mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

12K
active users

#authorizedfetch

1 post1 participant0 posts today

Lemmy.eco.br agora conversa melhor com o GoToSocial
@fediadminbr@lemmy.eco.br

Agora é possível responder tópicos ou criar novos usando uma conta em instância GoToSocial.

Antes não era possível porque o GtS tem o `authorized_fetch` sempre ativo e isso não pode ser desligado.

Já o Lemmy ganhou suporte a esse recurso há cerca de 1 ano, mas para ativar envolve um blambers no banco de dados e reiniciar os serviços.

Mas agora quem está numa instância com `authorized_fetch` ligado (GoToSocial, Mastodon, etc), pode interagir com Lemmy.eco.br sem problemas.

Obrigado @kariboka por ativar o recurso, e @andrelop por descobrir como faz!

Se você administra uma instância Lemmy e quer ativar também é só seguir esses passos e depois reiniciar os serviços:

🔗 github.com/LemmyNet/lemmy/issu

cc @fediadminbr@a.gup.pe

Question Hello, can it be that Lemmy cannot talk to Mastodon instances if the instance AUTHORIZED_FETCH is activated? lemmy_1 | at src/root_span_builder.rs:16 lemmy_1 | 2024-02-13T17:32:37.659047Z ...
GitHubQuestion: Mastodon AUTHORIZED_FETCH not working? · Issue #4451 · LemmyNet/lemmyBy Tealk

Is there, like, an auth_fetch readiness check tool that can be given the right permissions to do an API check of a list of known federation servers, and ask those servers if it's ready and using auth_fetch itself?

This could be a long running python script to gradually go through a large list like that, or a GitHub action? Is this even necessary at this point?

Interesting! I have threads.net blocked as an instance. @vmstan says that since we have #authorizedfetch that takes away Zucky’s easy button for gobbling up my data.

There are a few threads accounts I want to follow. I have a burner account just for those where, like a bad lover, I take but don’t give.

Interestingly enough, I can use @ivory to boost threads posts -on this account- from my burner.

Huzzah! I believe I have my cake, and am eating it too. Yay.

This server has "authorized fetch" enabled. It has been on since shortly after it became an option. Having authorized fetch enabled means many things, but perhaps most importantly, that you may block threads.net instance and they won't have access to your data. While others on the server who do want to interact with Threads users, can.

Those on instances without authorized fetch enabled don't have a choice unless the instance itself blocks threads. #TMYK #Threads #AuthorizedFetch #fediblock

Welp I wrote all of this shit only to see it not get federated to the OP's instance. I think they're blocking us lol ​:TenshMelt:

Well at least I have something to
#quotepost if I need to explain (my understanding) of #AuthorizedFetch:economist_kasen:

RE:
https://makai.chaotic.ninja/notes/9rzkf0zr1s

Makai:mima_rule: Mima-sama (@mima)@BeAware@social.beaware.live Uhh I think you've gotten it fundamentally wrong here :thinking_cirno: Whether your instance's posts appear on the blocked instance or not doesn't depend on the blocked having #AuthorizedFetch, but rather your instance having AF. That instance can still *fetch* your posts because your instance doesn't check if the request is signed (so an instance can sign all their fetching but still not enable AF, which is what vanilla #Misskey currently does) and from which instance the fetch request is coming from (hence the "authorized"). Threads already defederates from instances that don't sign their fetching (by design because they've enabled AF), but they don't care if an instance has enabled AF (it's that instance's problem to deal with posts still appearing in Threads). The problem (I have) with AF is that it's pretty much just #securitytheater. The documentation doesn't seem to account for this possibility, but if your adversary has enough money for some cheap domains and is well-versed in how #ActivityPub works nowadays, then it's trivial for them to forge signatures to look like their fetches come from an innocent server, therefore effectively bypassing the check and allowing the blocked to get your posts into their instance. This is already being done in the wild (with the #Soapbox developer doing this to bypass Threads' fediblock being the most infamous recently). It also complicates AP implementations because now you have to deal with more cryptography with all that signing and verifying of requests. And signing alone does have a significant impact on performance. It's impossible to create a 100% compatible AP implementation from the spec alone without looking at Mastodon's implementation. That's where the #EmbraceExtendExtinguish or #EEE comes to play. So overall it's the overeagerness of #MastoAdmins in adopting AF or #SecureMode without understanding the compatibility and performance implications that brought us to this mess today. RE: It's completely asinine that an instance I've defederated from that doesn't use "authorized fetch" (proprietary mastodon implementation) can see my posts and interact with them as if I can see them. I'm basically giving promotions to asshats in my replies from gross instances because blocks don't work like they should... This is why I don't see Threads federating with these platforms for very long. Every Fedi software that doesn't adopt Authorized Fetch, will be breaking their terms. There IS a few proposals on how AP could officially implement a similar feature, but as of right now, it's the wild west here. #Fediverse #Fedi #Mastodon #Threads #Meta #Pleroma #Akkoma #Sharkey #IceShrimp #ActivityPub #FireFish #Pixelfed

@BeAware@social.beaware.live Uhh I think you've gotten it fundamentally wrong here ​:thinking_cirno:

Whether your instance's posts appear on the blocked instance or not doesn't depend on the blocked having
#AuthorizedFetch, but rather your instance having AF. That instance can still fetch your posts because your instance doesn't check if the request is signed (so an instance can sign all their fetching but still not enable AF, which is what vanilla #Misskey currently does) and from which instance the fetch request is coming from (hence the "authorized").

