600+ entries in 0.724s

jpxe: ben_vulpes: There a reason the first site doesn't use 
SSL?
 a111: Logged on 2017-12-12 16:11 asciilifeform: meanwhile, 
https://archive.is/uL4b5 << usg burns yet another of $infinity 
ssl decrypt methods, to push 'Disable RSA encryption!'
  mircea_popescu: about:config, search for browser.ssl_override_behavior and set it to 1, which entirely disables the pretense of "security" in 
https.  mircea_popescu: in other news : if you run a piece of shit firefox on a dirty box somewhere, and if you never upgraded it as you don't intend to upgrade it ; and if the ever-creeping idiocy of the world puts you in this situaiton where various 
ssl-"protected" sites are no longer loading :
 shinohai: kiwi is fickle about 
ssl connections iirc
 shinohai: "Connection is already encrypted by Tor, so do NOT enable additional 
SSL for the connection. "   <<< lmao
 Framedragger: i don't recall but i believe you can define ~all the params for DH key exchange in 
ssl, i think
 Framedragger: i've seen ~sane uses of 
ssl, with self-signed pinned cert (verified via side channel). it happens.
 mod6: <+mircea_popescu> 
ssl certs for v, basically ? << eep.
 phf`: i feel like i have to do it roughly once a year, in fact, every time freenode changes their 
ssl. i listened to the advice of the wise this time and switched to plain text
 Framedragger: shinohai: jhvh1 is also on hashbang, right? how does hashbang force 
ssl for *that* one, i wonder? by whitelisting irc 
ssl port only?
 shinohai: Hashbang irc blows because forced 
ssl mircea_popescu: "How do I use 
SSL encryption properly?" "
SSL (resp. TLS, as 
SSL v2/v3 is already broken but name 
SSL is commonly used for TLS protocol) implementation or protocol itself isn't affected"
 a111: Logged on 2017-04-09 13:48 BenBE: I'm the maintainer of the GeSHi syntax highlighter for PHP, which is used in e.g. Wikipedia for source highlighting of articles. Also working on several crypto-related projects like my own TLS/
SSL test, a collection of publicly-known set of compromised keys, an OpenSource management software for handling X.509 certificate issuance for a certificate authority.
 BenBE: I'm the maintainer of the GeSHi syntax highlighter for PHP, which is used in e.g. Wikipedia for source highlighting of articles. Also working on several crypto-related projects like my own TLS/
SSL test, a collection of publicly-known set of compromised keys, an OpenSource management software for handling X.509 certificate issuance for a certificate authority.
 ☟︎ ben_vulpes: asciilifeform: can 
ssl or gpg be beaten into eating a specific file of entropy without patching them?
 mircea_popescu: phf it's entirely unclear what 
ssl is supposed to provide. it might have been of marginal utility prior to their nsa merger, but these days it's utter waste of time. treat all freenode connections as plaintext.
 phf: seems like freenode upgraded all their servers to letsencrypt, meaning that you can't just verify 
ssl's fingerprint once a year. instead each server has own 
ssl, updated once in 90 days.
 a111: Logged on 2017-01-08 15:11 mircea_popescu: and i must be able to figure out the state by looking at the url, which is why POST is not better than GET but much, MUCH worse, and why it was pushed as part of "
ssl", typical usg-tardism
 mircea_popescu: and i must be able to figure out the state by looking at the url, which is why POST is not better than GET but much, MUCH worse, and why it was pushed as part of "
ssl", typical usg-tardism
 ☟︎ Framedragger: yeah, would be great to have 
ssl certs etc all in the same place, timestamped, so one could track history, to an extent. (and then be able to offer realtime scans and alerts as a service, say...)
 a111: Logged on 2016-12-08 15:38 asciilifeform: mircea_popescu: the things to scan, that very often are found: 80 (
http), 443 (
ssl), and if either found, the page; if 
ssl -- the cert id strings (see l0gz for how) , and lastly, ftp (yes, believe or now) and telnet greetings.
  Framedragger: asciilifeform: looks like some folks may have generated 
ssl certs this way, too...
 Framedragger: aha yes, 
ssl certs should go into the oven, too.
 trinque: ben_vulpes: DDOS 
SSL endpoints, get cleartext passwords, ..., profit?
 ben_vulpes: interestingly, could not connect over 
ssl adlai: you have to use 
ssl with all exchanges (except for one, guess which)
 adlai: cl+
ssl is ffi to openssl
 adlai: well, it is always throwing 
ssl packets, so it could also be that (this is the aforementioned plus-sized library)
 Framedragger: omg attempting 
https on trilema.com gives common name = server1.nigger.com, email = 
ssl@server1.nigger.com -- l0l0l.
  trinque: these nazis certainly *can* break various forms of "
SSL", to pick something at random
 mircea_popescu: there wouldn't really be anything to throw in the box for 
ssl keys tho
 mircea_popescu: first things first. the 
ssl keys thing - both github and search.