2016-09-12 UTC
doesntgolf joined the channel
miklb, cweiske and AngeloGladding joined the channel
# 07:23 Zegnat Not getting the same results yet, but this is a good start. I probably need to resolve redirects.
cmal joined the channel
loicm_ and cmal joined the channel
rMdes joined the channel
# 12:17 Zegnat I do wonder if any endpoints will except file:// uris
# 12:17 sknebel there are a few other good points in the discussion as well
# 12:17 sknebel afaik the webmention spec explictly calls out limiting protocols
# 12:17 sknebel that reminds me, I wanted to write a gzip-bomb-tester for WM endpoints a while back
# 12:24 Zegnat Or I guess I should add an extra request for all the URLs to see if they redirect somewhere.
# 12:25 Zegnat petermolnar: when a small archive decompresses into multiple gigabytes of data, is a gzip/zip/tar/archive bomb
# 12:29 sknebel petermolnar: same idea, yes. Most webmention endpoints probably limit the size of pages they download, but if you measure that "on the wire" and support HTTP with gzip, the page can use a lot of memory very easily
# 12:31 Zegnat I just use curl to grab the HTML. Does curl have some sort of internal limit that protects me or do I have to write that one myself?
# 12:32 petermolnar combine that with a reflection attack... neat. by the way, I have security question: vouch does not seem to be able to prevent a reflection attack at all, since you'll need to crawl B ( potentially even C - from the https://indieweb.org/Vouch example )
# 12:33 sknebel possibly even needs attention with redirects to other protocols
# 12:34 cmal petermolnar: there's a few interesting possibilities
# 12:35 cmal someone a few weeks ago mentioned signing the webmention payload with PGP and matching the key to a cached version of the source's key
# 12:35 cmal then for vouching there's the obvious case of matching people against contacts/subscribers/groups
# 12:35 Zegnat I looked around a bit. Seems my curl'ing of the webmention will just try to download the resource no matter the size.
# 12:36 petermolnar PGP is a pain in the ass and it will open a computing overload vector
# 12:36 cmal if you accept the idea that a simple link on a page is a proper vouch, Google/Twitter is going to find a very easy way into your webmentions ;-)
# 12:37 cmal petermolnar: depends how you do it, you could limit the size of the payload and use only JSON for signed paylods, for instance
# 12:38 cmal from a security standpoint the status quo of vouching and relMeAuth is disastrous
# 12:38 cmal do you have links to resources discussing these issues or should we just open a pad and reference ideas for better protocols?
# 12:39 cmal (I've already crawled the wiki about it but I've so far been very disappointed in this specific regard)
# 12:42 GWG petermolnar: So, what is your Vouch alternative? Not that I've seen a lot of Vouch integration on the part of sites.
# 12:43 cmal yeah there's talks here and there about DDOS/auth/encryption but I don't see any proposals taking all these aspects into consideration :-/
# 12:45 cmal how could one do proper vouching without followers/following lists? I personally don't see any way that's feasible but if you've got ideas… :D
# 12:45 petermolnar originally I was thinking of adding dmarc-dkim-spf into webmention
# 12:45 GWG The idea is only that Vouch moves the burden of proof to the sender.
# 12:46 cmal GWG: yeah but in its current form it considers if you have a link to a website somewhere on your website (including, like petermolnar pointed, somewhere in an unmoderated comment), you are vouching for this website
# 12:50 cmal maybe matching against webmention endpoint domain name would be more adpated?
# 12:52 cmal well precisely: if you have webmention.io as a webmention endpoint, then someone receiving a webmention of yours would match the source IP address against A/AAAA records of webmention.io
# 12:54 sknebel and even for the receiver you'd have to fetch the site to figure out if it actually uses it
# 12:54 cmal okay you're right, my bad… but maybe this is an info we could add as a link on the homepage?
# 12:54 cmal sknebel: yeah but you would only fetch it once every now and then so it would mitigate an attempt at DDOS
# 12:56 petermolnar what's important is to list all the options which could prevent fetching falsely sourced site
# 12:56 petermolnar because that is how you destroy both your and the source site's capacity
# 12:57 petermolnar we could say the webmention endpoint must go into the http response header
# 12:57 sknebel e.g. people with static sites are going to send their webmentions from all kinds of IPs with all kinds of hostnames... local laptops, CI servers, ...
