-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update of the SASL SCRAM Downgrade protection XEP #17
Comments
Interesting attack vector! There are two key steps we need to address first:
@edhelas: Could you provide an update here once XMPP servers has added the parameter? |
I've already updated Prosody's ssdp module 2 days ago: https://hg.prosody.im/prosody-modules/rev/eedeed1bccf7 The fix for ejabberd was committed yesterday, too: processone/xmpp#99 |
Thank you for the information! When I begin working on this issue, I'll attempt to build an ejabberd/ecs Docker image using the latest master branch, if no official version is available by that time. |
you can use Holger Weiß' test server at messaging.one, too. He deployed my PR there before merging it :) |
btw: go-sendxmpp and Monal are now patched to implement the fixed version of ssdp, too. |
It seems that some XMPP servers are already patched and Movim cannot login on them anymore :( |
I'm currently waiting for processone/docker-ejabberd#121 to get merged. Without it I can't run the test automatically against a patched version of ejabberd. |
The value delimiters were changed to prevent some possible attack.
The related PR is there: xsf/xeps#1422
And the rendered version is there: https://dyn.eightysoft.de/xeps/xep-0474.html
Thanks again for the awesome work you're doing on the library !
The text was updated successfully, but these errors were encountered: