Re: [Operators] Announce: Jabber Spam Fighting Manifesto (for public servers)

2018-02-08 Thread Dave Cridland
ut neverthless this still reads to me as if the signatories are asserting they're following a specific set of anti-spam related configurations and also blocking server connections from (spammy) Public Servers, if they do not follow the same set. I don't think, reading your response, you inte

Re: [Operators] Announce: Jabber Spam Fighting Manifesto (for public servers)

2018-02-08 Thread Dave Cridland
On 8 February 2018 at 08:31, Georg Lukas wrote: > If you run a public server and are committed to fighting outbound and > inbound spam, please review the text and let me know if you would agree > to sign it. Please do not sign it *yet*, in case there is feedback > requiring changes to the text. Pl

Re: [Operators] XMPP server recommendations

2017-11-20 Thread Dave Cridland
On 20 November 2017 at 08:26, Kristian Rink wrote: > Folks; > > we're currently running an internal XMPP service based upon openfire wich > works well but has a few drawbacks that don't seem to be addressable with > this implementation. > What are the drawbacks you've found? I'd like to address t

Re: [Operators] xmpp is dead

2017-05-06 Thread Dave Cridland
+1. Also, bet on the one that can adapt stably. Matrix has already suffered interop breaks and forklift upgrades, XMPP is much better in that regard. One could even see it as the upside of the fragmentation that Matrix complains of. On 6 May 2017 08:54, "David Banes" wrote: > My annual chip in :

Re: [Operators] spam

2016-11-19 Thread Dave Cridland
On 19 November 2016 at 12:52, David Banes wrote: > How about following the very large email providers lead and do something like > this; > > https://en.wikipedia.org/wiki/DMARC > https://dmarc.org/2016/02/how-can-i-tell-who-is-using-dmarc/ As other point out, DMARC is about address spoofing, and

Re: [Operators] Spam Problem And Its Simple Solution

2016-11-19 Thread Dave Cridland
On 19 November 2016 at 13:27, Krzysztof Grochocki wrote: > Hello. > > Over the past year I received spam message only in russian language or in > russian and english language together. I think we can block such messages > like it is in one of polish IM - just block incoming/outgoing messages where

Re: [Operators] Obtaining XMPP-enabled certificate for server

2016-07-20 Thread Dave Cridland
On 20 July 2016 at 10:15, Dave Cridland wrote: > > > On 20 July 2016 at 10:07, Simon Josefsson wrote: > >> Sam Whited writes: >> >> > On Tue, Jul 19, 2016 at 4:53 AM, Simon Josefsson >> wrote: >> >> I wonder if people really care about this

Re: [Operators] Obtaining XMPP-enabled certificate for server

2016-07-20 Thread Dave Cridland
On 20 July 2016 at 10:07, Simon Josefsson wrote: > Sam Whited writes: > > > On Tue, Jul 19, 2016 at 4:53 AM, Simon Josefsson > wrote: > >> I wonder if people really care about this usage any more -- it does not > >> scale well (all domains have to be encoded in the same cert => big > >> certs)

Re: [Operators] Obtaining XMPP-enabled certificate for server

2016-07-20 Thread Dave Cridland
On 20 July 2016 at 08:58, Florian Schmaus wrote: > For the near future, I hope that certificates using only srvNames will > become more common. But if you want to stay super "compatible" with all > sorts of XMPP software out there, then you probably want to put your > XMPP domain in the CN too. W

Re: [Operators] Obtaining XMPP-enabled certificate for server

2016-07-19 Thread Dave Cridland
On 19 July 2016 at 17:36, Marvin Gülker wrote: > Am Tue, 19 Jul 2016 16:15:40 +0200 > schrieb Florian Schmaus : > > Isn't one problem that a cert with CN "example.org" will be valid for > > all services found on example.org (simply speaking), whereas when > > using SRV-ID restricts the cert to a

Re: [Operators] addressing the spam problem

2016-01-13 Thread Dave Cridland
On 13 January 2016 at 02:23, Kim Alvefur wrote: > On 01/12/2016 06:55 PM, Peter Saint-Andre wrote: > > Over the years we have discussed a number of potential methods for > > mitigating (I do not say solving) the spam problem. For example: > > > > http://xmpp.org/extensions/xep-0159.html > > http:

Re: [Operators] Diffie-Hellman: 2k or 4k keys?

2015-11-26 Thread Dave Cridland
On 24 Nov 2015 11:09 pm, "Arsimael Inshan" wrote: > > Hi there. > > When I created the DH Keys on my server, I generated 2k and 4k keys. I was told the 4k keys shouldn't be used (yet) because of incompartibillities and they wouldn't increase the security this much, but generate way more problems.

Re: [Operators] debian.org XMPP - using DANE / TLSA?

2015-10-28 Thread Dave Cridland
On 28 October 2015 at 21:32, Daniel Pocock wrote: > > > We are just reviewing the final configuration before announcing > debian.org XMPP > > That's great news. > Can anybody comment on DANE / TLSA? Should we only talk to servers > supporting this? > > Last time I looked, only around 10% of se

Re: [Operators] XMPP federation over Tor : supported by Prosody, join us !