Threads already defederates from instances that don't sign their fetching (by design because they've enabled AF), but they don't care if an instance has enabled AF (it's that instance's problem to deal with posts still appearing in Threads).

The problem (I have) with AF is that it's pretty much just
#securitytheater. The documentation doesn't seem to account for this possibility, but if your adversary has enough money for some cheap domains and is well-versed in how #ActivityPub works nowadays, then it's trivial for them to forge signatures to look like their fetches come from an innocent server, therefore effectively bypassing the check and allowing the blocked to get your posts into their instance. This is already being done in the wild (with the #Soapbox developer doing this to bypass Threads' fediblock being the most infamous recently).

It also complicates AP implementations because now you have to deal with more cryptography with all that signing and verifying of requests. And signing alone does have a significant impact on performance. It's impossible to create a 100% compatible AP implementation from the spec alone without looking at Mastodon's implementation. That's where the
#EmbraceExtendExtinguish or #EEE comes to play.

So overall it's the overeagerness of
#MastoAdmins in adopting AF or #SecureMode without understanding the compatibility and performance implications that brought us to this mess today.

Continued thread

Now, the #Fediverse has attracted many users with a desire for safety and data sovereignty (i.e. they should decide what happens with their data). So they get understandably upset when their data gets siphoned without their consent or knowledge. It's not always clear how to protect against this, barring buy-in to codes of conduct and concepts like the still-evolving #AuthorizedFetch. So far, security has been best obtained through obscurity, but this is shaky & hampers ease of use. So what do? 😕

No, fuck you for making "Public" a gray area when it shouldn't be.

These kind of
#privacy freaks and #security freaks (different from privacy-aware and privacy-conscious) who don't understand the definition of #Public.. You know, the types who will put every damn mitigation and flick on every security feature in their computer even though it adversely affects their usability and doesn't really apply to their threat model (this part is especially ignored!), and yet will do an epic #OPSEC fail elsewhere anyway... These kind of people can do a favor for the #fediverse and stay the fuck out of #socialmedia. They can come back once they understand fully the phrase "think before you click".

Don't want people using their
#RSS reader against your instance? Fine, then disable it in your instance's settings. But don't expect that you can prevent everyone from still trying to use RSS against your account without your knowledge. Because that's impossible and all you're really doing here is #securitytheater. Just like what #authorizedfetch is.

RE:
https://sfba.social/users/FinchHaven/statuses/111868391652688742

SFBA.socialFinchHaven (@FinchHaven@sfba.social)Reposting, set to public: @FediTips So how do I know that some unknown party has added me to *their* #RSS feed? Is there any way at all? And apparently it's all on my shoulders because now I have to use a non-visible setting on *all* my posts? Fuck -- and let me be very blunt here -- that shit "To be fair to Mastodon though, public posts on social networks are visible to anyone, even people who don't have an account" No This is not "being fair" This has always been the biggest bullshit cop-out available anytime some bright star wants to invade someone else's online presence without their knowledge or permission I've seen it used against #Zuck #Meta and #Threads Why is it a positive (or neutral at least) here? cc @gotosocial
Replied in thread

@swelljoe i think, rewarding corporate asshats for promoting hate is a really bad idea. I think enabling passive cooperation with Nazis is evil.
If people using destructive products refuse to stop, that doesn't mean i should encourage them to keep doing that.
If my instance doesn't take an ongoing, active stance in preventing abuse by known malicious corporations, it's a shitty instance and I should find another who refuses to be complicit in abuse.
#AuthorizedFetch
#Fedipact

So, this may be because I have a single-user instance and I have fairly few 'followers', but I enabled authorized fetch on December 18th and I'm not seeing a sustained increase in CPU load. I guess I expected more computational cost?

It's either more computationally efficient than I feared or perhaps I need more boosts/replies/etc to really see a difference in load.

Continued thread

While Authorized Fetch remains important to activate, it is clear that even it - which remember, provides better defense than that currently implemented on most of our home servers - is inadequate to the threats facing us as the Zuckerberg incursion progresses. If we're serious about protecting our communities and expressions from absorption into surveillance capitalism and the accelerating miseries of fascism, we need to talk about a stronger grade of defensive weaponry.

To this end, @are0h has fired a first volley: h-i.social/@are0h/111653850819 Every fedi community which serves as a refuge for those targeted and under siege should be thinking like this. True safety only awaits us in a transitive approach to defederation, and further on, in an intentional federation based on the allow-list.

2/7

h-i.social powered by Masto Glitch EditionOptional Dictator (@are0h@h-i.social)Every instance that federates with Threads will be limited or suspended by the one I run. No, this is not up for negotiation. Run your instance as you see fit, but Threads will be treated like a bad actor until proven otherwise.

The Intentional Federation

We have recently been advocating the activation of a function which is present but usually off in Mastodon and other fedi services called Authorized Fetch. As we plead with the major development projects to take safety more seriously and make it a default, we have learned that Meta itself didn't think twice about it and has activated it in their own ActivityPub implementation against *us*.

We know this because of news that a fascist has devised a way to evade it and force federation with Threads. They promise to then turn their technique upon us and coerce unblockable federation with fascist and cryptospam instances: soapbox.pub/blog/threads-serve

1/7

soapbox.pubThreads is blocking servers on the Fediverse. Here's how we unblocked ourselves. | SoapboxThreads has begun testing federation over ActivityPub. And they have blocked two important servers I administrate. The first server is the Mostr Bridge. The Mostr Bridge connects ActivityPub and Nostr together, so people can communicate across protocols. The second server is Spinster.xyz, which is arguably the largest independent feminist community online.