77
you are viewing a single comment's thread
view the rest of the comments
[-] eleitl@lemmy.zip 0 points 1 week ago

What's the protection in the clients assuming compromised infrastructure, like e.g. in https://notes.valdikss.org.ru/jabber.ru-mitm/ ?

[-] ProdigalFrog@slrpnk.net 1 points 1 week ago* (last edited 1 week ago)

I'm afraid that's quite outside my field of expertise. I can only report how my experience on XMPP has been as a user, though perhaps @poVoq@slrpnk.net, who hosts it, may be able to weigh in on that. Edit: ah, I see you already have ๐Ÿ˜„

Though from my untrained eye, it seems that Jabber.ru was compromised due to not enabling a particular feature on their server

"Channel binding" is a feature in XMPP which can detect a MiTM even if the interceptor present a valid certificate. Both the client and the server must support SCRAM PLUS authentication mechanisms for this to work. Unfortunately this was not active on jabber.ru at the time of the attack.

And it seems that hosting it externally on paid hosting service (hetzner and linode) left them particularly vulnerable to this attack, and tgat it could've been mitigated by self hosting the XMPP locally, as well as activating that feature.

[-] poVoq@slrpnk.net 0 points 1 week ago

Significant improvements to certificate pinning and validation have been added to all major XMPP clients as a result of this incident, but it should also be clear that hosting a server on infrastructure under control by an antagonist government (see also Signal) is a very bad idea and hard to mitigate against.

[-] rottingleaf@lemmy.world 3 points 1 week ago

Signal doesn't suffer anything worse than DoS if a hostile party controls the central service. That's its point and role. It's based on the assumption that such hostile parties as governments don't like DoS'ing central services, they prefer to be invisible.

For other points and roles other solutions exist. One can't make an application covering them all, that never happens.

Briar again (I've finally read on it and installed it, and I love how it works and also the authors' plans on the future possibilities based on the same protocols, but not for IM, say, there's an article discussing possibility of RPC over those, which, for example, can give us something like the Web ; I mean, those plans are ambitious and if I want them to succeed so much, I should look for ways to defeat my executive dysfunction and distractions and learn Java). Except it would be cool if it allowed to toss data over untrusted parties, say, now if two Briar users in the same group are not in each other's range, but there's a third Briar user not in that group between them, their group won't synchronize (provided they don't have Internet connectivity). If one could allow allocating some space for such piggybacked data, or create some mesh routing functionality, then it would become a bit cooler.

[-] poVoq@slrpnk.net -2 points 1 week ago

You are very naive if you think that is all the US government can do in regards to Signal, but suit yourself ๐Ÿคท

[-] RaivoKulli@sopuli.xyz 2 points 1 week ago

Anything that's been proven/confirmed?

[-] rottingleaf@lemmy.world 2 points 1 week ago

OK, so what else in your opinion can it do?

[-] poVoq@slrpnk.net -4 points 1 week ago

A lot, but please educate yourself, this topic has been extensively discussed here and in other places.

[-] rottingleaf@lemmy.world 2 points 1 week ago

A lot, but please educate yourself,

Thanks for the advice.

this topic has been extensively discussed here and in other places.

This is noise, not an argument.

I dunno what's the purpose of this comment. I asked for specific things, not for noise.

[-] jet@hackertalks.com 2 points 1 week ago* (last edited 1 week ago)

Whenever anybody on the internet tells you to educate yourself, but refuses to provide the information they allude to, they're lying. They know they're lying.

Signal has issues, like SVR.. which are worth discussing on their own without this weird vague eliteism

[-] rottingleaf@lemmy.world 2 points 1 week ago

Yes, I know that.

Especially the "this has been discussed before" thing, I dunno about other countries and cultures, but in Russia this is the most common obnoxious shit people without arguments and thinking they have authority use.

[-] jet@hackertalks.com 2 points 1 week ago

Yeah it's like appealing to authority and social pressure all in one. We already discussed it. Bah.

[-] eleitl@lemmy.zip 2 points 1 week ago

End to end encryption between clients (also for groups) seems to partly address the issue of a bad server. As for self-hosting, any rented or cloud sevices are very vulnerable to an evil maid. So either in-house hosting or locked cages with tamper-proof hardware remain an option.

[-] Ulrich@feddit.org 1 points 1 week ago

Signal is under control by the government? ๐Ÿค”

[-] poVoq@slrpnk.net 3 points 1 week ago

Their server infrastructure is (run by Pentagon and NSA best buddies AWS).

[-] Ulrich@feddit.org 1 points 1 week ago

And that means the government controls it?

[-] poVoq@slrpnk.net 1 points 1 week ago* (last edited 1 week ago)

The infrastructure is under control of an antagonistic government, yes. Hetzner is also technically a private company, but they obviously willingly complied with requests from the German government.

[-] Ulrich@feddit.org 1 points 1 week ago

And what are the implications of that control? It doesn't mean they can access anything on it. Especially not data that doesn't exist.

[-] poVoq@slrpnk.net 0 points 1 week ago

They have live access to all of the metadata and can easily correlate that with phone numbers that Signal stores and shares on request of governments. Just because Signal claims they don't store anything doesn't mean that the ones that 100% run all the servers Signal uses don't access and store anything. You are being extremely naive if you believe Signals BS marketing.

[-] Ulrich@feddit.org 1 points 1 week ago

They have live access to all of the metadata and can easily correlate that with phone numbers

I'd love to see the evidence you have for this.

You are being extremely naive if you believe Signals BS marketing.

I don't believe in marketing. I believe in open source code, security audits, and the entirety of the privacy and security community.

[-] poVoq@slrpnk.net 1 points 1 week ago

Look, if you run the server you have access to metadata of clients connecting to it. That is networking 101. And that Signal shares phone numbers and connection timestamps is well established by court documents.

The security audits are of the code and encryption algorithm, not the infrastructure.

this post was submitted on 19 Jul 2025
77 points (96.4% liked)

Technology

73290 readers
1473 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS