phone



    • reply chevron_right

      Libervia progress note 2022-W45

      Hello, it's time for a long overdue progress note. I'll talk here about the work made on ActivityPub (AP) gateway and on end-to-end encryption around pubsub. Oh, and if everything goes well, this blog post should be accessible from XMPP and ActivityPub (and HTTP and ATOM feed), using the same identifier goffi@goffi.org. Forewords The work made on the AP gateway has been possible thanks to a NLnet/NGI0 grant (with financial support from the European Commission's Next Generation Internet programme). I especially appreciated that the team was really there to help bring the ideas to life, and not once did they get in the way: little paperwork, no unnecessary pressure, caring, contacts when help was needed, etc. I wish there were more organizations like this one that really help develop libre projects for the common good. So once again I want to thank them for all that. XMPP ⬌ ActivityPub Gateway There is probably no need to explain here what is ActivityPub, we can simply write that it is an open protocol that allows to do things that XMPP also allows doing, and that until now these 2 protocols could not communicate together. The work on the ActivityPub gateway aims to allow software implementing one of these 2 protocols to communicate as easily as possible. I firmly believe that all open protocols should be able to communicate which each other, to avoid creating more silos, proprietary software is already good enough at that. To be useful, a gateway must use the full potential of both protocols. A simple bot transcribing messages as we see too often, using unsuitable features (such as instant messaging for blog posts), or using a very limited set of features to ensure compatibility are flaws that I have tried to avoid. Building a good gateway is a difficult and time-consuming task. If done right, the gateway should be as invisible as possible to the end user. XMPP is featuring blogging since long before AP, however the set of features is not exactly the same. Current use of AP is clearly inspired from commercial "social" networks, and metadata such as subscribers/subscribed nodes (or followers/following in AP terms) are highlighted, feature such as like/favourite were missing in XMPP, and some implementation such as Pleroma do implement reactions. To integrate that in the gateway, I've been working on new specifications: Pubsub Public Subscriptions: a way to publicly announce subscriptions, in an opt-in way. With this it's possible to implement followers/following features in a way respectful of privacy. Pubsub Attachments: a generic way to attach any kind of data to a pubsub item. It's notably used to implements noticed/favourite button (see

      people goffi 24 November, 2022

    • wifi_tethering open_in_new

      This post is public

      mov.im

    • favorite

      4 Like

      debacle, darhma, Blue, Timothée Jaussoin

    • 1 Comments

    • 24 November, 2022 Blue

      Thimothee? Do you have ActivityPub <> Pubsub bridge? Is it libervia? How does it work?

    • chevron_right

      Say hello to our official Mastodon account… and new Patreon page!

      Timothée Jaussoin • pubsub.movim.eu / Movim • 18 November, 2022 edit

    Mastodon Welcome

    Movim is joining the Mastodon network you can follow us on @movim@piaille.fr to stay informed of our latest news or you can continue to follow our official blog as well 😋

    We also totally refreshed our Patreon page and introduced two new membership levels, Supporter and Sponsor. If you want to help Movim and fund our development do not hesitate to support us there.

    We would really like to first cover our monthly expenses (servers, domains…) and if we get enough support be able to fund some new features such as group-videoconferencing 🥰

    #Patreon #Mastodon #Sponsor #Support #Movim

    • chevron_right

      Movim, the federated blogging and chat platform!

      Timothée Jaussoin • pubsub.movim.eu / Movim • 11 November, 2022

    Bye bye Facebook, bye bye Twitter, the federated platforms are ready to take over!

    The whole Fediverse is booming, Mastodon looks like a really promising replacement for the little blue bird and Peertube to replace Youtube. Many other platforms are currently being developed around the ActivityPub ecosystem like explained in this article The Fediverse is so much bigger than Mastodon.

    Mastodon banner

    We think that Movim also fit perfectly in there by being a perfect blogging and chatting platform. Fully built on the widely used Internet standard XMPP it is packed with plenty of exciting features in a nice and friendly user interface.

    The Libervia project is actually working on a bridge between ActivityPub (the Fediverse core protocol) and XMPP which would allow us to connect all those exciting platforms with Movim!

    ActivityPub and XMPP

    Feel free to share the word to help us!

    We are just at the beginning of this exciting journey :)

    edhelas

    #movim #xmpp #activitypub #fediverse #mastodon #libervia #twitter #facebook

    • chevron_right

      Movim 0.20 - Skiff

      Timothée Jaussoin • pubsub.movim.eu / Movim • 19 February, 2022 edit • 3 minutes

    I was used to #release a new version of #Movim twice a year. Skiff is an exception. One year of work was required to release the 20th major version of the project.

    The main reason is mostly based on the amount of work and adjustments required to integrate the main feature of this release: the support of end-to-end #encryption through the implementation of OMEMO.

    So let's dive in all the new exciting features that you will discover in this major release.

    OMEMO

    The technical part was already extensively covered by the dedicated article End to end encryption in Movim - OMEMO is (finally) there!.

    The user experience and flow is not very different than on other XMPP clients, if Movim detects that you can start an encrypted conversation with a contact a small lock icon will be displayed next to the chatbox. You can always choose to toggle it back to have a non-encrypted discussion.

    The new redesigned chatbox

    It is also possible to see all the encryption fingerprints in the Contact drawer under the dedicated "Fingerprints" tab. You can also enable and disable encryption to each fingerprint manually there. Movim is displaying the last message sent or received and the client linked to the fingerprint to help you with your configuration. But rest assured, those settings are only for those that wants to configure in detail their encryption levels.

    OMEMO Fingerprints

    End-to-end encryption is also available for group chats, the flow is exactly the same as for single contacts.

    There is some chances that you encounter encryption issues in some cases, even after a lot of debug and refactoring end-to-end encryption is a really complex beast that is difficult to handle. Feel free to open a ticket with all the details to reproduce the issue if you encounter one.

    I'd like to thank again NLNet for their help on this project ! With the funding I was able to free-up time to finally integrate end-to-end encryption in Movim.

    NLNet Logo

    Posts

    A few changes were made regarding the posts and their integration within Movim.

    The post publication form was slightly redesigned and now allows several images, files or links to be attached. Linked to that change, post cards were also redesigned with a more compact design.

    Multiple attached pictures

    The public Communities and Blog pages now have the same 2-columns design as their private version. The displayed Communities and Contacts information are also now more compact.

    Two column design for the public pages

    The tags were redesigned and are now more clearly visible and navigable.

    Now design for the tags

    Chat

    The contacts and chatrooms drawers were redesigned and now include some really useful information. Pictures and links sent in conversations are now quickly available in dedicated tabs.

    Redesigned chat drawer

    Chat bubbles are now properly displaying quotes and support message styling.

    Chat bubble with styling

    A big refactoring was also done regarding how the edited messages are handled in Movim. This refactoring allowed messages to be edited in Group Chats and the support of several edits on a single message (which caused some weird message duplication bug).

    Chatrooms

    Chatrooms administrators can now manage affiliations and ban/unban users.

    Changing affiliation for a user

    You can now prioritize your most important chatrooms on top of the list with the pin feature.

    Pinned chatrooms

    ...and many other things

    The old Movim API code was fully removed. It had been left untouched for years and not really used nor up-to-date anymore.

    When you are in a chat conversation, the other chats counter is displayed on the back button.

    The internal picture library was rewritten and simplified, it now supports transparent avatars. All pictures are now compressed in WebP by default.

    Admins can now fully disable the registration feature. It is quite useful if you have a dedicated Movim setup and a specific separated flow to register your users (using an internal LDAP in a company or school for example).

    Plenty of new emojis were integrated with the support of Unicode 13.0.

    Movim is now a Progressive Web App

    Movim used to have some "native" apps, on desktop and Android. All those app are now deprecated and replaced by work that was done to make Movim a full Progressive Web App. From any browsers you can now install Movim as an app on your phone or desktop in a single click.

    Conclusion

    Lots of other small improvements and features were integrated in this release but not listed there, it's time for you to discover them. Enjoy this new version!

    That's all folks!

    • chevron_right

      Movim is available in Basque! HOT PEPPER

      Timothée Jaussoin • pubsub.movim.eu / Movim • 20 January, 2022 edit

    Once in a while I download and synchronize the #Movim #translations from the Transiflex platform.

    Thanks to the awesome community, Movim is now translated in 57 different languages.

    I was really surprised that the project was fully translated in Basque. A language spoken in the beautiful #Basque Country that sits between France and Spain. I personnally lived there for a few years (in Bayonna) and really loved those beautiful lands!

    I'd like to thank again all the people that are working hard on the Movim translations!

    Mila esker (Thank you in Basque) !

    • chevron_right

      End to end encryption in Movim - OMEMO is (finally) there!

      Timothée Jaussoin • pubsub.movim.eu / Movim • 15 December, 2021 edit • 7 minutes

    A few days ago I finally closed the OMEMO encryption ticket on Github. Opened in 2015 it had many twists and turns along the years but I finally found a proper way of integrating it in Movim.

    In this article I'll explain why adding #E2EE (End to End Encryption) was not as easy as with the other #XMPP clients (and more generaly all the chat clients that are using a similar encryption protocol) and how I addressed the issue.

