Re: [Standards] ProtoXEP: SRV records for XMPP over TLS

2015-11-09 Thread Travis Burtrum
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 11/09/2015 06:20 PM, Tomasz Sterna wrote: > Dnia 2015-11-09, pon o godzinie 17:33 -0500, Travis Burtrum pisze: >> That seems like a ridiculous question to me. If not, why even bother >> with STARTTLS/TLS in the first place? It *could* be used for

Re: [Standards] ProtoXEP: SRV records for XMPP over TLS

2015-11-09 Thread Tomasz Sterna
Dnia 2015-11-09, pon o godzinie 17:33 -0500, Travis Burtrum pisze: > That seems like a ridiculous question to me. If not, why even bother > with STARTTLS/TLS in the first place? It *could* be used for > circumventing security policies after all. Your own words from the XEP: "at least equal and p

Re: [Standards] ProtoXEP: SRV records for XMPP over TLS

2015-11-09 Thread Travis Burtrum
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 11/09/2015 05:22 PM, Tomasz Sterna wrote: > Dnia 2015-11-09, pon o godzinie 15:29 -0500, Travis Burtrum pisze: >> accepting raw xmpp along with https on 443 is not a good option >> because it's obviously xmpp and can be trivially blocked > > Sho

Re: [Standards] ProtoXEP: SRV records for XMPP over TLS

2015-11-09 Thread Dave Cridland
On 9 November 2015 at 19:42, James Cloos wrote: > > "DC" == Dave Cridland writes: > > DC> No, that's not true. That's only true if the TLSA records provide a > DC> specific EE cert; that is, Certificate Usage 3. All other cases involve > DC> path validation and name checks. > > Even with typ

Re: [Standards] ProtoXEP: SRV records for XMPP over TLS

2015-11-09 Thread Tomasz Sterna
Dnia 2015-11-09, pon o godzinie 15:29 -0500, Travis Burtrum pisze: > accepting raw xmpp along with https on 443 is not a good option > because it's obviously xmpp and can be trivially blocked Should XSF work on technologies targetted on circumventing security policies? And if so, what about block

Re: [Standards] ProtoXEP: SRV records for XMPP over TLS

2015-11-09 Thread Travis Burtrum
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 11/09/2015 02:46 PM, Tomasz Sterna wrote: > Isn't smart proxy like sslh[1] better suited for the use case? > > > [1] http://www.rutschle.net/tech/sslh.shtml Which use case? I actually do use sslh on my port 443, because I wrote a patch to let

Re: [Standards] ProtoXEP: SRV records for XMPP over TLS

2015-11-09 Thread Tomasz Sterna
Dnia 2015-11-05, czw o godzinie 12:45 -0500, Travis Burtrum pisze: > Rendered version can be found at > https://burtrum.org/xeps/tls-srv.html Isn't smart proxy like sslh[1] better suited for the use case? [1] http://www.rutschle.net/tech/sslh.shtml -- /o__ (_<^' Love sometimes expresses its

Re: [Standards] ProtoXEP: SRV records for XMPP over TLS

2015-11-09 Thread James Cloos
> "DC" == Dave Cridland writes: DC> No, that's not true. That's only true if the TLSA records provide a DC> specific EE cert; that is, Certificate Usage 3. All other cases involve DC> path validation and name checks. Even with types 0, 1 or 2, the point is that the machine name is always use

Re: [Standards] ProtoXEP: SRV records for XMPP over TLS

2015-11-09 Thread Dave Cridland
On 9 November 2015 at 16:16, James Cloos wrote: > > "DC" == Dave Cridland writes: > > >> The service name is only supposed to be relevant iff ( the dns lookups > are > >> not secure OR there is no TLSA ) . > > DC> Where do you get this assertion from? > > DC> I would have thought that the re

Re: [Standards] ProtoXEP: SRV records for XMPP over TLS

2015-11-09 Thread James Cloos
> "DC" == Dave Cridland writes: >> The service name is only supposed to be relevant iff ( the dns lookups are >> not secure OR there is no TLSA ) . DC> Where do you get this assertion from? DC> I would have thought that the reverse is true - the user-supplied DC> identifier is always releva

Re: [Standards] ProtoXEP: SRV records for XMPP over TLS

2015-11-09 Thread Dave Cridland
On 9 November 2015 at 15:51, James Cloos wrote: > The service name is only supposed to be relevant iff ( the dns lookups are > not secure OR there is no TLSA ) . > > Where do you get this assertion from? I would have thought that the reverse is true - the user-supplied identifier is always relev

Re: [Standards] ProtoXEP: SRV records for XMPP over TLS

2015-11-09 Thread James Cloos
> "KA" == Kim Alvefur writes: KA> I was actually working on that the other day. Support for SNI doesn't KA> make it easier if the SNI name does not match any local service names, KA> only SRV targets, which could be anything. The SRV target would be an A or name, that should be a hostn