# 12:58 petermolnar sknebel an SPF record can contain a list of accepted IPs or CNAMEs
# 12:59 petermolnar but the trouble with that is that is requires messing with the DNS
# 13:00 cmal petermolnar: for shared hosting it can be a problem yeah :-/
# 13:01 GWG No solution is foolproof. I think the idea is to reduce manual intervention, not totally eliminate it.
# 13:01 petermolnar well, if there is an SPF record on the domain for webmention, we could check it
# 13:02 cmal petermolnar: how about different layers? like if there's nothing in DNS, do a HEAD, if there's nothing there, do a GET
# 13:02 cmal this way would allow different types of setup depending on how shared/static your hosting is
# 13:03 GWG Think of trust like a point system. You try to identify people you trust more than others using software. And you try to identify people with a low trust quotient.
# 13:03 petermolnar on the receiver end, HEAD is to "ping" the source & target synchronously to determine if it's even valid; the GET will be async
# 13:04 petermolnar on the sender end, to determine the webmention endpoint; HEAD first, GET later
# 13:05 sknebel for the source I'm not sure if a HEAD is worth it. For many dynamic sites the load is probably going to be quite similar, and now you are sending 2 requests instead of one
# 13:05 petermolnar but for the receiver I could do a lookup DNS SPF for sender domain, if exists, match it to the actual sender server and die if it's not valid
# 13:05 sknebel the only thing you learn from a HEAD is if the page exists or not
# 13:06 sknebel but an attacker isn't going to send you to a non-existing page
# 13:06 sknebel and if you can't deliver a full 404-page quickly something is really odd
# 13:08 GWG So, would you all agree that in this case, security is a series of compromises and will never be perfect?
# 13:08 sknebel I think many dynamic frameworks generate the full content for a HEAD anyways, just to be able to tell you the Content-Length
# 13:10 GWG I'm just mentioning the fact in regard to Vouch.
# 13:11 GWG Yes. But there are some other good options that don't require both sides to participate.
KevinMarks joined the channel
# 13:46 KevinMarks Zegnat: I think I have redirects in place so that www.kevinmarks.com and kevinmarks.com are the same.
# 13:46 GWG petermolnar, could I prevail upon you?
# 13:48 GWG I am working on a new Webmentions and Pingbacks project. I was looking for someone to have a look when I am finished. Would you be able to?
# 13:51 GWG petermolnar, still missing stuff. So bit ready yet
# 13:56 GWG Just I want to try to use this as a way to get feature support for webmentions.
loicm_ and tantek joined the channel
singpolyma joined the channel
# 14:52 ben_thatmustbeme petermolnar: i would think the code should be pretty easy to port over at least, its nothing too complex
plindner and cweiske joined the channel
# 15:15 Zegnat KevinMarks: yes, you have the replies in place. But the extension does not yet resolve back-links. It just checks all the HREF values it finds as strings.
tantek joined the channel
# 16:30 petermolnar it seems like the date format for 'published' for a h-entry is not as strict as I was expecting
# 16:31 petermolnar !tell cweiske commentpara.de does not have any published date for it's comments, it that intentional?
# 16:31 Loqi Ok, I'll tell them that when I see them next
# 16:33 petermolnar I guess it's like adding ð“¹ð“®ð“½ð“®ð“»ð“¶ð“¸ð“µð“·ð“ªð“» as nick ot my h-card
# 16:47 sknebel yeah, ok. if you want a timezone you have to explictly make the timestamp timezone-aware
# 16:53 petermolnar and only differs as ' ' instead of 'T' between date and time compared to the ISO
# 16:53 bear yea, the battel for date time formatting was lost a long time ago
# 16:58 bear in python to do it properly and flexibly you have to combine a few libs and add error handling - python-dateutil and pytz and more - I would have to go find some old code of mine to recreate it
tantek joined the channel
# 17:01 sknebel yep, im using pytz and a iso8601 parsing library as well, and I don't parse external dates yet
# 17:02 sknebel I think for "here is a string, guess what it is" I'd need another library
# 17:08 voxpelli In node you install moment and moment-timezone and then everything is fine
KevinMarks joined the channel
# 17:09 voxpelli One hard thing is to correctly identify the timezone of timezone less dates
# 17:10 voxpelli I think I used the timezone of the document in my WebMention endpoint instead of defaulting to my servers local timezone
tantek, KevinMarks and miklb joined the channel
cmal, tantek and rMdes joined the channel
# 23:16 cmal I'm wondering to what extent this could apply to Indieweb "groups" or private streams of data
# 23:17 cmal (I mean the design outlined in the research paper, not the actual XMPP implementation)
KevinMarks and gRegorLove joined the channel
AngeloGladding joined the channel
# 23:56 gRegorLove Sure. But trying to understand the technical discussion around why.