2015-10-16 Thread Dave Cridland
On 15 October 2015 at 21:07, Finn Herzfeld wrote: > That's pretty cool, but this whole mapping thing seems broken. Would > there be a way for a server to probe another server over the clearnet > for an onion address, then it can cache that and build it's own list? I > don't know a ton about the a

Re: [Operators] Please enable Forward Secrecy for your servers!

2015-10-05 Thread Dave Cridland
On 5 October 2015 at 14:22, Matthew Wild wrote: > This is technically achievable using security labels > (http://xmpp.org/extensions/xep-0258.html ), though it hasn't really > been deployed that way on the public network, and not many clients > support it (though Swift and Gajim both do, and they

Re: [Operators] SSL trust in XMPP world

2015-09-03 Thread Dave Cridland
Notaries are CAs, except that a CA validation might potentially be something beyond TOFU, and the assertion lifetime is well-defined. On the other hand, the CA is picked by the service. There's a number of approaches to identity validation given an X.509 certificate chain. Not all of them are vali

Re: [Operators] Please enable Forward Secrecy for your servers!

2015-07-21 Thread Dave Cridland
On 21 July 2015 at 08:44, David Banes wrote: > On 20 Jul 2015, at 23:19, Jonathan Schleifer < > js-xmpp-operat...@webkeks.org> wrote: > > > Am 21.07.2015 um 00:10 schrieb David Banes : > > > >> On 20 Jul 2015, at 23:07, Peter Kieser wrote: > >> > >>> On 2015-07-10 2:47 AM, Mathias Ertl wrote: >

Re: [Operators] Public XMPP service: jabberzac.org

2015-03-11 Thread Dave Cridland
On 11 March 2015 at 09:43, Mathias Ertl wrote: > back. The XSF has been very sporadic in operators support, the list was > never (at least: not since 2007 or so) really maintained. Sadly, they > were very reluctant to ever ask for support, and *always* simply ignored > any offer for support, even

[Operators] Fwd: Openfire 3.10.0 Beta release

2015-01-21 Thread Dave Cridland
As sent to the jdev list: -- Forwarded message -- From: Dave Cridland Date: 21 January 2015 at 16:59 Subject: Openfire 3.10.0 Beta release To: Jabber/XMPP software development list Hey everyone, Since I took on the role of Openfire project lead, the Openfire developers have

Re: [Operators] Suspicion of Jabbim services being hacked

2014-12-19 Thread Dave Cridland
On 19 December 2014 at 22:55, Dave Cridland wrote: > > > On 19 Dec 2014 22:12, "Waqas Hussain" wrote: > > > > On Fri, Dec 19, 2014 at 3:18 PM, Kevin Smith > wrote: > >> > >> On 19 Dec 2014, at 19:36, Mathieu Pasquet > wrote: > >>

Re: [Operators] Suspicion of Jabbim services being hacked

2014-12-19 Thread Dave Cridland
On 19 Dec 2014 22:12, "Waqas Hussain" wrote: > > On Fri, Dec 19, 2014 at 3:18 PM, Kevin Smith wrote: >> >> On 19 Dec 2014, at 19:36, Mathieu Pasquet wrote: >> > >> > On Fri, Dec 19, 2014 at 06:48:44PM +, Dave Cridland wrote: >> >>

Re: [Operators] Suspicion of Jabbim services being hacked

2014-12-19 Thread Dave Cridland
On 19 December 2014 at 20:18, Kevin Smith wrote: > > On 19 Dec 2014, at 19:36, Mathieu Pasquet wrote: > > > > On Fri, Dec 19, 2014 at 06:48:44PM +0000, Dave Cridland wrote: > >> On 19 Dec 2014 18:32, "Sam Whited" wrote: > >>> On 12/19

Re: [Operators] Suspicion of Jabbim services being hacked

2014-12-19 Thread Dave Cridland
It feels like we should do something like the encryption push, but for non-plaintext passwords. On 19 Dec 2014 18:32, "Sam Whited" wrote: > Another great example of why you should ditch DIGEST-MD5 and store your > passwords as SCRAM bits. > > —Sam > > On 12/19/2014 09:24 AM, Peter Viskup wrote: >

Re: [Operators] public XMPP service

2014-10-30 Thread Dave Cridland
Erm, this one appears to be in error: On 30 October 2014 05:46, ayoub ayad wrote: > Hello! > > Please add my public XMPP service to the list at xmpp.net. The > information is as follows: > domain: [jsoor.tk] There are no SRV records for this domain, nor A records. (Bizarrely, it does have an A

Re: [Operators] XMPP Security Talk to IAB

2014-09-01 Thread Dave Cridland
On 1 September 2014 12:19, Evgeny Khramtsov wrote: > Mon, 1 Sep 2014 11:52:22 +0100 > Dave Cridland wrote: > > > On 31 August 2014 22:28, Evgeny Khramtsov wrote: > > > > > Sun, 31 Aug 2014 22:35:07 +0200 > > > Jonas Wielicki wrote: > > > > &g

