Gajim - 2023-10-21


  1. kurion

    dabbled in the code for a bit. and installing `gir1.2-gsound-1.0` and friends solved the problems of sounds not playing from inside gajim.

  2. kurion

    dabbled in the code for a bit. installing `gir1.2-gsound-1.0` and friends solved the problems of sounds not playing from inside gajim.

  3. opal

    >I'm on debian and pretty vanilla up to now. report that to them then

  4. hannibal

    gsound is an optional dependency of gajim. That's why gir1.2-gsound-1.0 is only a recommended dependency of gajim in Debian. https://packages.debian.org/bookworm-backports/gajim

  5. lovetox

    yeah and recommended dependencies get installed automatically

  6. lovetox

    except you specify specifically not to install them

  7. lovetox

    at least that was what i heard

  8. fjklp

    > yeah and recommended dependencies get installed automatically This is configurable. "Recommends are installed by default (since Lucid)." which is ubuntu 10.04 per https://askubuntu.com/questions/18545/installing-suggested-recommended-packages

  9. fjklp

    > yeah and recommended dependencies get installed automatically This is configurable. "Recommends are installed by default (since Lucid)." which is ubuntu 10.04. from https://askubuntu.com/questions/18545/installing-suggested-recommended-packages

  10. 23

    I have been trying Gajim with tor proxy it all appears to work OK for messages but my wife tried to send a photo and it fails with error Hostname xmpp-upload.###### not verified: xmpp-upload is configured correctly and the cert is valid, removing tor proxy and there is no error and xmpp-upload works fine. Not really an issue for me as I was just trying tor but it may be for others.

  11. 23

    I have been trying Gajim with tor proxy it all appears to work OK for messages but my wife tried to send a photo to me and it fails with error Hostname xmpp-upload.###### not verified: xmpp-upload is configured correctly and the cert is valid, removing tor proxy and there is no error and xmpp-upload works fine. Not really an issue for me as I was just trying tor but it may be for others.

  12. fjklp

    I had problems with gajim with torsocks, which I belive was telated to the fact that dns doesn't work with torsocks. Don't know if it's related.

  13. fjklp

    I had problems with gajim with torsocks, which I believe was related to the fact that dns doesn't work with torsocks. Don't know if it's related.

  14. lovetox

    23, can you poste full error message

  15. lovetox

    "not verified" never heard of that

  16. 23

    > Hostname xmpp-upload ##### not verified: > certificate: sha256/6gD0q1mu0qC66Nmu6IUgJ3dS7EAjHopHwlRp24G####= > DN: CN=###### > subjectAltNames: [#####]

  17. dryan

    23: I got the same error with xmpp.is onion only account. But if I try other clearnet account it works. I'm on gajim 1.5 from devuan oldstable backports. Direct transfer never workd over Tor Network.

  18. dryan

    23: I got the same error with xmpp.is onion only account. But if I try other clearnet account over gajim proxy, it works. I'm on gajim 1.5 from devuan oldstable backports. Direct transfer never workd when connected to gajim proxy.

  19. lovetox

    23: seems not like a gajim error

  20. lovetox

    At least I never saw it and know no code that prints cert details

  21. lovetox

    Is this a dialog? Do you see that in the log file?

  22. lovetox

    What are the log lines before that?

  23. 23

    The error message was on the senders phone using conversations nothing on Gajim at my end.

  24. lovetox

    ok why are you telling us then?

  25. dryan

    lovetox: that's funny :)

  26. 23

    Err because the error is caused by gajim using tor proxy

  27. umu

    ru connecting to an onion domain or clear domain?

  28. dryan

    Guys, You know everybody is talking about jabber.ru attack that could been prevented if the client had an option like 'Don't trust system CAs'.

  29. dryan

    Guys, You know everybody is talking about jabber.ru attack that could been prevented if the client had an option like 'Don't trust system CAs' from Conversations.

  30. dryan

    Guys, you know everybody is talking about jabber.ru attack. Attack that could been prevented if the client had an option like 'Don't trust system CAs' from Conversations.

  31. dryan

    Guys, you know everybody is talking about jabber.ru attack. Attack that could have been prevented if the client had an option like 'Don't trust system CAs' from Conversations.

  32. dryan

    Guys, you know everybody is talking about jabber.ru attack. Attack that could have been prevented at the client level if the client had an option activated like 'Don't trust system CAs' from Conversations.

  33. umu

    🤔

  34. dryan

    Basicly, you are warned about a manual unverified certificate when you connect. Do you know if Gajim has such an option available?

