[Standards] Re: LAST CALL: XEP-0440 (SASL Channel-Binding Type Capability)

2024-05-08 Thread Peter Saint-Andre
On 5/8/24 8:12 AM, Sam Whited wrote: maybe we should have a "how to use TLS with XMPP" informational spec of our own at some point? Thijs Alkemade and I wrote RFC 7590 [1] for that purpose, but it was published in 2015 (via the UTA WG) and much has changed since then. Peter [1]

[Standards] Re: LAST CALL: XEP-0440 (SASL Channel-Binding Type Capability)

2024-05-08 Thread Marvin W
Hi, I didn't want to suggest specific wording, but the more I think about it, the more I am against of any RFC style wording in the Security Considerations section of 0440. If it's part of the protocol described in 0440 and RFC style wording makes sense, it should be outside the Security

[Standards] Re: LAST CALL: XEP-0421 (Anonymous unique occupant identifiers for MUCs)

2024-05-08 Thread Marvin W
Sorry, maybe I wasn't explicit enough. I didn't mean to not include it, just that it does not belong into the "Security Considerations" section, but instead belongs into the "Occupant ID generation" section. It's meant to be a core part of the protocol, not just something implementers should

[Standards] Re: LAST CALL: XEP-0440 (SASL Channel-Binding Type Capability)

2024-05-08 Thread Florian Schmaus
On 08/05/2024 16.42, Florian Schmaus wrote: On 08/05/2024 12.41, Marvin W wrote:> To address your concerns I'd suggest the following changes to 0440: - Reduce tls-server-end-point to SHOULD for servers and MAY for clients, specifically mention that this is only for better compatibility. I'd

[Standards] Re: LAST CALL: XEP-0440 (SASL Channel-Binding Type Capability)

2024-05-08 Thread Florian Schmaus
On 08/05/2024 12.41, Marvin W wrote:> To address your concerns I'd suggest the following changes to 0440: - Reduce tls-server-end-point to SHOULD for servers and MAY for clients, specifically mention that this is only for better compatibility. I'd like to note that we previously explicitly

[Standards] Re: LAST CALL: XEP-0440 (SASL Channel-Binding Type Capability)

2024-05-08 Thread Florian Schmaus
Hi Travis, Thanks for your mail. I am sorry that xep440 failed to communicate its goal, as it seems. I will try to improve upon that. You write that tls-server-end-point should not be used and that TLS-intercepting proxies can implement tls-exporter "just fine by simply passing the keying

[Standards] Re: LAST CALL: XEP-0421 (Anonymous unique occupant identifiers for MUCs)

2024-05-08 Thread Sam Whited
I strongly disagree that this does not belong in the security considerations. "anonymous" is not a formally provable security property. You and I may know that that means "don't take a SHA-1 and assume that it will be hard to guess", but as we see over and over and over again many people won't

[Standards] Re: LAST CALL: XEP-0421 (Anonymous unique occupant identifiers for MUCs)

2024-05-08 Thread Marvin W
On Wed, 2024-05-08 at 10:19 -0400, Sam Whited wrote: > I'd like to see the security considerations expanded on this. > > In particular, in the business rules it mentions the fact that if > occupant-id isn't supported it could be spoofed. This should exist in > the security considerations. Fair.

[Standards] Re: LAST CALL: XEP-0421 (Anonymous unique occupant identifiers for MUCs)

2024-05-08 Thread Sam Whited
Indeed, sorry to be unclear, I'm suggesting that we should discuss this in the security considerations section (probably detailing exactly what "The occupant identifier MUST be generated such that it is anonymous" actually means in terms of security properties). In addition, I think we should

[Standards] Re: LAST CALL: XEP-0421 (Anonymous unique occupant identifiers for MUCs)

2024-05-08 Thread Stephen Paul Weber
Also, I suspect the naive way to implement this will be to hash the bare JID. We probably want to mention that this is a bad idea and that these identifiers should be random (or we should explicitly define the security properties that are required if they're derived, which probably includes