Re: [Operators] XMPP Security Talk to IAB

2014-09-01 Thread Dave Cridland
On 31 August 2014 22:28, Evgeny Khramtsov wrote: > Sun, 31 Aug 2014 22:35:07 +0200 > Jonas Wielicki wrote: > > > > I left the c2s-encryption-required switch in place (there would have been > > out-of-band measures to reach me if that had been a problem) > > A year ago I did some experiment on a

Re: [Operators] XMPP Security Talk to IAB

2014-08-29 Thread Dave Cridland
ing. I know Prosody, too, has developed a mechanism for whitelisting domains, so deployments can relax requirements for Google et al. > Marco. > > Il 29/08/2014 10:54, Dave Cridland ha scritto: > > Folks, > > I really need your help. > > I've been asked to giv

[Operators] XMPP Security Talk to IAB

2014-08-29 Thread Dave Cridland
Folks, I really need your help. I've been asked to give a talk next Wednesday to the Internet Architecture Board - the senior panel of the IETF - about the changes we made to encryption on the XMPP network. When I say "I've been asked", I quite clearly mean "They asked lots of more sensible peop

Re: [Operators] Google status?

2014-08-12 Thread Dave Cridland
On 12 August 2014 12:22, Daniel Pocock wrote: > Can anybody comment on the current status of interop between Google > (gmail.com) users and the rest of the world? > The only people who can definitively comment are Google. Personally, I have a Prosody server and various clients like Jitsi and I

Re: [Operators] ECDSA certs score F

2014-08-06 Thread Dave Cridland
Without an RSA cert at all, can a remote server with only RSA negotiate TLS? On 5 August 2014 19:30, shm...@riseup.net wrote: > ? > > shm...@riseup.net wrote: > > > > hi, > > > > i was testing an xmpp server and i believe its wrong to reduce the > > score because of the cert which is reported <

[Operators] Openfire (for operators)

2014-06-02 Thread Dave Cridland
Folks, I know quite a few of you are running Openfire - you may well have noticed, but development has been ramping up again for some time. In light of this, I've volunteered to act as Project Lead. While there's certainly plenty of work left to be done, I'm keen to get a sense of the most serious

Re: [Operators] dot xmpp

2014-02-05 Thread Dave Cridland
Taking this suggestion seriously for a moment: If there's genuine interest, the XSF (or some other body) could do this. It would mean a TLD that we controlled, allowing us to provide, and perhaps even enforce, DNSSEC and things. But it would also have significant operating costs beyond the initial

Re: [Operators] Prosody vs. spammers - security measures?

2014-02-04 Thread Dave Cridland
On 4 Feb 2014 18:27, "Evgeny Khramtsov" wrote: > > Tue, 04 Feb 2014 09:59:37 -0700 > michael p wrote: > > > I'm all for privacy, but I realize I need to trade some in order to > > use other people's free as in beer services. If people expect free > > services to also allow anonymous registration

Re: [Operators] Prosody vs. spammers - security measures?

2014-02-04 Thread Dave Cridland
On Tue, Feb 4, 2014 at 5:28 PM, Alexander Holler wrote: > Am 04.02.2014 17:59, schrieb michael p: > > Wait, why do the phone numbers need to be stored/logged? Can't a >> completely separate system be used to send an audio message or text to a >> number, then once the correct verification code is

Re: [Operators] XMPP bashing

2014-02-03 Thread Dave Cridland
On 3 Feb 2014 16:44, "Andreas Kuckartz" wrote: > > Claudiu Curcă: > > 1. Why is that comment classified as "XMPP bashing"? > > As far as I know Daniel is mostly an SIP guy and is trying to _help_ the > XMPP community by pointing to that comment. But I also do not think that > the comment is "bashi

Re: [Operators] XMPP forwarding and redirect?

2014-01-23 Thread Dave Cridland
On Thu, Jan 23, 2014 at 10:55 AM, Cesar Alcalde wrote: > Well, actually you could setup DNS SRV records pointing to a third party > server (like the MX record for mail). > > So you can have a server example.org with a web server, a ftp server... > And xmpp accounts @example.org although the actua

Re: [Operators] XMPP forwarding and redirect?

