Re: [Operators] IM Observatory @ xmpp.net

2013-11-03 Thread Phil Pennock
On 2013-11-03 at 18:01 -0800, Peter Kieser wrote: > Shouldn't the SSL certificate CN match the hostname listed in the "IN > SRV" record, since that's the hostname a S2S connection will open to. Not unless the peer server's operator is publishing DNSSEC records for the domain and the connection in

Re: [Operators] IM Observatory @ xmpp.net

2013-11-03 Thread Peter Kieser
On 2013-10-29 4:20 PM, Peter Saint-Andre wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 In case you missed it during all the TLS discussion, we've repurposed xmpp.net to function as an "IM Observatory". This makes it easy to figure out whether your service offers a high level of security.

Re: [Operators] IM Observatory @ xmpp.net

2013-11-03 Thread Phil Pennock
On 2013-11-03 at 11:49 +0100, Thijs Alkemade wrote: > Also, if you assume clients always pick the strongest encryption cipher they > support, then I have a surprise for you: > > https://blog.thijsalkema.de/blog/2013/09/02/the-state-of-tls-on-xmpp-3/ Then that's a client bug, from the traitorous s

Re: [Operators] IM Observatory @ xmpp.net

2013-11-03 Thread Thijs Alkemade
On 3 nov. 2013, at 07:27, Phil Pennock wrote: > So as long as SSLv2 is not allowed and the server private key is long > enough to have a reasonable expected lifetime (avoiding compromise and > more problems than just the attacker's ability to sign a downgrade > attack), surely a server operator

Re: [Operators] IM Observatory @ xmpp.net

2013-11-03 Thread Ludovic BOCQUET
Little note, Microsoft Windows XP and Windows Server 2003 support TLS 1.0 with ciphers: * TLS_RSA_WITH_RC4_128_MD5 * TLS_RSA_WITH_RC4_128_SHA * TLS_RSA_WITH_3DES_EDE_CBC_SHA * TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA * TLS_RSA_WITH_DES_CBC_SHA * TLS_DHE_DSS_WITH_DES_CBC_SHA * TLS_RSA_EXPORT

Re: [Operators] IM Observatory @ xmpp.net

2013-11-02 Thread Phil Pennock
On 2013-11-01 at 14:01 +0100, Thijs Alkemade wrote: > 1) Enable cipher with less than 128 bit keys (DES, EXPORT-*, not 3DES, >which is assumed 168). > 3) Enable SSLv2. > We can debate about 4) for a long time, but 1), 2) and 3) have been bad > practices for at least a decade, some even longer

Re: [Operators] IM Observatory @ xmpp.net

2013-11-01 Thread Philipp Hancke
4) Use an untrusted or invalid certificate. We can debate about 4) for a long time We can debate about "untrusted", but we don't need to do that for "invalid".

Re: [Operators] IM Observatory @ xmpp.net

2013-11-01 Thread Thijs Alkemade
On 1 nov. 2013, at 13:33, Moonchild wrote: > In addition, only including score grade "A" is a little short-sighted, IMHO, > as server operators may be very good admins running a secure server while > not getting a grade A (for example by offering potentially weaker ciphers > for extended compati

Re: [Operators] IM Observatory @ xmpp.net

2013-11-01 Thread Tobias Markmann
Hi, Moonchild wrote: Although there's some merit to Aryo's suggestions, there's a problem with it: Most people should primarily be looking for an XMPP server that is in their region of the world, not necessarily one that "scores highest". Sorting by country/region is therefore preferred. The sho

Re: [Operators] IM Observatory @ xmpp.net

2013-11-01 Thread Moonchild
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Folks, Although there's some merit to Aryo's suggestions, there's a problem with it: Most people should primarily be looking for an XMPP server that is in their region of the world, not necessarily one that "scores highest". Sorting by country/regi

Re: [Operators] IM Observatory @ xmpp.net

2013-11-01 Thread Aryo Sandiyudo
A with the "See more" link if a visitor decides to see the full list. I hope my suggestions above is quite understandable and reasonable. Regards, Aryo S. http://mayplaces.com Original Message From: Peter Saint-Andre To: "XMPP Operators Group" Sent: Wed, Oct 30,

Re: [Operators] IM Observatory @ xmpp.net

2013-10-30 Thread Peter Saint-Andre
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 10/30/2013 03:50 PM, Phil Pennock wrote: > On 2013-10-30 at 10:22 +0100, Thijs Alkemade wrote: >> In my opinion, “trusted” should not mean “can xmpp.net make a >> connection it trusts” but rather “can (most) end users make a >> connection without ce

Re: [Operators] IM Observatory @ xmpp.net

2013-10-30 Thread Phil Pennock
On 2013-10-30 at 10:17 +0100, Tomek Nagisa wrote: > > Looks cool. Is there an intention to support TLSA+DNSSEC > > providing a trust anchor to override the automatic F grade > > for having an untrusted CA cert? > > Change TLSA record from "IN TLSA (2 0 0 ..." to " IN TLSA (3 0 0 "? No, because

Re: [Operators] IM Observatory @ xmpp.net

2013-10-30 Thread Phil Pennock
On 2013-10-30 at 10:22 +0100, Thijs Alkemade wrote: > In my opinion, “trusted” should not mean “can xmpp.net make a connection it > trusts” but rather “can (most) end users make a connection without certificate > warnings”. Currently, I’m not aware of any client supporting DANE. (This also > covers

Re: [Operators] IM Observatory @ xmpp.net

2013-10-30 Thread Thijs Alkemade
On 30 okt. 2013, at 06:55, Phil Pennock wrote: > Signed PGP part > On 2013-10-29 at 17:20 -0600, Peter Saint-Andre wrote: > > In case you missed it during all the TLS discussion, we've repurposed > > xmpp.net to function as an "IM Observatory". This makes it easy to > > figure out whether your

Re: [Operators] IM Observatory @ xmpp.net

2013-10-30 Thread Tomek Nagisa
> Looks cool. Is there an intention to support TLSA+DNSSEC > providing a trust anchor to override the automatic F grade > for having an untrusted CA cert? Change TLSA record from "IN TLSA (2 0 0 ..." to " IN TLSA (3 0 0 "? -- K smime.p7s Description: S/MIME cryptographic signature

Re: [Operators] IM Observatory @ xmpp.net

2013-10-29 Thread Phil Pennock
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 On 2013-10-29 at 17:20 -0600, Peter Saint-Andre wrote: > In case you missed it during all the TLS discussion, we've repurposed > xmpp.net to function as an "IM Observatory". This makes it easy to > figure out whether your service offers a high lev

[Operators] IM Observatory @ xmpp.net

2013-10-29 Thread Peter Saint-Andre
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 In case you missed it during all the TLS discussion, we've repurposed xmpp.net to function as an "IM Observatory". This makes it easy to figure out whether your service offers a high level of security. Just visit https://xmpp.net/ and type your domain