• ProdigalFrog@slrpnk.net
    link
    fedilink
    English
    arrow-up
    37
    ·
    edit-2
    2 days ago

    Slrpnk hosts an XMPP/Jabber for our users, mods and admins to communicate. Its worked pretty darn well for the past couple years, with very low resource needs.

    The clients are pretty slick now too, such as Cheogram or Monocles for mobile, and movim is an excellent web app with support for group calls.

    I’d certainly recommend it over Matrix/element.

    • Ulrich@feddit.org
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 day ago

      The clients are pretty slick now too, such as Cheogram or Monocles

      I wouldn’t call either of those, or any other XMPP clients “slick” and it’s my biggest complaint about the protocol.

    • muppeth@scribe.disroot.org
      link
      fedilink
      English
      arrow-up
      3
      ·
      2 days ago

      Not to mention you can run a server on anything pretty much and for surprisingly big amount of users. Toaster or potatoes will do just fine.

      • moonpiedumplings@programming.dev
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 hours ago

        https://www.devever.net/~hl/xmpp-incident

        This article discusses some mitigations.

        You an also use a platform like simplex or the tor routing ones, but they aren’t going to offer the features of XMPP. It’s better to just not worry about it. This kind of attack is so difficult to defend against that it should be out of the threat model of the vast majority of users.

      • poVoq@slrpnk.net
        link
        fedilink
        English
        arrow-up
        16
        arrow-down
        2
        ·
        2 days ago

        Significant improvements to certificate pinning and validation have been added to all major XMPP clients as a result of this incident, but it should also be clear that hosting a server on infrastructure under control by an antagonist government (see also Signal) is a very bad idea and hard to mitigate against.

        • moonpiedumplings@programming.dev
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          2 hours ago

          So Signal does not have reproducible builds, which are very concerning securitywise. I talk about it in this comment: https://programming.dev/post/33557941/18030327 . The TLDR is that no reproducible builds = impossible to detect if you are getting an unmodified version of the client.

          Centralized servers compound these security issues and make it worse. If the client is vulnerable to some form of replacement attack, then they could use a much more subtle, difficult to detect backdoor, like a weaker crypto implementation, which leaks meta/userdata.

          With decentralized/federated services, if a client is using other servers other than the “main” one, you either have to compromise both the client and the server, or compromise the client in a very obvious way that causes the client to send extra data to server’s it shouldn’t be sending data too.

          A big part of the problem comes with what Github calls “bugdoors”. These are “accidental” bugs that are backdoors. With a centralized service, it becomes much easier to introduce “bugdoors” because all the data routes through one service, which could then silently take advantage of this bug on their own servers.

          This is my concern with Signal being centralized. But mostly I’d say don’t worry about it, threat model and all that.

          I’m just gonna @ everybody who was in the conversation. I posted this top level for visibility.

          @Ulrich@feddit.org @rottingleaf@lemmy.world @jet@hackertalks.com @eleitl@lemmy.world @Damage@feddit.it

          EDIT: elsewhere in the thread it is talked about what is probably a nation state wiretapping attempt on an XMPP service: https://www.devever.net/~hl/xmpp-incident

          For a similar threat model, signal is simply not adequate for reasons I mentioned above, and that’s probably what poqVoq was referring to when he mentioned how it was discussed here.

          The only timestamps shared are when they signed up and when they last connected. This is well established by court documents that Signal themselves share publicly.

          This of course, assumes I trust the courts. But if I am seeking maximum privacy/security, I should not have to do that.

          • poVoq@slrpnk.net
            link
            fedilink
            English
            arrow-up
            3
            ·
            1 day ago

            Their server infrastructure is (run by Pentagon and NSA best buddies AWS).

              • poVoq@slrpnk.net
                link
                fedilink
                English
                arrow-up
                3
                arrow-down
                1
                ·
                edit-2
                1 day ago

                The infrastructure is under control of an antagonistic government, yes. Hetzner is also technically a private company, but they obviously willingly complied with requests from the German government.