  35. umu

    it should by default

  36. dryan

    On Conversations is not the default.

  37. umu

    wym

  38. umu

    if the cert is invalid

  39. umu

    it won't connect

  40. dryan

    I don't mean Self Sign certificate

  41. dryan

    I mean a good certificare sign by let's encrypt

  42. umu

    any kind of invalidation

  43. fjklp

    you mean distrust all certs until manually verified?

  44. dryan

    fjklp: yes

  45. dryan

    fjklp: yes, thank you.

  46. dryan

    > you mean distrust all certs until manually verified? fjklp: yes, thank you.

  47. fjklp

    neat idea

  48. umu

    distrust all until manually verified doesn't hint if the cert was valid on x509

  49. umu

    on conversations which is bad design imo

  50. dryan

    > you mean distrust all certs until manually verified? Conversation has this option. You have to manualy enable it.

  51. dryan

    > you mean distrust all certs until manually verified? Conversation has this option. You have to manualy enable it. Does gajim has something like that?

  52. dryan

    > you mean distrust all certs until manually verified? Conversation has this option. You have to manualy enable it. Does gajim has something like that? Would mitigate this attack at the user level.

  53. dryan

    > you mean distrust all certs until manually verified? Conversation has this option. You have to manualy enable it. Does gajim has something like that?

  54. dryan

    https://notes.valdikss.org.ru/jabber.ru-mitm/ That was the problem.

  55. dryan

    If you can distrust all certs until manually verified, you could mitigate this kind of attack.

  56. umu

    the mitm forgot to setup certificate renewal lol

  57. umu

    that's funny

  58. fjklp

    or didn't care to

  59. dryan

    And the bind channels don't work on tls1.3

  60. fjklp

    or intentionally chose not to

  61. dryan

    And the binding channels don't work on tls1.3

  62. dryan

    > or intentionally chose not to I don't know. He is the admin. The allready could to mitm.

  63. fjklp

    this is one way to disclose that there was a mitm attack without saying it

  64. dryan

    > or intentionally chose not to I don't know. He is the admin. The allready could do mitm.

  65. fjklp

    imagine it was lawful intercept but was forced to be performed by the hosting company and they wanted to let it be known

  66. umu

    hetzner works with German authorities I'm sure they had a good reason to mitm the server tbh

  67. dryan

    > imagine it was lawful intercept but was forced to be performed by the hosting company and they wanted to let it be known That's what happend most likely.

  68. umu

    maybe connect to a server that supports Tor? that way u don't have to worry about tls issuss

  69. dryan

    > hetzner works with German authorities I'm sure they had a good reason to mitm the server tbh If you use OMEMEO, your history is protected with PFS. If you disable server archiving, nobody can get your contacts. Even if someone gets your contacts, the attacker device is automaticly set to untrusted. The only thing he can do is to read your private messages from channels and impersonate you on those channels.

  70. umu

    gajim having its own certificate transparency log for the xmpp domain would be nice

  71. dryan

    But if you enable 'Don't trust system CAs' from Conversations, then you should get a warning that the malicious certificate is unknown.

  72. dryan

    But if you enable 'Don't trust system CAs' from Conversations, then you should get a warning that the malicious( verified ) certificate is unknown.

  73. dryan

    Even better if you have store the fingerprint and expiration date of the certificate of the xmpp server on which you have the account.

  74. dryan

    Even better if you have stored the fingerprint and expiration date of the certificate of the xmpp server on which you have the account.

  75. dryan

    > maybe connect to a server that supports Tor? that way u don't have to worry about tls issuss Should be onion only. And a tls certificate won't hurt there also.

  76. dryan

    > gajim having its own certificate transparency log for the xmpp domain would be nice Yea. It would be.

  77. dryan

    > If you can distrust all certs until manually verified, you could mitigate this kind of attack. lovetox: do you know something about that?

  78. lovetox

    there is no such option

  79. lovetox

    also this would mean you get all 3 months a warning that the cert changed

  80. lovetox

    meaning you will constantly review certificates, until you get tired one day and simply click accept :)

  81. lovetox

    its much easier to simply use OMEMO, that what end 2 end encryption was invented for

  82. umu

    real asf

  83. umu

    when is omemo 2 coming to gajim?

  84. dryan

    lovetox: If your persona behind the xmpp acout has some presence, would be a problem of impersonating in channels. Big problem.

  85. lovetox

    i dont see how this is related to tls certs

  86. dryan

    > meaning you will constantly review certificates, until you get tired one day and simply click accept :) lovetox: I really wish such an option will be added. I won't get tired and click accept, never. > i dont see how this is related to tls certs https://notes.valdikss.org.ru/jabber.ru-mitm/ That was the problem.

  87. lovetox

    i know the incident, but what you said made no sense, no option in Gajim will prevent that other people can impersonate you

  88. umu

    ye but also remember the xmpp client doesn't validate s2s certs

  89. umu

    so it would be the best bet just to manually verify omemo keys

  90. dryan

    > Guys, you know everybody is talking about jabber.ru attack. Attack that could have been prevented at the client level if the client had an option activated like 'Don't trust system CAs' from Conversations. lovetox: if you have the time and you could read from there.

  91. dryan

    > i know the incident, but what you said made no sense, no option in Gajim will prevent that other people can impersonate you lovetox: ok if you read

  92. dryan

    >> i know the incident, but what you said made no sense, no option in Gajim will prevent that other people can impersonate you > lovetox: ok if you read. And you know about the incident

  93. dryan

    >> i know the incident, but what you said made no sense, no option in Gajim will prevent that other people can impersonate you lovetox: ok if you read. And you know about the incident

  94. dryan

    > i know the incident, but what you said made no sense, no option in Gajim will prevent that other people can impersonate you lovetox: ok if you read. And you know about the incident

  95. lovetox

    i dont say your feature request is not valid. I just want to tell you that your best way is to use end 2 end ecryption, not hoping for some TLS features to get implemented

  96. fjklp

    > meaning you will constantly review certificates, until you get tired one day and simply click accept :) > its much easier to simply use OMEMO, that what end 2 end encryption was invented for I don't see this as any argument against. OMEMO without verifying keys is mostly security theater, which is probably most people who use it. So yes, most people will not want to verify TLS certificates manually just as they don't verify OMEMO keys. That really shouldn't prevent the option from existing.

  97. lovetox

    fjklp, one needs to be verified on regular basis, the other only once.

  98. lovetox

    the argument is, there is a better solution, no reason to implement a worse one

  99. fjklp

    many chats will not use e2e encryption and I'd like to be able to trust TLS

  100. lovetox

    no e2e, no mitm protection, simple as that

  101. dryan

    lovetox: I know the admin of the server can do mitm anytime. But such option could prevent some really powerfull attacker/attack (like this one ) from doing mitm. I was talking about the problem and solution on other channel. And users ask of Gajim has such an option. Those users, me also, we will be verry happy with such option. An never get tired of it. It's an amazing way for users to verify if the server is under attack and much more.

  102. dryan

    lovetox: I know the admin of the server can do mitm anytime. But such option could prevent some really powerfull attacker/attack (like this one ) from doing this kind of mitm. I was talking about the problem and solution on other channel. And users ask of Gajim has such an option. Those users, me also, we will be verry happy with such option. An never get tired of it. It's an amazing way for users to verify if the server is under attack and much more.

  103. dryan

    lovetox: I know the admin of the server can do mitm anytime. But such option could prevent some really powerfull attacker/attack (like this one ) from doing this kind of mitm. I was talking about the problem and solution on other channel. And users asked if Gajim has such an option. Those users, me also, we will be verry happy with such option. An never get tired of it. It's an amazing way for users to verify if the server is under attack and much more.

  104. lovetox

    how do you verify that? So gajim shows you the cert is not the same as last time, whats your next step?

  105. dryan

    lovetox: I know the admin of the server can do mitm anytime. But such option could prevent some really powerfull attacker/attack (like this one ) from doing this kind of mitm. I was talking about the problem and solution on other channel. And users asked if Gajim has such an option. Those users, including me, we will be very happy with such an option. And never get tired of it. It's an amazing way for users to verify if the server is under attack and much more.

  106. 23

    But if you run your own server are you not the mitm in other words the only advantage with omemo is encryption when on o remote server, over the net message are encrypted by TLS

  107. dryan

    > how do you verify that? So gajim shows you the cert is not the same as last time, whats your next step? It's from other issuer? Going on the website to verify the new fingerprint if it is posted. Asking the admin of the server via pgp mail. Most likely.

  108. dryan

    > how do you verify that? So gajim shows you the cert is not the same as last time, whats your next step? It's from other issuer ( like this one)? Going on the website to verify the new fingerprint if it is posted. Asking the admin of the server via pgp mail. Most likely.

  109. dryan

    > how do you verify that? So gajim shows you the cert is not the same as last time, whats your next step? It's from other issuer ( like this one)? It's renew sonner then expected? Going on the website to verify the new fingerprint if it is posted. Asking the admin of the server via pgp mail. Most likely.

