-
kurion
dabbled in the code for a bit. and installing `gir1.2-gsound-1.0` and friends solved the problems of sounds not playing from inside gajim.✎ -
kurion
dabbled in the code for a bit. installing `gir1.2-gsound-1.0` and friends solved the problems of sounds not playing from inside gajim. ✏
-
opal
>I'm on debian and pretty vanilla up to now. report that to them then
-
hannibal
gsound is an optional dependency of gajim. That's why gir1.2-gsound-1.0 is only a recommended dependency of gajim in Debian. https://packages.debian.org/bookworm-backports/gajim
-
lovetox
yeah and recommended dependencies get installed automatically
-
lovetox
except you specify specifically not to install them
-
lovetox
at least that was what i heard
-
fjklp
> yeah and recommended dependencies get installed automatically This is configurable. "Recommends are installed by default (since Lucid)." which is ubuntu 10.04 per https://askubuntu.com/questions/18545/installing-suggested-recommended-packages✎ -
fjklp
> yeah and recommended dependencies get installed automatically This is configurable. "Recommends are installed by default (since Lucid)." which is ubuntu 10.04. from https://askubuntu.com/questions/18545/installing-suggested-recommended-packages ✏
-
23
I have been trying Gajim with tor proxy it all appears to work OK for messages but my wife tried to send a photo and it fails with error Hostname xmpp-upload.###### not verified: xmpp-upload is configured correctly and the cert is valid, removing tor proxy and there is no error and xmpp-upload works fine. Not really an issue for me as I was just trying tor but it may be for others.✎ -
23
I have been trying Gajim with tor proxy it all appears to work OK for messages but my wife tried to send a photo to me and it fails with error Hostname xmpp-upload.###### not verified: xmpp-upload is configured correctly and the cert is valid, removing tor proxy and there is no error and xmpp-upload works fine. Not really an issue for me as I was just trying tor but it may be for others. ✏
-
fjklp
I had problems with gajim with torsocks, which I belive was telated to the fact that dns doesn't work with torsocks. Don't know if it's related.✎ -
fjklp
I had problems with gajim with torsocks, which I believe was related to the fact that dns doesn't work with torsocks. Don't know if it's related. ✏
-
lovetox
23, can you poste full error message
-
lovetox
"not verified" never heard of that
-
23
> Hostname xmpp-upload ##### not verified: > certificate: sha256/6gD0q1mu0qC66Nmu6IUgJ3dS7EAjHopHwlRp24G####= > DN: CN=###### > subjectAltNames: [#####]
-
dryan
23: I got the same error with xmpp.is onion only account. But if I try other clearnet account it works. I'm on gajim 1.5 from devuan oldstable backports. Direct transfer never workd over Tor Network.✎ -
dryan
23: I got the same error with xmpp.is onion only account. But if I try other clearnet account over gajim proxy, it works. I'm on gajim 1.5 from devuan oldstable backports. Direct transfer never workd when connected to gajim proxy. ✏
-
lovetox
23: seems not like a gajim error
-
lovetox
At least I never saw it and know no code that prints cert details
-
lovetox
Is this a dialog? Do you see that in the log file?
-
lovetox
What are the log lines before that?
-
23
The error message was on the senders phone using conversations nothing on Gajim at my end.
-
lovetox
ok why are you telling us then?
-
dryan
lovetox: that's funny :)
-
23
Err because the error is caused by gajim using tor proxy
-
umu
ru connecting to an onion domain or clear domain?
-
dryan
Guys, You know everybody is talking about jabber.ru attack that could been prevented if the client had an option like 'Don't trust system CAs'.✎ -
dryan
Guys, You know everybody is talking about jabber.ru attack that could been prevented if the client had an option like 'Don't trust system CAs' from Conversations. ✏
-
dryan
Guys, you know everybody is talking about jabber.ru attack. Attack that could been prevented if the client had an option like 'Don't trust system CAs' from Conversations. ✏
-
dryan
Guys, you know everybody is talking about jabber.ru attack. Attack that could have been prevented if the client had an option like 'Don't trust system CAs' from Conversations. ✏
-
dryan
Guys, you know everybody is talking about jabber.ru attack. Attack that could have been prevented at the client level if the client had an option activated like 'Don't trust system CAs' from Conversations. ✏
-
umu
🤔
-
dryan
Basicly, you are warned about a manual unverified certificate when you connect. Do you know if Gajim has such an option available?
