TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The State of TLS on XMPP

73 pointsby xnyhpsover 11 years ago

8 comments

devxover 11 years ago
Is HTTP 2.0 finalized and approved? If not could we push for it to support PFS by default with ECDHE, which seems to add only 15 percent overhead [1]? That seems like a small price to pay if the security of every session grows exponentially, with each one being encrypted with a new key.<p>HTTP 2.0&#x2F;SPDY already makes TLS mandatory, no? So why not make PFS mandatory, too? I&#x27;d rather we do it now than wait for HTTP 3.0, and it might force a lot more companies to adopt it by default as they move to HTTP 2.0 (companies such as Microsoft [2]).<p>EDIT: Links<p>[1] - <a href="http://vincent.bernat.im/en/blog/2011-ssl-perfect-forward-secrecy.html" rel="nofollow">http:&#x2F;&#x2F;vincent.bernat.im&#x2F;en&#x2F;blog&#x2F;2011-ssl-perfect-forward-se...</a><p>[2] - <a href="http://news.netcraft.com/archives/2013/06/25/ssl-intercepted-today-decrypted-tomorrow.html" rel="nofollow">http:&#x2F;&#x2F;news.netcraft.com&#x2F;archives&#x2F;2013&#x2F;06&#x2F;25&#x2F;ssl-intercepted...</a>
评论 #6345499 未加载
评论 #6345957 未加载
aprescottover 11 years ago
<i>&gt; Note that ECDH and DH are different authentication mechanisms: these require special certificates and offer no forward-secrecy.</i><p>I contacted the author about this, but I don&#x27;t think this is correct.<p>The OpenSSL ciphers documentation[1] says &quot;DH&quot; is simply all suites using Diffie–Hellman, not necessarily <i>authenticated</i> DH, which is &quot;aDH&quot;. I actually couldn&#x27;t check if it does include aDH since `openssl ciphers -v &#x27;aDH&#x27;` tells me I don&#x27;t have any aDH ciphers!<p>Unfortunately there&#x27;s no documentation to explain the difference between EDH (ephemeral DH?) and DHE. Are they synonyms? I&#x27;m assuming DHE is ephemeral since using a string with DHE Will get you Perfect Forward Secrecy &quot;points&quot; on an SSL Labs test[2]. (Run the test! Secure your web servers! You can get at least a B rating easily enough.)<p>[1]: <a href="http://www.openssl.org/docs/apps/ciphers.html" rel="nofollow">http:&#x2F;&#x2F;www.openssl.org&#x2F;docs&#x2F;apps&#x2F;ciphers.html</a><p>[2]: <a href="https://www.ssllabs.com/ssltest/index.html" rel="nofollow">https:&#x2F;&#x2F;www.ssllabs.com&#x2F;ssltest&#x2F;index.html</a>
评论 #6347833 未加载
评论 #6345828 未加载
spurguover 11 years ago
Part 1 &amp; 2 of the series:<p><a href="https://blog.thijsalkema.de/blog/2013/08/26/the-state-of-tls-on-xmpp-1/" rel="nofollow">https:&#x2F;&#x2F;blog.thijsalkema.de&#x2F;blog&#x2F;2013&#x2F;08&#x2F;26&#x2F;the-state-of-tls...</a><p><a href="https://blog.thijsalkema.de/blog/2013/08/28/the-state-of-tls-on-xmpp-2/" rel="nofollow">https:&#x2F;&#x2F;blog.thijsalkema.de&#x2F;blog&#x2F;2013&#x2F;08&#x2F;28&#x2F;the-state-of-tls...</a>
mike-cardwellover 11 years ago
Handy tip: If you want to use ssllabs.com server test against a non-HTTP based SSL service on your host which runs on a different port, you can temporarily add this rule to iptables so that any connetions from SSL labs on port 443 get redirected to it:<p>iptables -t nat -I PREROUTING -s 173.203.79.216 -p tcp --dport 443 -j REDIRECT --to-port 5223<p>In this particular case, I turned on legacy SSL in my XMPP servers (Prosody) configuration so that an SSL on connect service existed on port 5223.<p>Of course, in the results that SSLlabs displays, you&#x27;ll get some strange information as it&#x27;s expecting HTTP, but the majority of the information is useful.
nsmarttover 11 years ago
Somewhat off-topic: What are some alternatives to XMPP? I haven&#x27;t found much about messaging protocols.
评论 #6345327 未加载
评论 #6345338 未加载
评论 #6345952 未加载
JshWrightover 11 years ago
What&#x27;s the author&#x27;s concern about AES128?<p><pre><code> &quot;The best cipher offered is 128-bit AES. So far, this has been the only client that doesn’t support 256-bit encryption that I’ve seen.&quot; &quot;Surprisingly AES128 takes priority over AES256 here.&quot; &quot;Surprisingly AES128 is first, followed by 3DES and only then AES256.&quot; &quot;128 bit AES&#x2F;Camellia is preferred over those with 256 bit, but at least RC4 is at the very bottom here.&quot; </code></pre> Etc...<p>In my opinion, preferring AES128 over AES256 is a feature. AES128 is more than sufficient in terms of cryptopgraphic strength, it&#x27;s faster, and it isn&#x27;t susceptible to the key schedule weakness that the higher key sizes have.
评论 #6346686 未加载
frank_boydover 11 years ago
If you&#x27;re looking for encrypted OTR&#x2F;decentralized&#x2F;p2p messaging, also take a look at <a href="http://retroshare.sourceforge.net/" rel="nofollow">http:&#x2F;&#x2F;retroshare.sourceforge.net&#x2F;</a>
评论 #6345181 未加载
devxover 11 years ago
What about Moxie&#x27;s TextSecure? I think it&#x27;s going to be integrated into CyanogenMod ROM&#x27;s soon, so I&#x27;d like to see an evaluation of that, too. An evaluation of Surespot would be nice, too, even though it&#x27;s not using PFS.
评论 #6346175 未加载