  110. dryan

    > how do you verify that? So gajim shows you the cert is not the same as last time, whats your next step? lovetox: It's from other issuer ( like this one)? It's renew sonner then expected? Going on the website to verify the new fingerprint if it is posted. Asking the admin of the server via pgp mail. Most likely.

  111. dryan

    > how do you verify that? So gajim shows you the cert is not the same as last time, whats your next step? lovetox: It's from other issuer ( like this one)? It's renewed sonner then expected? Going on the website to verify the new fingerprint if it is posted. Asking the admin of the server via pgp mail. Most likely.

  112. fjklp

    the best case I imagine is that the server admin mass-omemo messages the users, maybe only those subscribed to receive this message, with a notice of the fingerprint of the new cert. This might require a special script to send this before the new cert is issued, so that the message can be sent. Then cert is updated. Gajim detects cert change, if manual verify is enabled then show dialog requiring pressing 'Approved' button, then gajim accepts cert and connects.

  113. dryan

    > how do you verify that? So gajim shows you the cert is not the same as last time, whats your next step? lovetox: It's from other issuer ( like this one)? It's renewed sonner then expected? Going on the website to verify the new fingerprint if it is posted. Asking the admin of the server via pgp mail. Most likely.

  114. lovetox

    to the website? connecting via https? of course with system ca enabled, otherwise you could not really browse the web anymore, webserver is of course in 99% in the same datacenter, probably on the same machine

  115. lovetox

    and yeah of course you dont connect to the server anymore, until the admin answered your PGP email

  116. lovetox

    and the Admin really likes to answer 100 PGP emails every 3 months when he renews the cert

  117. dryan

    I wanted to add. Most likely I make another quick account.

  118. dryan

    When an attack happens it is probably sonner then expected.

  119. lovetox

    what you describe are steps that you can do once in 2 years

  120. lovetox

    you will not go through that every ~3 months

  121. lovetox

    you have no clue where to get the fingerprint, other than writing an email

  122. lovetox

    sorry that sounds like a very bad process

  123. dryan

    Probably I would still connect

  124. dryan

    And ask the admin

  125. dryan

    And change the password afterwords in case of something

  126. dryan

    I would do that every 30 days even.

  127. lovetox

    yeah ok, i will count the people that come here and want to do that

  128. dryan

    But if the certificate is renew sonner then expected, or from other issuer, then thats the moment when Im worried

  129. lovetox

    if we reach 10, i add a issue on the tracker for the feature

  130. dryan

    I'm one.

  131. dryan

    fjklp 2

  132. lovetox

    ? fjklp did not say he would use that

  133. fjklp

    I might

  134. fjklp

    admittedly, I need to think about how much this solves and how much attack surface is left open

  135. fjklp

    like I said, the admin mass-messaging new cert fingerprint with omemo for people who want it seems fairly graceful

  136. lovetox

    dryan, do you use conversations?

  137. dryan

    lovetox: right now, yes

  138. lovetox

    so, problem solved or? once device that notifies you is probably enough

  139. dryan

    But I use gajim most of the time

  140. dryan

    And on accounts that I do sensitive stuff, I only use Gajim

  141. bot

    Philipp Hörist pushed 1 commit to branch _refs/heads/master_ of _gajim_ < https://dev.gajim.org/gajim/gajim >: *85dfba63* < https://dev.gajim.org/gajim/gajim/-/commit/85dfba6322f8dcca6c45919daa39cfdb14f7f923 > feat: Display composing participants in MUC chat banner

  142. dryan

    > Look at this attack with jabber.ru. the certificate was malicious but verified like was not. With the option C2 has, you can see that the cert it is renewd sonner then expected. Or verified by a different issuer. So, I think it helps. > Then you come in a public room and ask the admin. The question and the response will remain available for everyone to see. > NOT ME - Open an issue I guess, but better for channel binding support > Menel: I mean for sure chanel binding is the way to go. The dev said he will open one himself if 10 users come and ask for it. Otherwise will not be implemexnted. > Would you help guys? Just come and say. I want the future. > NOT ME: I think the dev maybe has enough on the plate. Conversations is online nearly 24/7 and has regular reconnects because of switching networks. That's a much better watchdog then gajim, isn't it? > Yea. You are right. I'm deeply greateful for people that volunteer to work so much. And I respect then and their time. lovetox fjklp 23 umu

  143. lovetox

    before you ralley now people and send them here, open the issue on the tracker