I noted that in a Semi-Anonymous MUC (hosted on OF 4.9.0) Participant with an affiliation (including the owner) has their xmpp id leaked in the Gajim info screen.
Hello, i did try to replicate and what i notice was, if you create a public semi-anonymous room and then invite a Gajim user to a room, then at that particular time the Gajim will leak the JID of the one who invited(i believe that its because they are contacts already). However if you log out and in again, then there is no JID leak via the room.
I also tested with Guus, the scenario that the room is created, users are not in each others roster, the Gajim user join said room, and there is no leak.
I am using Openfire 5.0.2 and Gajim 2.3.6. In case you are still getting those leaks, you could maybe try to explain exactly the replication method.
I am not the creator of the MUC, nor one of his contacts when I joined (simpy using the muc uri, it is an open one). The MUC server is OF 4.9.0. We will verify if promoting a no affiliation participant to Member will trigger that.
Hello @guus I would prefer to replicate the problem on an ad-hoc muc. I have an account on the same server. Here’s the xmpp uri: xmpp:leakingjid@conference.cazzinostri.kenobit.it?join
have tried to reproduce the issue by joining the room using a very low-level XMPP client, which allowed me to inspect the raw traffic easily. Joining the room worked without problems, and I inspected all traffic that was logged both during the join sequence and while attempting a number of MAM queries.
The MAM queries did not return any results, which is likely because the account I used does not have authorization to access archived data. Because of that, I might not be able to fully reproduce what Gajim is doing on your end.
From what I did see in the captured traffic, there is no indication of any real JIDs leaking. Specifically nothing from users “Rob” or “Ryoma123”. It would help if I knew their actual JIDs, as I could then search the logs for those exact values. What I can confirm is that no real JIDs from the cazzinostri.kenobit.it domain appear anywhere in the logs (“@cazzinostri.kenobit.it” does not occur at all). If Rob and Ryoma123 are users on that domain, then their true JIDs were not exposed in the traffic I inspected.
A few possibilities remain:
My test account may simply not have the required permissions to perform the same queries as your Gajim client, which would mean I am not reproducing the scenario fully.
Gajim might be issuing different MAM or history-related queries that I have not reproduced.
Or there is something else I have not considered yet.
It might be worthwhile to gather logs directly from Gajim, if that is feasible. You may need assistance from the Gajim developers to enable or interpret the relevant debugging outputs.
As mentioned earlier in the thread, @zoidberg tested later versions of Openfire and the Monitoring plugin and could not reproduce the issue there. It is possible that the problem you are seeing has already been resolved upstream. If you have not already, I would definitely recommend upgrading to a more recent Openfire release to check whether the behavior persists.
Besides the possibility of the bug not being present there, there is also Reactions on the newest how is that to sweeten the deal :-). i think however you also need to update your Gajim, that one do seem to be a bit old.
Yes, I think too it would be better. May you contact me by email?
Nevertheless, when I join the muc with Gajim (latest v2.4.0) using an external test account (not a @cazzinostri.kenobit.it one) I can see the jids of all participant with an affiliation. I tried to setup a fresh new Gajim user config, and recorded the xml traffic using Gajim’s debug console. I found two entries with jid:
I tested myself v5.0.2 and I can confirm that affiliated jids leak disappeared. I don’t know how to create MUC with MAM there, but this is another story.