2014-01-23 Thread Dave Cridland
This is possibly a better conversation to have on jdev@ or standards@ On Thu, Jan 23, 2014 at 10:27 AM, Daniel Pocock wrote: > > For example, many free software projects (Debian, Fedora) offer their > developers mail forwarding (poc...@debian.org->dan...@pocock.com.au) > without having any mailbox

Re: [Operators] debian.org SIP and XMPP

2014-01-19 Thread Dave Cridland
On Sun, Jan 19, 2014 at 8:43 AM, Daniel Pocock wrote: > As mentioned in the other email, FOSDEM is coming up, maybe that will be > an opportunity to discuss in person? (Please don't let my .au domain > deceive you, I'm based in central Europe) > Sadly, I don't think Matt is joining us this tim

Re: [Operators] debian.org SIP and XMPP

2014-01-18 Thread Dave Cridland
On Sat, Jan 18, 2014 at 10:37 PM, Matthew Wild wrote: > Hi Daniel, > > On 18 January 2014 21:50, Daniel Pocock wrote: > > > > Hi all, > > > > We have just enabled federated SIP for debian.org. It is very basic, > > just a SIP proxy and TURN server. People can register and make calls to > > eac

Re: [Operators] Removing SSLv3 from ejabberd 2.1.x and 13.x

2014-01-07 Thread Dave Cridland
On Tue, Jan 7, 2014 at 2:43 AM, Peter Saint-Andre wrote: > And do please note that several weeks ago I updated both the manifesto > and draft-saintandre-xmpp-tls to no longer say that software MUST NOT > negotiate sslv3. > Hopelessly wrong mailing list, but: Might be worth clarifying that slight

Re: [Operators] Security Test Day - feedback needed!

2014-01-06 Thread Dave Cridland
On Mon, Jan 6, 2014 at 3:32 AM, Peter Saint-Andre wrote: > - - Office365 deployments > Meaning the (irritatingly named) Lync? I believe that went through quite extensive S2S/TLS/Auth interop work. Certainly it's now been put on the DISA APL (as of September), and that mandates that kind of securi

Re: [Operators] Security Test Day - feedback needed!

2014-01-05 Thread Dave Cridland
On Sun, Jan 5, 2014 at 8:21 PM, Peter Saint-Andre wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > On my personal server, I too plan to keep the encryption-required > setting in place. > > I'm turning it off again, for S2S. C2S I had enabled anyway, but seeing as it's just me, that's n

Re: [Operators] Chatme.im to prosody

2014-01-05 Thread Dave Cridland
On Sun, Jan 5, 2014 at 7:52 PM, Waqas Hussain wrote: > > Prosody was the first server to allow multiple resources behind a > single nick (AFAIK, I implemented it in Prosody). I think the ejabberd > folks were looking into implementing that, but not sure what their > progress is. > > Yes, you beat

Re: [Operators] Chatme.im to prosody

2014-01-04 Thread Dave Cridland
On Sat, Jan 4, 2014 at 9:12 PM, Peter Saint-Andre wrote: > Speaking of .im, perhaps we could make a list of all the .im domains > offering XMPP services and send a joint appeal to the .im TLD folks to > add DNSSEC support? > I've tried something unofficial, and haven't had a response (aside from

Re: [Operators] Security Test Day reminder - 4 Jan 2014

2014-01-04 Thread Dave Cridland
Something to note; chatting with Jesse Thompson, we found that the errors we were getting back simply didn't match the likely cases. I saw DNS errors, he saw similar. I've not isolated the actual fault yet. On Sat, Jan 4, 2014 at 2:25 PM, Valérian Saliou < valer...@valeriansaliou.name> wrote: >

Re: [Operators] Security Test Day reminder - 4 Jan 2014

2014-01-03 Thread Dave Cridland
I just switched my switch - requiring encryption everywhere for the next day or so. On Fri, Jan 3, 2014 at 8:56 PM, Mike Taylor wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Just a friendly note that the Security Test Day is tomorrow! > > I'm cross posting this notice but please

Re: [Operators] The Google issue

2013-11-22 Thread Dave Cridland
On Fri, Nov 22, 2013 at 10:14 AM, Tim Schumacher wrote: > In the past"Björn Kempén " wrote on this very list, > that he is one of the responsible for the federation stuff at Google > XMPP, btw at the beginning of this year, the TLS-issue was already a topic: > > http://mail.jabber.org/pipermail/op

Re: [Operators] The Google issue

2013-11-22 Thread Dave Cridland
On Thu, Nov 21, 2013 at 7:26 PM, Matthew Wild wrote: > With all the talk about the details of the manifesto, one thing we > seem to mostly only mention in passing is federation with Google, and > I'm curious to gauge the opinion of people on this list. > > We are going to affect a lot of users ac

Re: [Operators] DNSSEC

2013-11-20 Thread Dave Cridland
I found: http://www.internetsociety.org/deploy360/resources/dnssec-registrars/ And also: http://www.icann.org/en/news/in-focus/dnssec/deployment On Wed, Nov 20, 2013 at 2:51 PM, Peter Saint-Andre wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > On 11/20/13 5:19 AM, Solomon Peachy

Re: [Operators] DNSSEC

2013-11-20 Thread Dave Cridland
On Wed, Nov 20, 2013 at 9:16 AM, Matthias Wimmer wrote: > Hi Dave, > > El 2013-11-19 17:04:44, Dave Cridland escribió: > > I dropped a mail to the Domicilium people who look after .im today asking > > about DNSSEC, too. > > Probably it's what you meant. I just wan

Re: [Operators] DNSSEC

2013-11-19 Thread Dave Cridland
I dropped a mail to the Domicilium people who look after .im today asking about DNSSEC, too. On Tue, Nov 19, 2013 at 4:20 PM, Peter Saint-Andre wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > It appears that more XMPP services are getting their DNS records > signed with DNSSEC: > >

Re: [Operators] IM Observatory and Diffie-Hellman parameters

2013-11-13 Thread Dave Cridland
On Wed, Nov 13, 2013 at 10:58 PM, Thijs Alkemade wrote: > > Not the same key - just multiple keys generated using the same DH group. > That's exactly what I thought you meant and what I completely failed to type. :-/ Sorry! Dave.

