<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<atom:link xmlns:atom="http://www.w3.org/2005/Atom" rel="self" type="application/rss+xml" href="https://tanguy.ortolo.eu/blog/feed/rss/commentaires/" />
	<link>https://tanguy.ortolo.eu/blog/article69/xmpploit-explained</link>
	<language>en</language>
	<description>a blog about Debian and self-hosting</description>
	<lastBuildDate>Fri, 07 Aug 2020 04:10:00 +0000</lastBuildDate>
	<generator>PluXml</generator>
	<item>
		<title>XMPPloit explained - Written by barund @ friday 07 august 2020, 04:10</title> 
		<link>https://tanguy.ortolo.eu/blog/article69/xmpploit-explained/#c1596773437-1</link>
		<guid>https://tanguy.ortolo.eu/blog/article69/xmpploit-explained/#c1596773437-1</guid>
		<description>&amp;lt;h1&amp;gt;Nice information&amp;lt;/h1&amp;gt;</description>
		<pubDate>Fri, 07 Aug 2020 04:10:00 +0000</pubDate>
		<dc:creator>barund</dc:creator>
	</item>
	<item>
		<title>XMPPloit explained - Written by livy @ friday 03 august 2018, 14:42</title> 
		<link>https://tanguy.ortolo.eu/blog/article69/xmpploit-explained/#c1533307350-1</link>
		<guid>https://tanguy.ortolo.eu/blog/article69/xmpploit-explained/#c1533307350-1</guid>
		<description>I have created a TCP socket which replies to the STARTTLS request from server as a TLS negotiation. However, the negotiation fails with &amp;quot;bad packet&amp;quot; (I am using the .NET AuthenticateAsClient()method). The same script works when auth over 443, however, the &amp;quot;bad packet&amp;quot; only occurs when attempting to reply to the SERVER HELLO : REQUEST CERTIFICATE....Any suggestions on what &amp;quot;certificate&amp;quot; the XMPP server is looking for over port 5222? Again, the certificate I am using successfully authenticates and negotiates TLS when over port 443...</description>
		<pubDate>Fri, 03 Aug 2018 14:42:00 +0000</pubDate>
		<dc:creator>livy</dc:creator>
	</item>
	<item>
		<title>XMPPloit explained - Written by mirabilos @ monday 03 september 2012, 15:13</title> 
		<link>https://tanguy.ortolo.eu/blog/article69/xmpploit-explained/#c1346685231-1</link>
		<guid>https://tanguy.ortolo.eu/blog/article69/xmpploit-explained/#c1346685231-1</guid>
		<description>Right #1 – just use port 5223 and it works.

This is also important for firewalls (packet filters): so, people can *know* that there’s no way to not encrypt.</description>
		<pubDate>Mon, 03 Sep 2012 15:13:00 +0000</pubDate>
		<dc:creator>mirabilos</dc:creator>
	</item>
	<item>
		<title>XMPPloit explained - Written by Tanguy @ monday 03 september 2012, 08:17</title> 
		<link>https://tanguy.ortolo.eu/blog/article69/xmpploit-explained/#c1346660236-1</link>
		<guid>https://tanguy.ortolo.eu/blog/article69/xmpploit-explained/#c1346660236-1</guid>
		<description>@Jan Hudec : Yes, HSTS requires a trusted first connection, so it is not a complete solution indeed.

About subjectAltName, I must object: this is quite used, and very well supported but it is has major drawbacks (when you add a new domain name, you must regenerate the certificate for everything you already have), as opposed to SNI which is very flexible but not supported by antique systems such as Windows XP&#039;s crypto library.</description>
		<pubDate>Mon, 03 Sep 2012 08:17:00 +0000</pubDate>
		<dc:creator>Tanguy</dc:creator>
	</item>
	<item>
		<title>XMPPloit explained - Written by Jan Hudec @ monday 03 september 2012, 07:02</title> 
		<link>https://tanguy.ortolo.eu/blog/article69/xmpploit-explained/#c1346655724-1</link>
		<guid>https://tanguy.ortolo.eu/blog/article69/xmpploit-explained/#c1346655724-1</guid>
		<description>The problem with HSTS of course is that the MITM can simply delete the header. If the client should refuse to continue if it ever saw that header for given URL and does not see it this time, but some hole remains open.

@Mika: It is actually possible to create one certificate that is valid for multiple hosts using alternate names, so you can have virtual hosts with https. It may not work with some buggy clients though as it&amp;#039;s rarely used and thus untested.</description>
		<pubDate>Mon, 03 Sep 2012 07:02:00 +0000</pubDate>
		<dc:creator>Jan Hudec</dc:creator>
	</item>
	<item>
		<title>XMPPloit explained - Written by Antonio @ sunday 02 september 2012, 13:04</title> 
		<link>https://tanguy.ortolo.eu/blog/article69/xmpploit-explained/#c1346591048-1</link>
		<guid>https://tanguy.ortolo.eu/blog/article69/xmpploit-explained/#c1346591048-1</guid>
		<description>@Mika:
Check out the TLS SNI extension.

@Tanguy:
Thank you for bringing attention to the insecure defaults of some clients.

However, the choice of name for this tool is really unfortunate. It&amp;#039;s not exploiting the protocol, and it scared me (and I assume others as well) needlessly when I read this headline.

For the record, Psi+ defaults are

Encrypt connection: When available
Allow plaintext authentication: Over encrypted connection

which, when attacked by this/similar tools will protect your password (by forcing DIGEST-MD5/Kerberos I guess), but the rest of your communication will be MITMed just fine.</description>
		<pubDate>Sun, 02 Sep 2012 13:04:00 +0000</pubDate>
		<dc:creator>Antonio</dc:creator>
	</item>
	<item>
		<title>XMPPloit explained - Written by Mika @ saturday 01 september 2012, 19:24</title> 
		<link>https://tanguy.ortolo.eu/blog/article69/xmpploit-explained/#c1346527489-1</link>
		<guid>https://tanguy.ortolo.eu/blog/article69/xmpploit-explained/#c1346527489-1</guid>
		<description>@Anonymous: No! Do require STARTTLS! Port+IP-based SSL is so horrible, because you can&amp;#039;t negotiate anything. The server as well as the client can only ever offer one certificate per IP, which is a pain. It&amp;#039;s the reason why you can&amp;#039;t use VirtualHosts together with https today, which requires massive amounts (one per hostname) of IPs just to serve different domains from one server.

@the problem: Additionally, pidgin for example has the option to actually require encryption and by default does not allow authentication to happen via plain text. Which of course degrades this man-in-the-middle attack to a simple denial of service attack - if you can become the man in the middle, you can stop pidgin from connecting. Duh.</description>
		<pubDate>Sat, 01 Sep 2012 19:24:00 +0000</pubDate>
		<dc:creator>Mika</dc:creator>
	</item>
	<item>
		<title>XMPPloit explained - Written by Anonymous @ saturday 01 september 2012, 18:08</title> 
		<link>https://tanguy.ortolo.eu/blog/article69/xmpploit-explained/#c1346522908-1</link>
		<guid>https://tanguy.ortolo.eu/blog/article69/xmpploit-explained/#c1346522908-1</guid>
		<description>That said, a note to the designers of any *new* protocol: STARTTLS is a bad idea, just require SSL and don&amp;#039;t allow an unencrypted connection.</description>
		<pubDate>Sat, 01 Sep 2012 18:08:00 +0000</pubDate>
		<dc:creator>Anonymous</dc:creator>
	</item>
		<title>Tanguy Ortolo - XMPPloit explained - Comments</title> 
</channel>
</rss>