-
umu
it should by default
-
dryan
On Conversations is not the default.
-
umu
wym
-
umu
if the cert is invalid
-
umu
it won't connect
-
dryan
I don't mean Self Sign certificate
-
dryan
I mean a good certificare sign by let's encrypt
-
umu
any kind of invalidation
-
fjklp
you mean distrust all certs until manually verified?
-
dryan
fjklp: yes✎ -
dryan
fjklp: yes, thank you. ✏
-
dryan
> you mean distrust all certs until manually verified? fjklp: yes, thank you. ✏
-
fjklp
neat idea
-
umu
distrust all until manually verified doesn't hint if the cert was valid on x509
-
umu
on conversations which is bad design imo
-
dryan
> you mean distrust all certs until manually verified? Conversation has this option. You have to manualy enable it.✎ -
dryan
> you mean distrust all certs until manually verified? Conversation has this option. You have to manualy enable it. Does gajim has something like that? ✏
-
dryan
> you mean distrust all certs until manually verified? Conversation has this option. You have to manualy enable it. Does gajim has something like that? Would mitigate this attack at the user level. ✏
-
dryan
> you mean distrust all certs until manually verified? Conversation has this option. You have to manualy enable it. Does gajim has something like that? ✏
-
dryan
https://notes.valdikss.org.ru/jabber.ru-mitm/ That was the problem.
-
dryan
If you can distrust all certs until manually verified, you could mitigate this kind of attack.
-
umu
the mitm forgot to setup certificate renewal lol
-
umu
that's funny
-
fjklp
or didn't care to
-
dryan
And the bind channels don't work on tls1.3✎ -
fjklp
or intentionally chose not to
-
dryan
And the binding channels don't work on tls1.3 ✏
-
dryan
> or intentionally chose not to I don't know. He is the admin. The allready could to mitm.✎ -
fjklp
this is one way to disclose that there was a mitm attack without saying it
-
dryan
> or intentionally chose not to I don't know. He is the admin. The allready could do mitm. ✏
-
fjklp
imagine it was lawful intercept but was forced to be performed by the hosting company and they wanted to let it be known
-
umu
hetzner works with German authorities I'm sure they had a good reason to mitm the server tbh
-
dryan
> imagine it was lawful intercept but was forced to be performed by the hosting company and they wanted to let it be known That's what happend most likely.
-
umu
maybe connect to a server that supports Tor? that way u don't have to worry about tls issuss
-
dryan
> hetzner works with German authorities I'm sure they had a good reason to mitm the server tbh If you use OMEMEO, your history is protected with PFS. If you disable server archiving, nobody can get your contacts. Even if someone gets your contacts, the attacker device is automaticly set to untrusted. The only thing he can do is to read your private messages from channels and impersonate you on those channels.
-
umu
gajim having its own certificate transparency log for the xmpp domain would be nice
-
dryan
But if you enable 'Don't trust system CAs' from Conversations, then you should get a warning that the malicious certificate is unknown.✎ -
dryan
But if you enable 'Don't trust system CAs' from Conversations, then you should get a warning that the malicious( verified ) certificate is unknown. ✏
-
dryan
Even better if you have store the fingerprint and expiration date of the certificate of the xmpp server on which you have the account.✎ -
dryan
Even better if you have stored the fingerprint and expiration date of the certificate of the xmpp server on which you have the account. ✏
-
dryan
> maybe connect to a server that supports Tor? that way u don't have to worry about tls issuss Should be onion only. And a tls certificate won't hurt there also.
-
dryan
> gajim having its own certificate transparency log for the xmpp domain would be nice Yea. It would be.
-
dryan
> If you can distrust all certs until manually verified, you could mitigate this kind of attack. lovetox: do you know something about that?
-
lovetox
there is no such option
-
lovetox
also this would mean you get all 3 months a warning that the cert changed
-
lovetox
meaning you will constantly review certificates, until you get tired one day and simply click accept :)
-
lovetox
its much easier to simply use OMEMO, that what end 2 end encryption was invented for
-
umu
real asf
-
umu
when is omemo 2 coming to gajim?
-
dryan
lovetox: If your persona behind the xmpp acout has some presence, would be a problem of impersonating in channels. Big problem.
-
lovetox
i dont see how this is related to tls certs
-
dryan
> meaning you will constantly review certificates, until you get tired one day and simply click accept :) lovetox: I really wish such an option will be added. I won't get tired and click accept, never. > i dont see how this is related to tls certs https://notes.valdikss.org.ru/jabber.ru-mitm/ That was the problem.
-
lovetox
i know the incident, but what you said made no sense, no option in Gajim will prevent that other people can impersonate you
-
umu
ye but also remember the xmpp client doesn't validate s2s certs
-
umu
so it would be the best bet just to manually verify omemo keys
-
dryan
> Guys, you know everybody is talking about jabber.ru attack. Attack that could have been prevented at the client level if the client had an option activated like 'Don't trust system CAs' from Conversations. lovetox: if you have the time and you could read from there.
-
dryan
> i know the incident, but what you said made no sense, no option in Gajim will prevent that other people can impersonate you lovetox: ok if you read
-
dryan
>> i know the incident, but what you said made no sense, no option in Gajim will prevent that other people can impersonate you > lovetox: ok if you read. And you know about the incident✎ -
dryan
>> i know the incident, but what you said made no sense, no option in Gajim will prevent that other people can impersonate you lovetox: ok if you read. And you know about the incident ✏
-
dryan
> i know the incident, but what you said made no sense, no option in Gajim will prevent that other people can impersonate you lovetox: ok if you read. And you know about the incident ✏
-
lovetox
i dont say your feature request is not valid. I just want to tell you that your best way is to use end 2 end ecryption, not hoping for some TLS features to get implemented
-
fjklp
> meaning you will constantly review certificates, until you get tired one day and simply click accept :) > its much easier to simply use OMEMO, that what end 2 end encryption was invented for I don't see this as any argument against. OMEMO without verifying keys is mostly security theater, which is probably most people who use it. So yes, most people will not want to verify TLS certificates manually just as they don't verify OMEMO keys. That really shouldn't prevent the option from existing.
-
lovetox
fjklp, one needs to be verified on regular basis, the other only once.
-
lovetox
the argument is, there is a better solution, no reason to implement a worse one
-
fjklp
many chats will not use e2e encryption and I'd like to be able to trust TLS
-
lovetox
no e2e, no mitm protection, simple as that
-
dryan
lovetox: I know the admin of the server can do mitm anytime. But such option could prevent some really powerfull attacker/attack (like this one ) from doing mitm. I was talking about the problem and solution on other channel. And users ask of Gajim has such an option. Those users, me also, we will be verry happy with such option. An never get tired of it. It's an amazing way for users to verify if the server is under attack and much more.✎ -
dryan
lovetox: I know the admin of the server can do mitm anytime. But such option could prevent some really powerfull attacker/attack (like this one ) from doing this kind of mitm. I was talking about the problem and solution on other channel. And users ask of Gajim has such an option. Those users, me also, we will be verry happy with such option. An never get tired of it. It's an amazing way for users to verify if the server is under attack and much more. ✏
-
dryan
lovetox: I know the admin of the server can do mitm anytime. But such option could prevent some really powerfull attacker/attack (like this one ) from doing this kind of mitm. I was talking about the problem and solution on other channel. And users asked if Gajim has such an option. Those users, me also, we will be verry happy with such option. An never get tired of it. It's an amazing way for users to verify if the server is under attack and much more. ✏
-
lovetox
how do you verify that? So gajim shows you the cert is not the same as last time, whats your next step?
-
dryan
lovetox: I know the admin of the server can do mitm anytime. But such option could prevent some really powerfull attacker/attack (like this one ) from doing this kind of mitm. I was talking about the problem and solution on other channel. And users asked if Gajim has such an option. Those users, including me, we will be very happy with such an option. And never get tired of it. It's an amazing way for users to verify if the server is under attack and much more. ✏
-
23
But if you run your own server are you not the mitm in other words the only advantage with omemo is encryption when on o remote server, over the net message are encrypted by TLS
-
dryan
> how do you verify that? So gajim shows you the cert is not the same as last time, whats your next step? It's from other issuer? Going on the website to verify the new fingerprint if it is posted. Asking the admin of the server via pgp mail. Most likely.✎ -
dryan
> how do you verify that? So gajim shows you the cert is not the same as last time, whats your next step? It's from other issuer ( like this one)? Going on the website to verify the new fingerprint if it is posted. Asking the admin of the server via pgp mail. Most likely. ✏
-
dryan
> how do you verify that? So gajim shows you the cert is not the same as last time, whats your next step? It's from other issuer ( like this one)? It's renew sonner then expected? Going on the website to verify the new fingerprint if it is posted. Asking the admin of the server via pgp mail. Most likely. ✏
-
dryan
> how do you verify that? So gajim shows you the cert is not the same as last time, whats your next step? lovetox: It's from other issuer ( like this one)? It's renew sonner then expected? Going on the website to verify the new fingerprint if it is posted. Asking the admin of the server via pgp mail. Most likely. ✏
-
dryan
> how do you verify that? So gajim shows you the cert is not the same as last time, whats your next step? lovetox: It's from other issuer ( like this one)? It's renewed sonner then expected? Going on the website to verify the new fingerprint if it is posted. Asking the admin of the server via pgp mail. Most likely. ✏
-
fjklp
the best case I imagine is that the server admin mass-omemo messages the users, maybe only those subscribed to receive this message, with a notice of the fingerprint of the new cert. This might require a special script to send this before the new cert is issued, so that the message can be sent. Then cert is updated. Gajim detects cert change, if manual verify is enabled then show dialog requiring pressing 'Approved' button, then gajim accepts cert and connects.