                • Ulrich@feddit.org
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  1 day ago

                  And what are the implications of that control? It doesn’t mean they can access anything on it. Especially not data that doesn’t exist.

                  • poVoq@slrpnk.net
                    link
                    fedilink
                    English
                    arrow-up
                    2
                    arrow-down
                    1
                    ·
                    1 day ago

                    They have live access to all of the metadata and can easily correlate that with phone numbers that Signal stores and shares on request of governments. Just because Signal claims they don’t store anything doesn’t mean that the ones that 100% run all the servers Signal uses don’t access and store anything. You are being extremely naive if you believe Signals BS marketing.

        • rottingleaf@lemmy.world
          link
          fedilink
          English
          arrow-up
          7
          arrow-down
          1
          ·
          2 days ago

          Signal doesn’t suffer anything worse than DoS if a hostile party controls the central service. That’s its point and role. It’s based on the assumption that such hostile parties as governments don’t like DoS’ing central services, they prefer to be invisible.

          For other points and roles other solutions exist. One can’t make an application covering them all, that never happens.

          Briar again (I’ve finally read on it and installed it, and I love how it works and also the authors’ plans on the future possibilities based on the same protocols, but not for IM, say, there’s an article discussing possibility of RPC over those, which, for example, can give us something like the Web ; I mean, those plans are ambitious and if I want them to succeed so much, I should look for ways to defeat my executive dysfunction and distractions and learn Java). Except it would be cool if it allowed to toss data over untrusted parties, say, now if two Briar users in the same group are not in each other’s range, but there’s a third Briar user not in that group between them, their group won’t synchronize (provided they don’t have Internet connectivity). If one could allow allocating some space for such piggybacked data, or create some mesh routing functionality, then it would become a bit cooler.

          • poVoq@slrpnk.net
            link
            fedilink
            English
            arrow-up
            3
            arrow-down
            5
            ·
            2 days ago

            You are very naive if you think that is all the US government can do in regards to Signal, but suit yourself 🤷

              • poVoq@slrpnk.net
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                15
                ·
                2 days ago

                A lot, but please educate yourself, this topic has been extensively discussed here and in other places.

                • rottingleaf@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  14
                  ·
                  2 days ago

                  A lot, but please educate yourself,

                  Thanks for the advice.

                  this topic has been extensively discussed here and in other places.

                  This is noise, not an argument.

                  I dunno what’s the purpose of this comment. I asked for specific things, not for noise.

                  • jet@hackertalks.com
                    link
                    fedilink
                    English
                    arrow-up
                    2
                    ·
                    edit-2
                    2 days ago

                    Whenever anybody on the internet tells you to educate yourself, but refuses to provide the information they allude to, they’re lying. They know they’re lying.

                    Signal has issues, like SVR… which are worth discussing on their own without this weird vague eliteism

        • eleitl@lemmy.zip
          link
          fedilink
          English
          arrow-up
          5
          ·
          2 days ago

          End to end encryption between clients (also for groups) seems to partly address the issue of a bad server. As for self-hosting, any rented or cloud sevices are very vulnerable to an evil maid. So either in-house hosting or locked cages with tamper-proof hardware remain an option.

      • ProdigalFrog@slrpnk.net
        link
        fedilink
        English
        arrow-up
        6
        ·
        edit-2
        2 days ago

        I’m afraid that’s quite outside my field of expertise. I can only report how my experience on XMPP has been as a user, though perhaps @poVoq@slrpnk.net, who hosts it, may be able to weigh in on that. Edit: ah, I see you already have 😄

        Though from my untrained eye, it seems that Jabber.ru was compromised due to not enabling a particular feature on their server

        “Channel binding” is a feature in XMPP which can detect a MiTM even if the interceptor present a valid certificate. Both the client and the server must support SCRAM PLUS authentication mechanisms for this to work. Unfortunately this was not active on jabber.ru at the time of the attack.

        And it seems that hosting it externally on paid hosting service (hetzner and linode) left them particularly vulnerable to this attack, and tgat it could’ve been mitigated by self hosting the XMPP locally, as well as activating that feature.