Re: [Operators] IM Observatory and Diffie-Hellman parameters

2013-11-13 Thread Dave Cridland
On Wed, Nov 13, 2013 at 10:41 PM, Thijs Alkemade wrote: > > On 13 nov. 2013, at 19:21, Dave Cridland wrote: > > To decrypt all communications using 1024-bit DH over a year is likely to > be vastly bigger than for one conversation; the same isn't true for RSA, > for e

Re: [Operators] IM Observatory and Diffie-Hellman parameters

2013-11-13 Thread Dave Cridland
On Wed, Nov 13, 2013 at 9:44 PM, Fedor Brunner wrote: > For detailed description of various attack scenarios with calculations > please read > > ECRYPT II Yearly Report on Algorithms and Keysizes > (2011-2012) > http://www.ecrypt.eu.org/documents/D.SPA.20.pdf > > Good link; though I suspect the mo

Re: [Operators] IM Observatory and Diffie-Hellman parameters

2013-11-13 Thread Dave Cridland
On 13 Nov 2013 17:01, "Fedor Brunner" wrote: > There is good comparison website for key sizes recommendations: http://www.keylength.com/en/compare/ > Enter the year until when your system should be protected and see the Discrete Logarithm Group column. > Yes, that site is very nice. > The scenar

Re: [Operators] IM Observatory and Diffie-Hellman parameters

2013-11-13 Thread Dave Cridland
On Wed, Nov 13, 2013 at 3:31 PM, Fedor Brunner wrote: > For example the server jabber.ccc.de uses 2048 bit RSA public key, but > the length of the temporary key is only 1024 bit. The public key score > is 90, cipher score is 90 > http://xmpp.net/result.php?domain=jabber.ccc.de&type=server Hmmm..

Re: [Operators] No, not the hostname in CN. - Re: IM Observatory @ xmpp.net

2013-11-04 Thread Dave Cridland
On Mon, Nov 4, 2013 at 1:09 PM, Kim Alvefur wrote: > On 2013-11-04 03:01, Peter Kieser wrote: > > Shouldn't the SSL certificate CN match the hostname listed in the "IN > > SRV" record, since that's the hostname a S2S connection will open to. > > No! The domain should match a subjectAltName. Ign

Re: [Operators] Message delivery

2013-10-29 Thread Dave Cridland
On Tue, Oct 29, 2013 at 10:21 PM, Peter Saint-Andre wrote: > If the server you're using doesn't support XEP-0227 ("Portable > Import/Export Format for XMPP-IM Servers"), then I agree you might > have a problem. > > http://xmpp.org/extensions/xep-0227.html > > Kev knocked out a simple exporter, act

Re: [Operators] Fwd: [jdev] TLS Everywhere

2013-10-29 Thread Dave Cridland
On Tue, Oct 29, 2013 at 7:28 PM, Olle E. Johansson wrote: > On the topic of user-interfaces: > > - How does a a server that fails to setup a s2s session indicate the > failure back to a client? > - Does the protocol support an error message saying "certificate failure" > or "TLS not available"? >

Re: [Operators] Fwd: [jdev] TLS Everywhere

2013-10-29 Thread Dave Cridland
On Tue, Oct 29, 2013 at 6:17 PM, Jonas Wielicki < xmpp-operat...@sotecware.net> wrote: > Will there be a reminder for the action days? Because I don't trust > myself to keep an electronic reminder actually functional until Jan 4th > (yeah I know). I'm only operating a small service though (<20 use

Re: [Operators] Fwd: [jdev] TLS Everywhere

2013-10-29 Thread Dave Cridland
On Tue, Oct 29, 2013 at 5:46 PM, Peter Saint-Andre wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > On 10/29/13 11:40 AM, Jesse Thompson wrote: > > On 10/28/2013 2:52 PM, Peter Saint-Andre wrote: > >> On 10/28/13 1:41 PM, Jesse Thompson wrote: > >>> Are there more details? Specificall

Re: [Operators] [Members] [prosody-users] Re: [buddycloud-dev] Some thoughts on buddycloud security / enforcing SSL server to server in Prosody

2013-08-23 Thread Dave Cridland
On 23 Aug 2013 08:56, "Evgeniy Khramtsov" wrote: > > On 23.08.2013 17:43, Dave Cridland wrote: >> >> >> You're wrong, actually. But what Phil suggested here was using it for CA pinning, where the certificate is signed by a CA not in your list of trust an

