600+ entries in 0.615s
jpxe: ben_vulpes: There a reason the first site doesn't use
SSL?
a111: Logged on 2017-12-12 16:11 asciilifeform: meanwhile,
https://archive.is/uL4b5 << usg burns yet another of $infinity
ssl decrypt methods, to push 'Disable RSA encryption!'
mircea_popescu: about:config, search for browser.ssl_override_behavior and set it to 1, which entirely disables the pretense of "security" in
https. mircea_popescu: in other news : if you run a piece of shit firefox on a dirty box somewhere, and if you never upgraded it as you don't intend to upgrade it ; and if the ever-creeping idiocy of the world puts you in this situaiton where various
ssl-"protected" sites are no longer loading :
shinohai: kiwi is fickle about
ssl connections iirc
shinohai: "Connection is already encrypted by Tor, so do NOT enable additional
SSL for the connection. " <<< lmao
Framedragger: i don't recall but i believe you can define ~all the params for DH key exchange in
ssl, i think
Framedragger: i've seen ~sane uses of
ssl, with self-signed pinned cert (verified via side channel). it happens.
mod6: <+mircea_popescu>
ssl certs for v, basically ? << eep.
phf`: i feel like i have to do it roughly once a year, in fact, every time freenode changes their
ssl. i listened to the advice of the wise this time and switched to plain text
Framedragger: shinohai: jhvh1 is also on hashbang, right? how does hashbang force
ssl for *that* one, i wonder? by whitelisting irc
ssl port only?
shinohai: Hashbang irc blows because forced
ssl mircea_popescu: "How do I use
SSL encryption properly?" "
SSL (resp. TLS, as
SSL v2/v3 is already broken but name
SSL is commonly used for TLS protocol) implementation or protocol itself isn't affected"
a111: Logged on 2017-04-09 13:48 BenBE: I'm the maintainer of the GeSHi syntax highlighter for PHP, which is used in e.g. Wikipedia for source highlighting of articles. Also working on several crypto-related projects like my own TLS/
SSL test, a collection of publicly-known set of compromised keys, an OpenSource management software for handling X.509 certificate issuance for a certificate authority.
BenBE: I'm the maintainer of the GeSHi syntax highlighter for PHP, which is used in e.g. Wikipedia for source highlighting of articles. Also working on several crypto-related projects like my own TLS/
SSL test, a collection of publicly-known set of compromised keys, an OpenSource management software for handling X.509 certificate issuance for a certificate authority.
☟︎ ben_vulpes: asciilifeform: can
ssl or gpg be beaten into eating a specific file of entropy without patching them?
mircea_popescu: phf it's entirely unclear what
ssl is supposed to provide. it might have been of marginal utility prior to their nsa merger, but these days it's utter waste of time. treat all freenode connections as plaintext.
phf: seems like freenode upgraded all their servers to letsencrypt, meaning that you can't just verify
ssl's fingerprint once a year. instead each server has own
ssl, updated once in 90 days.
a111: Logged on 2017-01-08 15:11 mircea_popescu: and i must be able to figure out the state by looking at the url, which is why POST is not better than GET but much, MUCH worse, and why it was pushed as part of "
ssl", typical usg-tardism
mircea_popescu: and i must be able to figure out the state by looking at the url, which is why POST is not better than GET but much, MUCH worse, and why it was pushed as part of "
ssl", typical usg-tardism
☟︎ Framedragger: yeah, would be great to have
ssl certs etc all in the same place, timestamped, so one could track history, to an extent. (and then be able to offer realtime scans and alerts as a service, say...)
a111: Logged on 2016-12-08 15:38 asciilifeform: mircea_popescu: the things to scan, that very often are found: 80 (
http), 443 (
ssl), and if either found, the page; if
ssl -- the cert id strings (see l0gz for how) , and lastly, ftp (yes, believe or now) and telnet greetings.
Framedragger: asciilifeform: looks like some folks may have generated
ssl certs this way, too...
Framedragger: aha yes,
ssl certs should go into the oven, too.
trinque: ben_vulpes: DDOS
SSL endpoints, get cleartext passwords, ..., profit?
ben_vulpes: interestingly, could not connect over
ssl adlai: you have to use
ssl with all exchanges (except for one, guess which)
adlai: cl+
ssl is ffi to openssl
adlai: well, it is always throwing
ssl packets, so it could also be that (this is the aforementioned plus-sized library)
Framedragger: omg attempting
https on trilema.com gives common name = server1.nigger.com, email =
ssl@server1.nigger.com -- l0l0l.
trinque: these nazis certainly *can* break various forms of "
SSL", to pick something at random
mircea_popescu: there wouldn't really be anything to throw in the box for
ssl keys tho
mircea_popescu: first things first. the
ssl keys thing - both github and search.