micah anderson:
> Chris Knadle <[email protected]> writes:
> 
>> micah:
>>> Chris Knadle <[email protected]> writes:
>>
>>>> I'm currently updating my 1.2.10-1 prepared upload for Debian with a patch
>>>> for #787384, which I just did for the package in my repo only for Sid,
>>>> because the new zeroc-ice hasn't transitioned to Stretch yet AFAIK.
>>>
>>> The reason I'm really interested in this is because of the PFS cipher
>>> support. Unfortunately, it seems like this isn't particularly useful
>>> unless things are built from the git head at the moment, and maybe that
>>> support isn't even finished. It would be great if this could be brought
>>> into the debian packages (even if it might need to be done before 1.3 is
>>> released), see https://github.com/mumble-voip/mumble/issues/1811
>>
>> I'm really interested in mumble in terms of encryption/privacy/integrity
>> too, so I'd love to get PFS support but in reading the bug it looks like
>> that's not possible for now.  Upstream has specifically requested I only
>> release the stable 1.2 builds (the non-snapshot+cherry-pick-patches release
>> for wheezy that Ron Lee made has been particularly painful for upstream) and
>> avoid uploading any of the 1.3 "snapshot" builds until they release a stable
>> version, and #1811 above states that the mumble 1.2 releases are bound to Qt
>> 4... and sounds like Qt 4 can't do PFS
> 
> Yeah, I think you are right.
> 
> As an aside, the Qt 4 problem shouldn't be an issue because QT 5 is in
> Debian now.

Yes but it's kind of a moot point: mumble 1.2.x is Qt 4 only.  Qt 5 being in
Sid means we're ready to transition to it once mumble 1.3.x is released.
[1.3.x will be compatible with Qt 4 or Qt 5, 1.4.x will be Qt 5 only.]

>> Mumble upstream also have some Qt 4 patches to add TLS 1.1 and 1.2 support,
>> but the way they work is to redefine QSsl::TlsV1 to mean "TLS 1.0 or later"
>> and they don't recommend upstream distributions try to use these patches.
>> This is explained in:
>>
>>    http://blog.mumble.info/mumble-1-2-9/
>>
>> The only good news is that with the 1.2.10-1 release I'm about to upload,
>> the sslCiphers can be specified in the mumble-server.ini file. [That's
>> probably important enough that I should add a note about this to the NEWS 
>> file.]
> 
> Yeah, I've been testing this version against the same server version,
> and trying to set the sslciphers option in the murmurd config file, it
> seems to set it, but I can't seem to get the client to pick up those
> preferred ciphers, and I'm not sure why.

Hmm.  Okay.  I haven't played with the option (with mumble) yet.. specifying
a list SSL ciphers can be tricky because of the notation shorthands that are
available.  The .ini file suggests using 'openssl ciphers <string>' to check
the resulting cipher list.  Likewise check that the cipher list you want is
actually available on both sides.

>> BTW: in the "Advanced" settings under "Network" in the mumble client you can
>> use "Force TCP mode" so that mumble could be used over Tor and then starting
>> mumble in a terminal with 'torify mumble'.  [That works! :-)]
> 
> You can also not set "Force TCP mode" and just use 'torsocks mumble' -
> that works fine too (even with .onion addresses!) Mumble seems to
> automatically switch to one mode over the other, if it can do it, so
> maybe the Force mode would just make it faster in figuring this out? I
> just know it was pretty fast in figuring it out for me.

I'm glad this works too.

If I used firewall to block UDP traffic and force the use of Tor then this
would probably be okay, but other than that if I intended to do mumble over
Tor I'd likely use "Force TCP mode" to try to insure I didn't accidentally
leak my IP via sending UDP traffic in a connection attempt.

>> Re: integrity: a while ago I changed the the debian/watch file to have uscan
>> check OpenPGP signatures of the upstream releases.  And with 1.2.10-1 I'm
>> switching debian/rules to 'dh' in an effort to get reproducible builds.
> 
> that is great to hear, thanks for doing those changes!

You're welcome -- trying to do what I can

-- 
Chris Knadle
[email protected]

Reply via email to