Re: [Operators] [Members] [prosody-users] Re: [buddycloud-dev] Some thoughts on buddycloud security / enforcing SSL server to server in Prosody

2013-08-23 Thread Dave Cridland
On 23 Aug 2013 08:30, "Evgeniy Khramtsov" wrote: > > On 22.08.2013 09:03, Phil Pennock wrote: >> >> On 2013-08-21 at 12:52 -0600, Peter Saint-Andre wrote: >>> >>> 5. No server-to-server connections without TLS. >>> >>> 6. Require proper certificate checking (RFC 6120 / RFC 6125) for TLS >>> negoti

Re: [Operators] Some thoughts on xmpp security

2013-08-22 Thread Dave Cridland
The XSF did some interop some time back to help test TLS interop, using a custom CA. The CA software was from my previous employer, Isode. We could look into setting up servers with those certs again, I imagine, though the certs themselves would need recreating. The rest is, as you say, just a ma

Re: [Operators] Google Talk - enable or not?

2013-06-15 Thread Dave Cridland
On Sat, Jun 15, 2013 at 3:00 AM, Jesse Thompson < jesse.thomp...@doit.wisc.edu> wrote: > I'm looking for guidance. > > Aren't we all? > Now that Google is transitioning to Hangouts, they're no longer supporting > XMPP federation. > > Well. In principle. But it seems there's *some* federation, bu

Re: [Operators] spam resistance

2013-05-24 Thread Dave Cridland
On Fri, May 24, 2013 at 12:25 AM, Peter Saint-Andre wrote: > On 5/23/13 4:50 PM, Justin Uberti wrote: > > I just realized my statement could be parsed 2 different ways. To > > be clear: it is sad that spammers were more willing to adopt > > XMPP*than other IM networks were willing to*. Believe me,

Re: [Operators] Spam Registrations

2013-05-23 Thread Dave Cridland
On Thu, May 23, 2013 at 4:36 PM, Kevin Smith wrote: > There are also likely options along these lines that involve less > privacy invasion than operators manually examining the accounts. A > captcha for every subscription request? Only one outstanding (not > reciprocated) roster request at a time

Re: [Operators] spam resistance (was: Re: google abandoning XMPP??)

2013-05-23 Thread Dave Cridland
On Thu, May 23, 2013 at 12:35 AM, Justin Uberti wrote: > That seems like an overly cynical assessment of the situation. Speaking as > an individual, it is sad that spammers were more willing to adopt XMPP than > other IM networks, but so it goes. > I'm not sure sufficient information exists in o

Re: [Operators] google abandoning XMPP??

2013-05-22 Thread Dave Cridland
On Wed, May 22, 2013 at 5:32 PM, Kim Alvefur wrote: > On 2013-05-22 18:22, Hannes Tschofenig wrote: > > PS: I am wondering whether the claimed chat spam problems mentioned in > the press articles are actually true? > > It matches what was said before, search this list for "spammy invites". > > I'

Re: [Operators] google abandoning XMPP??

2013-05-21 Thread Dave Cridland
On Mon, May 20, 2013 at 10:33 PM, Kim Alvefur wrote: > Welcome back to the 90's people! > Does that mean I get to push ACAP again?

Re: [Operators] google abandoning XMPP??

2013-05-16 Thread Dave Cridland
The best information I've been given is that Google are stopping S2S entirely, and C2S will be a legacy interface to 1:1 text chat only. On the plus side, this means there's no reason not to require TLS now. Dave.

Re: [Operators] SSL certificates / private CAs / CACert issue

2013-03-22 Thread Dave Cridland
On Thu, Mar 21, 2013 at 11:57 PM, Phil Pennock < xmpp-operators+p...@spodhuis.org> wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: RIPEMD160 > > On 2013-03-21 at 07:45 -0700, Peter Saint-Andre wrote: > > https://datatracker.ietf.org/doc/draft-miller-xmpp-posh-prooftype/ > > """

Re: [Operators] Update on spammy invites

2013-03-20 Thread Dave Cridland
On 20 Mar 2013 23:09, "Peter Viskup" wrote: > > On 03/20/2013 07:03 PM, Dave Cridland wrote: >> >> Peter mentioned ensuring that open registration is blocked - I think that open registration has proved itself our equivalent of open relaying in SMTP, and we need to ca

Re: [Operators] Update on spammy invites

2013-03-20 Thread Dave Cridland
On Wed, Mar 20, 2013 at 5:26 PM, Jesse Thompson < jesse.thomp...@doit.wisc.edu> wrote: > Frankly, I wouldn't be aware if a public XMPP blacklist already exists, > since our university doesn't have the problem of XMPP spam. It seems that > the spammers are only targeting certain services, such as

Re: [Operators] Spammy servers

2013-03-01 Thread Dave Cridland
On 1 Mar 2013 17:03, "Kevin Smith" wrote: > This sounds very thorough (and entirely reasonable). Is your setup for > doing this generally available so other servers could take advantage > of similar systems? I also wonder whether it'd be worthwhile restricting S2S traffic on new users initially;

Re: [Operators] Strange s2s issue regarding my server and jabber.org (M-Link issue?)

