNS system may expose a DNS server ; should it be adopted, DNS root will be replaced by GNS root in the same manner, but in any case GNS intends local root to be editable by users so you can save your friends public keys with petnames.. like http://ge0rg/.. which means if you also delegate part of your zone to your friends f2f name discovery is easy.. like http://alice.ge0rg/ would point me to your friend alice in case i forgot her address ; then there's the identity / data brokering algorithms which rely on GNS but is not exactly part of GNS (reclaim:ID)

  237. southerntofu

    (i'm sure i'm missing many interesting properties of GNS in this summary, but that should be pretty exciting already :P)

  238. Ge0rG

    southerntofu: so you say I need to have a public key that I need to tell everybody who's supposed to trust my DNS records?

  239. southerntofu

    yes and no: existing ICANN tree would (hypothetically, if GNS is adopted as the new DNS, which it very well may be) still be valid

  240. southerntofu

    so you may still have eg. ge0rg.org

  241. southerntofu

    whose public key is resolved from root -> org -> ge0rg (in org zone)

  242. Ge0rG

    southerntofu: yes, so it's the same as current DNS delegation, there is a trusted root providing the keys for .org providing the keys for ge0rg.org

  243. southerntofu

    but then from there i could add you to my petnames as "ge0rg" so even if .org decides to revoke their delegation (because you didn't pay, or because of political pressure) i would still be able to access all your records as ge0rg (without .org)

  244. Ge0rG

    how do you know that the root doesn't misbehave?

  245. Ge0rG

    southerntofu: but for that you need me to tell you my public key

  246. Ge0rG

    look, it's Zooko all over again.

  247. southerntofu

    Ge0rG, you don't, precisely as is already the case.. but you empower users to define hyper-hyper local petnames for their friends of for directory services they trust

  248. southerntofu

    Ge0rG, well there's some TOFU somewhere, though you may build web of trust (or zero-knowledge proof Fog Of Trust, which GNUNet devs are also working on) on top of that, or directory services, or ..

  249. Ge0rG

    southerntofu: I think the most appropriate reaction is https://www.youtube.com/watch?v=7Twnmhe948A

  250. southerntofu

    (can't see the video but wtf is that? :P)

  251. Ge0rG

    southerntofu: it's hyper-hyper.

  252. Ge0rG

    southerntofu: but thank you for reinforcing my opinion that there is no way to circumvent Zooko's triangle.

  253. southerntofu

    so without doing exactly WebOfTrust, i can publish my favorite zones as delegations in my own, and advertise them on my website/gemlog so that can be used to bootstrap trust

  254. Zash

    Dat 90s graphis

  255. southerntofu

    Ge0rG, it's not circumventing exactly.. but applying petnames on top of crypto-secure global identifiers does break the USUAL UNDERSTANDING of zooko's triangle :)

  256. Zash

    Zooko's Square?

  257. Ge0rG

    southerntofu: well, you have petnames that are backed by cryptographic identities that you need to exchange prior to trusting them.

  258. southerntofu

    i.e. that we can't have global secure meaningful names.. well we can keep global and secure (public key) while applying another layer of local & human meaningful, and the mapping of the two somewhat defies zooko's triangle

  259. Ge0rG

    This is *exactly* Zooko's triangle.

  260. Zash

    Isn't the usual solution to combine two name systems? Is that what they did?

  261. Ge0rG

    there is no "local" on the internet.

  262. Ge0rG

    southerntofu: I'm getting out of this now, because I'm convinced this won't lead anywhere, and it's rather off-topic for this place.

  263. southerntofu

    Ge0rG, you are correct. it is zooko's triangle.. but applying the two "different" name systems does break the usual conclusion of zooko's

  264. Ge0rG

    southerntofu: no, it's only hiding the complexity and luring people into a false feeling of security.

  265. Ge0rG

    </eod>

  266. southerntofu

    Ge0rG, sorry i don't mean to eat your time :) i just thought GNS is very convincing on a human and technical perspective (at least compared to the alternatives) and i wouldn't call the MAJOR improvements they implement a "false sense of security" though of course nothing is ever 100% secure

  267. southerntofu

    sorry for digression :)