    But before going in the details I'd like to thanks the NLNet Fundation for its financial support in this project. With their help I was able to free-up some time to work on the problem and propose a proper architecture (detailled bellow) for it.

    NLNet Foundation logo

    The result of this work will be released with the upcoming 0.20 version of #Movim. There is still some quirks and whims about it but the base is there and works pretty well.

    End to End encryption in XMPP, a quick overview

    The introduction of Signal in 2015 brought a small revolution into the encryption protocols in the IM ecosystem. The Double Ratchet Algorythm (see the dedicated technical documentation on the Signal website) allowed users to exchange messages between different clients in an “end to end encrypted” way (only user devices themselves know how to encrypt and decrypt messages) with some technical improvements (not detailed here) that made the new protocol a “must have” for all the others IM solutions.

    Today the Double Ratchet Algorithm is used in applications such as WhatsApp or Matrix.

    In the XMPP ecosystem it was primarily pushed by Daniel Gultsch in the Conversations.im client and standardized along the way in the OMEMO XMPP Extension XEP-0384: OMEMO Encryption. Throughout the years many XMPP clients implemented OMEMO, their status can be tracked on the following website Are we OMEMO yet?.

    The OMEMO architecture

    Without going too deep into the technical details the general idea about OMEMO is to generate some keys on each of the user's devices and publish the public ones on their account server.

    Using the keys published on the XMPP user's servers, anyone can then start an encrypted session at any time (the servers are always available) and start to send messages to the desired contact without having to wait.

    Publishing keys and building sessions with OMEMO

    If one of the user's contacts wants to start an encrypted discussion they will first start to get those keys, then build sessions with their secret one and encrypt a message using the freshly built sessions.

    If a user receives a new encrypted message and doesn't have an encryption session to that device, their device will then retrieve the contact keys, build the encryption sessions and start decrypting messages.

    This can be done automatically if the contact trusts blindly the key used or in a more “trusted” way by accepting manually each keys to build the encryption sessions on.

    All the existing XMPP clients are using this simple architecture. XMPP servers are storing their users' #OMEMO public keys and the users are connecting directly using their different devices to build their encrypted sessions.

    The Movim particularity

    But Movim is kind of special. The XMPP connection is actually not maintained on user devices but by the Movim server (built in PHP and running behind a web server such as Apache or nginx, see Movim General architecture on the Wiki). Movim is then processing everything server side, saving the information (articles, contacts and messages) in a SQL Database (PostgreSQL or MySQL) and then showing the result to the Movim users through a lightweight website.

    If a user is connecting on the same Movim instance through several browsers using the same XMPP account all the browsers are then “merged” into one unique XMPP session (called "resource") and all the browsers are synchronized in real time by the Movim server. This is pretty useful to save memory and to prevent Movim to maintain several XMPP connections at the same time for a unique user. This also allows quick disconnection/reconnections, the users can close and reopen their tabs without having to reload the whole XMPP state when they come back after a while (Movim is closing the XMPP session after a day of inactivity).

    End to end encryption actually requires to encrypt and decrypt messages on the user device, this brings several issues:

    • For Movim, the user device is actually a “dumb” browser that only display the messages pre-processed by the Movim server, there is no logic whatsoever browser side
    • A user can use simultaneously several browsers with the same XMPP connection on the same Movim instance
    • All the message processing logic is done server side

    This unique architecture requires a very unique way of adressing the E2EE situation. Hopefully OMEMO offers all the tools needed to handle those cases.

    Split the logic

    The OMEMO extension is actually talking about devices, for a large majority of the XMPP clients a device is connected through a unique XMPP session (one device equal one current XMPP resource in those cases).

    Publishing keys with Movim

    The fact that Movim is sharing a unique session (resource) with several devices (browsers) is actually not an issue in the end. Each browser will then be considered as a unique device on its own, with its own key and its own OMEMO encrypted sessions.

    Building encrypted sessions with Movim

    This brings some interesing results. When a user is connected using the same XMPP account using two different browsers on the same Movim server (also called instance, or pod), an encrypted message sent by the browser Firefox will then directly be decrypted by the browser Chrome without even having to travel through the XMPP network.

    The term “browser” is also defining more than actual browsers (like Firefox, Chrome or Opera). Since we can have private navigation or containers (in Firefox) each time it is seen as a different “browser” on the Movim side (because each context is separated, with a different cookie and different local data).

    So the global idea is to continue to handle the messages server side, push the encrypted message object to the browser, and then implement only the key handling and message encryption-decryption flow browser side. When doing this implementation I actually looked at the Converse.js and JSXC OMEMO implementations, the Movim implementation is really close to the one done on those two clients (I am also re-using the libsignal JavaScript implementation).