2013-02-13 Thread Dave Cridland
On 13 Feb 2013 16:38, "Marco Cirillo" wrote: > Just figured I would let you know, > > I'm experiencing very slow s2s communication establishments torward jabber.org, it doesn't seem due to latency or other congestion factors. Well, that's curious. I'd note that your certificate appears to have a

Re: [Operators] Gmail federation

2013-01-11 Thread Dave Cridland
On Fri, Jan 11, 2013 at 1:05 PM, Marco Cirillo wrote: > I just pointed out that it's like this from 2006 which is when it was > implemented, perhaps it can't be "suprising" also stated it's rather an > inconveniency and that it's not compliant with the current RFC which > requires TLS support on s

Re: [Operators] SSL certificates / private CAs / CACert issue

2012-12-17 Thread Dave Cridland
There's four things you can do with TLS: 1) Compression. This is irrelevant here. 2) Integrity - so you know the bytes that left the peer you're talking to haven't been changed. 3) Confidentiality - so you know the bytes that left the peer you're talking to haven't been seen by anyone else. 4)

Re: [Operators] Investigation/help needed

2012-09-16 Thread Dave Cridland
If it's a JAR, it won't be human readable, but we might be able to look at the files (it's a ZIP of Java object code), and get a list of targetted servers. Then we just disable IBR on the affected servers, or block them. On Sep 16, 2012 12:33 AM, "Peter Viskup" wrote: > Dear all, > would there b

Re: [Operators] Reporting DDoS attack, the idiot responsible of the attack and the server range which the drones come from.

2012-09-04 Thread Dave Cridland
While I agree with much of what you're saying, making a public service that's not the equivalent of an open relay is hard. Google has a lot of code assigned at detecting abuse, and a lot of this works because of the scale of their operation. I think public servers are possible, but not as they are

Re: [Operators] Reporting DDoS attack, the idiot responsible of the attack and the server range which the drones come from.

2012-09-04 Thread Dave Cridland
If you have concrete suggestions for what the XSF should be doing, and/or how servers could defend themselves against spam and DDoS, I'd be interested in hearing them. My understanding is that they're both difficult problems to tackle without a lot of data processing and analysis, but that a key i

[Operators] TLS to large hosting sites

2012-04-13 Thread Dave Cridland
new" federation work we're doing in XMPP, both at the XSF and the IETF. Dave. -- Dave Cridland - mailto:d...@cridland.net - xmpp:d...@dave.cridland.net - acap://acap.dave.cridland.net/byowner/user/dwd/bookmarks/ - http://dave.cridland.net/ Infotrope Polymer - ACAP, IMAP, ESMTP, and Lemonade

Re: [Operators] Gmail federation

2012-02-27 Thread Dave Cridland
is failing (in common cases) without you having to manually chase up each case? If there's anything we could do on a protocol/standards front to make self-diagnosis of S2S failure easier, I'd be willing to push for that. (And in my guise as M-Link guy, make sure we implement

Re: [Operators] XMPP Deployment Trends

2012-02-09 Thread Dave Cridland
PP as well. Which I'm also happy with. :-) Dave. -- Dave Cridland - mailto:d...@cridland.net - xmpp:d...@dave.cridland.net - acap://acap.dave.cridland.net/byowner/user/dwd/bookmarks/ - http://dave.cridland.net/ Infotrope Polymer - ACAP, IMAP, ESMTP, and Lemonade

Re: [Operators] Strange users

2011-10-11 Thread Dave Cridland
imate, and then telling people about the conversations these people were having. On the other hand, by publishing the address, you've already breached data confidentiality laws in some jurisdictions... Dave. -- Dave Cridland - mailto:d...@cridland.net - xmpp:d...@dave.

Re: [Operators] Strange users

2011-10-11 Thread Dave Cridland
anything to do with it beyond a background as to when Daniel noticed. Dave. -- Dave Cridland - mailto:d...@cridland.net - xmpp:d...@dave.cridland.net - acap://acap.dave.cridland.net/byowner/user/dwd/bookmarks/ - http://dave.cridland.net/ Infotrope Polymer - ACAP, IMAP, ESMTP, and Lemonade

Re: [Operators] about srv record

2011-08-16 Thread Dave Cridland
On Tue Aug 16 09:47:35 2011, Kevin Smith wrote: On Mon, Aug 15, 2011 at 8:44 AM, Dave Cridland wrote: > On Sat Aug 13 23:34:56 2011, Josemar Müller Lohn wrote: >>> Is it valid to so: >>> _xmpp-client._tcp.alice.com. CNAME _xmpp-client.bob.com. >> >> You can

Re: [Operators] about srv record

2011-08-15 Thread Dave Cridland
t the client balance connections to the SRV targets, but say nothing about multihomed hosts. (If we're being pedantic, a single name can only have one A record, but that record may have more than one RR). Dave. -- Dave Cridland - mailto:d...@cridland.net - xmpp:d...@dave.cridland.n

Re: [Operators] about srv record

2011-08-15 Thread Dave Cridland
cations. A CNAME merely states to restart the resolution using the new name. Specifically, the requirement that a name with a CNAME record MUST NOT have any other records (aside from certain DNSSEC ones) would appear to support that. Dave. -- Dave Cridland - mailto:d...@cridland.ne

Re: [Operators] Suspicious user accounts ...