-
dryan
> how do you verify that? So gajim shows you the cert is not the same as last time, whats your next step? lovetox: It's from other issuer ( like this one)? It's renewed sonner then expected? Going on the website to verify the new fingerprint if it is posted. Asking the admin of the server via pgp mail. Most likely. ✏
-
lovetox
to the website? connecting via https? of course with system ca enabled, otherwise you could not really browse the web anymore, webserver is of course in 99% in the same datacenter, probably on the same machine
-
lovetox
and yeah of course you dont connect to the server anymore, until the admin answered your PGP email
-
lovetox
and the Admin really likes to answer 100 PGP emails every 3 months when he renews the cert
-
dryan
I wanted to add. Most likely I make another quick account.
-
dryan
When an attack happens it is probably sonner then expected.
-
lovetox
what you describe are steps that you can do once in 2 years
-
lovetox
you will not go through that every ~3 months
-
lovetox
you have no clue where to get the fingerprint, other than writing an email
-
lovetox
sorry that sounds like a very bad process
-
dryan
Probably I would still connect
-
dryan
And ask the admin
-
dryan
And change the password afterwords in case of something
-
dryan
I would do that every 30 days even.
-
lovetox
yeah ok, i will count the people that come here and want to do that
-
dryan
But if the certificate is renew sonner then expected, or from other issuer, then thats the moment when Im worried
-
lovetox
if we reach 10, i add a issue on the tracker for the feature
-
dryan
I'm one.
-
dryan
fjklp 2
-
lovetox
? fjklp did not say he would use that
-
fjklp
I might
-
fjklp
admittedly, I need to think about how much this solves and how much attack surface is left open
-
fjklp
like I said, the admin mass-messaging new cert fingerprint with omemo for people who want it seems fairly graceful
-
lovetox
dryan, do you use conversations?
-
dryan
lovetox: right now, yes
-
lovetox
so, problem solved or? once device that notifies you is probably enough
-
dryan
But I use gajim most of the time
-
dryan
And on accounts that I do sensitive stuff, I only use Gajim
-
bot
Philipp Hörist pushed 1 commit to branch _refs/heads/master_ of _gajim_ < https://dev.gajim.org/gajim/gajim >: *85dfba63* < https://dev.gajim.org/gajim/gajim/-/commit/85dfba6322f8dcca6c45919daa39cfdb14f7f923 > feat: Display composing participants in MUC chat banner
-
dryan
> Look at this attack with jabber.ru. the certificate was malicious but verified like was not. With the option C2 has, you can see that the cert it is renewd sonner then expected. Or verified by a different issuer. So, I think it helps. > Then you come in a public room and ask the admin. The question and the response will remain available for everyone to see. > NOT ME - Open an issue I guess, but better for channel binding support > Menel: I mean for sure chanel binding is the way to go. The dev said he will open one himself if 10 users come and ask for it. Otherwise will not be implemexnted. > Would you help guys? Just come and say. I want the future. > NOT ME: I think the dev maybe has enough on the plate. Conversations is online nearly 24/7 and has regular reconnects because of switching networks. That's a much better watchdog then gajim, isn't it? > Yea. You are right. I'm deeply greateful for people that volunteer to work so much. And I respect then and their time. lovetox fjklp 23 umu
-
lovetox
before you ralley now people and send them here, open the issue on the tracker