[Standards] Re: LAST CALL: XEP-0421 (Anonymous unique occupant identifiers for MUCs)

2024-05-08 Thread Sam Whited
I'd like to see the security considerations expanded on this. In particular, in the business rules it mentions the fact that if occupant-id isn't supported it could be spoofed. This should exist in the security considerations. Also, I suspect the naive way to implement this will be to hash

[Standards] Re: LAST CALL: XEP-0440 (SASL Channel-Binding Type Capability)

2024-05-08 Thread Sam Whited
I'm a bit torn on this one. Mostly I agree with what Travis wrote. I'm slightly concerned that the way this spec makes recommendations (ie. putting exporter and end-point at the same level of "SHOULD" [1]) may lead to a false sense of security (this is already true of most everywhere we write

[Standards] Re: LAST CALL: XEP-0440 (SASL Channel-Binding Type Capability)

2024-05-08 Thread Dave Cridland
On Wed, 8 May 2024 at 02:35, Travis Burtrum wrote: > Hi all, > > On 5/6/24 1:21 PM, Daniel Gultsch wrote: > > 1. Is this specification needed to fill gaps in the XMPP protocol > > stack or to clarify an existing protocol? > > No. And in fact it opens gaps. > > > 2. Does the specification solve

[Standards] Re: LAST CALL: XEP-0440 (SASL Channel-Binding Type Capability)

2024-05-08 Thread Dave Cridland
Can we see if the Kitten IETF list (which tends to cover the use of TLS channel bindings with SASL mechanisms) has any comments on this before advancing it? I appreciate this is a departure from our process, strictly speaking, but it feels like a bit of outreach might benefit this and we could

[Standards] Re: LAST CALL: XEP-0440 (SASL Channel-Binding Type Capability)

2024-05-08 Thread Daniel Gultsch
Hi, I think most of use can agree that TLS1.3 and tls-exporter is where we want to end up at. I will likely modify the 'Require Channel Binding' setting in Conversations to require that specific channel binding instead of just any. However on the path toward that goal and to provide good error

[Standards] Re: LAST CALL: XEP-0440 (SASL Channel-Binding Type Capability)

2024-05-08 Thread Marvin W
Hi Travis, While I agree with most of your assessment in general, there is a few things that need to be corrected: Key pinning using '487 would not have prevented the jabber.ru attack, as it is already known that the attacker was able to intercept and handle http(s) requests themselves, so they

[Standards] LAST CALL: XEP-0421 (Anonymous unique occupant identifiers for MUCs)

2024-05-08 Thread Daniel Gultsch
This message constitutes notice of a Last Call for comments on XEP-0421. Title: Anonymous unique occupant identifiers for MUCs Abstract: This specification defines a method that allows clients to identify a MUC participant across reconnects and renames. It thus prevents impersonification of

[Standards] UPDATED: XEP-0045 (Multi-User Chat)

2024-05-08 Thread Daniel Gultsch
Version 1.34.6 of XEP-0045 (Multi-User Chat) has been released. Abstract: This specification defines an XMPP protocol extension for multi-user text chat, whereby multiple XMPP users can exchange messages in the context of a room or channel, similar to Internet Relay Chat (IRC). In addition to

[Standards] UPDATED: XEP-0030 (Service Discovery)

2024-05-08 Thread Daniel Gultsch
Version 2.5.0 of XEP-0030 (Service Discovery) has been released. Abstract: This specification defines an XMPP protocol extension for discovering information about other XMPP entities. Two kinds of information can be discovered: (1) the identity and capabilities of an entity, including the

[Standards] Re: LAST CALL: XEP-0440 (SASL Channel-Binding Type Capability)

2024-05-08 Thread Travis Burtrum
Turns out tls-unique is *additionally* broken by https://www.mitls.org/pages/attacks/SLOTH found a few months after the release of RFC7627 that tried to fix it: > If your TLS application relies on the tls-unique channel binding to prevent > credential forwarding, you need to redesign your