2011-08-10 Thread Dave Cridland
NSWER SECTION: 210.3.128.188.in-addr.arpa. 3600 IN PTR mail.settv.ru. inetnum:188.128.3.192 - 188.128.3.223 netname:ROSTELECOMNET descr: JSC Rostelecom P2P client connections Dunno if either's significant, based on a sample of one... Dave. -- Dave Cridland

Re: [Operators] Jabber/XMPP being employed to cheat in games.

2011-01-21 Thread Dave Cridland
red by jabber, so that more of them do not worry PS: Ivan with love especially for lovers of DDoS ... -- I especially like the suggestion of trampling register. Dave. -- Dave Cridland - mailto:d...@cridland.net - xmpp:d...@dave.cridland.net - acap://acap.dave.cridland.net/byowner/user/dwd/bookmarks/ - http://dave.cridland.net/ Infotrope Polymer - ACAP, IMAP, ESMTP, and Lemonade

Re: [Operators] Rosters flood

2010-09-08 Thread Dave Cridland
is a problem with subscriptions: you cannot block them efficiently using roster mechanism. Another problem is MUC (for obvious reasons). So we need captchas as a possible response to type='subscribe'/>, do you think? Dave. -- Dave Cridland - mailto:d...@cridland.net - xmpp:d...

Re: [Operators] Openfire 3.6.4 (jabber.iitsp.com) vs. jabber.org

2010-07-06 Thread Dave Cridland
ators thankfully have quite a few options for serious XMPP hosting, which is good - I think - for the operator community. Us implementors actually have serious competition, and therefore incentive to push our products, for one thing. Dave. -- Dave Cridland - mailto:d...@cridland.net - x

Re: [Operators] Openfire 3.6.4 (jabber.iitsp.com) vs. jabber.org

2010-07-05 Thread Dave Cridland
. We'll supress it for client-side (it doesn't help here), and work on a fix. Thanks for the help in tracking it down. The Openfire guys might want to work on a fix, though, since it's quite useful to have server-side. Dave. -- Dave Cridland - mailto:d...@cridland.net -

Re: [Operators] Openfire 3.6.4 (jabber.iitsp.com) vs. jabber.org

2010-07-05 Thread Dave Cridland
On Mon Jul 5 11:37:27 2010, Dave Cridland wrote: On Mon Jul 5 10:59:43 2010, Nigel Kukard wrote: If it was C, I would be hacking the code and adding debugging to see where the connection is terminating ... etc. I'd be (secretly, of course) delighted if this were a reason to move f

Re: [Operators] Openfire 3.6.4 (jabber.iitsp.com) vs. jabber.org

2010-07-05 Thread Dave Cridland
eople and find out why. Thanks man. Nothing has changed on our side at all, same code, md5's exactly with a backup 1yr ago. Very odd it should break suddenly. I can't discuss Isode customers, however I can tell you that I upgraded my server to a more recent build of M-Link and haven

Re: [Operators] Openfire 3.6.4 (jabber.iitsp.com) vs. jabber.org

2010-07-05 Thread Dave Cridland
0:21:02 xmppd24937 (root) D-MBOX-Auth closed originating s2s connection to domain jabber.iitsp.com [63.246.140.215] (*connection closed*) The unknown protocol is quite interesting. I think it's responding with a TLS subversion M-Link doesn't support. I'll chase this u

[Operators] DNS local caching resolvers

2010-01-20 Thread Dave Cridland
means bandwidth cost for connection establishment is much lower. Of course, for most services it's not going to be a massive impact (and for big public deployments, you've probably already done this), but I thought I'd mention it while I remembered. Dave. -- Dave Crid

Re: [Operators] How-to fight with SPAM accounts

2009-11-21 Thread Dave Cridland
but short of managing to issue everyone with a certificate, I don't see how that can work. In my case, for example, since I use a subdomain of my brother's domain, it requires a logistically complicated trust chain in order to validate my domain with StartCom. In

Re: [Operators] DNSBLs

2009-11-15 Thread Dave Cridland
--- Original message --- From: Evgeniy Khramtsov Sent: 15/11/'09, 5:27 Norman Rasmussen wrote: XMPP validates the sending server via tls and/or dns (dial-back), so it removes many of the unauthenticated problems of SMTP. Sure, but the domain is untrusted even if validated. BTW, we don

  1   2   >