    This architecture actually works for the current version of OMEMO (0.3.0) where only the body is encrypted. The upcoming versions are looking to encrypt a larger part of the XML stanza. This will be way more difficult to handle for Movim, as it will require to decrypt messages browser side and then implement a second parser, this time in JavaScript (everything is parsed in PHP using libxml at the moment).

    if (textarea.dataset.encryptedstate == 'yes') {
        // Try to encrypt the message
        let omemo = ChatOmemo.encrypt(jid, text, Boolean(textarea.dataset.muc));
        if (omemo) {
            omemo.then(omemoheader => {
                ...
                xhr = Chat_ajaxHttpDaemonSendMessage(jid, tempId, muc, null, replyMid, mucReceipts, omemoheader);
                ...
            });
        }
    } else {
        xhr = Chat_ajaxHttpDaemonSendMessage(jid, text, muc, null, replyMid, mucReceipts);
        ...
    }
    

    This little JavaScript Movim code extract presents the differences in handling encrypted and unencrypted messages. The text variable is containing the clear text version of the message. When the body is encrypted it is then calling the same method as for a clear text message.

    This method is actually a wrapper generated by the RPC (Remote Procedure Call) Movim server core. Once this function is called an Ajax called is made and the rest of the flow is handled server side. The encrypted body, and generated OMEMO headers passed will be injected in a freshly generated XMPP XML <message>.

    Keep the messages in the local database

    With the separation of the logic it was then required to keep a copy of the decrypted messages browser side.

    To do that an IndexedDB database is used. This database is quite simple and only contains a key-value store, where the key is the message id (the same as the one in the Movim server SQL server databse) and the value the plaintext message.

    • When a message is decrypted the plaintext body is then stored in this database.
    • When the user sends an encrypted message, the original text is also saved in this database.
    • If a message cannot be decrypted, the message key is still saved in the browser database with a false value. This prevents Movim to try to decrypt several times a message, knowing that the decryption will fail each time in the end.

    Using this database, when a chat is loaded, all the messages are then sent chronologically from the server, passed trough a little bit of code that will lookup the state of all messages and then decrypt the ones that are not decrypted yet, the already decrypted messages are then shown, or an error is displayed for those that cannot be decrypted.

    To sum up

    In this article I tried to present you what limitations I faced when trying to implement end to end encryption within Movim and what architectural and technical solutions were used to address them.

    The current solution seems to fit and bring all the desired features to Movim without too much downsides. The feature can now be considered as done and will be released soon. And as always, lots of small fixes and adjustments will be integrated to polish it afterward.

    That's all folks!

    edhelas

    • wifi_tethering open_in_new

      This post is public

      mov.im

    • favorite

      9 Like

      quatta, bigou, admin, nnduc, oppose_brainwashing_scams, sal, kris, imattau, Jorge Luis

    • 1 Comments

    • 1 December, 2022 admin

      nice idea to show the unreadable text as a placeholder before message decryption. i like it a lot CRYSTAL BALL and yes, really bon boulot ! SMILING FACE WITH SUNGLASSES

    • chevron_right

      A little update from the Movim project

      Timothée Jaussoin • pubsub.movim.eu / Movim • 16 November, 2021 edit • 1 minute

    It's been a while since I have told you about Movim. I was quite busy the past few months with many other things in my personal life, but this doesn't mean that I haven't worked on Movim!

    So in short, here is a few things that have been changed recently:

    api.movim.eu

    api.movim.eu has been upgraded and refreshed with a new Laravel backend, Google ReCAPTCHA has been replaced with hCaptcha

    The Legals page will be soon upgraded. A specific ticket has been opened to allow you to report and bring ideas on how to improve it.

    End of the Android application

    Following our previous blog post about the state of the Android application I decided to officially archive the Android app and remove it from F-Droid.

    Some work has been done to integrate Movim better as a #PWA (Progressive Web App) to still allow you to enjoy it from your mobile phone.

    Security Audit

    We had an extensive #SecurityAudit by Radically Open Security that did an amazing job.

    The audit covered Movim itself but also api.movim.eu and all the related projects, including movim/movim_docker. The result of the audit is currently restricted but we are actively using the finding to improve the general project security:

    An finally on Movim itself

    • I added a basic support of OMEMO for MUC Groups, you can already try it out on the official pod
    • And as always, bugs fixes!

    That's all folks!

    edhelas

    • chevron_right

      Element and Movim Messengers Comparison Made Simple - ubuntubuzz.com

      Timothée Jaussoin • pubsub.movim.eu / Movim • 3 October, 2021 edit

    A nice #comparison between #Movim (XMPP) and Element (Matrix) from similar features. Thanks !