689 entries in 0.942s
trinque: and they start using their
SSL chewing boxes, or what have you
copypaste: Or, the derps (sorry to steal your word) in charge still have ignored me and haven't added
SSL support
williamdunne: 19:22:10 - davout: williamdunne: you scared me with that
SSL shit << it was stupidity at its finest, pretty sure they only implemented GPG for another buzzword
davout: williamdunne: you scared me with that
SSL shit
williamdunne: That depends on the function you are going for.
SSL doesn't serve as a way to verify each party and obviously has some contentious things going on with cert authorities.
williamdunne: >PGP over HTTP is not necessary when using
SSL (HTTPS).
danielpbarron: williamdunne, ^,
ssl is a suitable alternative for GPG !?
williamdunne: thestringpuller: PGP over HTTP is not necessary when using
SSL (HTTPS). Signing and encrypting with PGP is a nice way to bypass using authorization tokens, though, but it is not usable in a modern exchange interface. Trades on MPEx are very slow as a result.
mircea_popescu: because why not,
ssl lv3 is a standard-as-implementred thing.
mircea_popescu: asciilifeform "OpenSSL: error:14077410:
SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure"
☟︎ mircea_popescu: currently for instance, cpanel forums require
ssl, and so i'm not visiting them. i don't generally visit sites that don't have a
http version.
mircea_popescu: redefining "everywhere" != succeeding at
ssl everywhere.
jurov: i expect at least one round of redoing all the world if the derps succeed enforcing
SSL everywhere
decimation: in theory it is still possible to sniff
ssl traffic, but it's quite complex
decimation: not only does
ssl enable the fucktarded certificate crypto, it enables nefarious 'customized' behavior
ascii_field: and then comes the use of central server, and of
ssl mircea_popescu: curl: (35) error:14077410:
SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure
mircea_popescu: seems kinda contorted, the
ssl key is used to "secure" pgp'd info ?
jurov: no it uses stratum/
ssl but that's a tech detail
mircea_popescu: the only reasonable way to go forward at this point would be a) edit the source of the
ssl we intend to use to include a magic string ; b) make ; c) strings on the binary.
mod6: root@debian-test:~/release-test/bitcoin-v0_5_3_1/bitcoin/src# readelf -a bitcoind | grep -i
SSL mod6: yeah i get nothing from these: root@debian-test:~/release-test/bitcoin-v0_5_3_1/bitcoin/src# readelf -a bitcoind | grep -i
ssl mod6: asciilifeform: is there a definitive way to check the binary for which
SSL is linked in?
ben_vulpes: mod6: how does that dpaste indicate the system
ssl?
BingoBoingo: <thestringpuller> well only OpenSSL had heartbleed << The other big
SSL implementations had their own flaws unveiled in the following months that essentially accomplished the same insecurity.
assbot: Logged on 29-03-2015 16:49:24; Chillum: most protocols have had a vulnerability at some point. Heartbleed was a bug in openssl, not a bug in
ssl Chillum: a lot of routers don't even use
SSL jurov:
ssl spec is too complicated, hence inevitably buggy implementations
Chillum: most protocols have had a vulnerability at some point. Heartbleed was a bug in openssl, not a bug in
ssl Chillum: May I suggest that you describe your best practices so that people running this
SSL free code will know how to not do it wrong?
Chillum: So if I understand correctly
SSL was removed because if I need
SSL I am doing it wrong?
mircea_popescu: Chillum the problem is we know
ssl to be intentionally misimplemented. as you say, on layers.
Chillum: you can control the keys in
ssl. You don't have to use existing authority chains you can make your own
mircea_popescu: funkenstein_
ssl is for any application where security theatre is +ev and security itself doesn't matter.
Chillum: if you were not using a wallet then I agree
SSL is pointless
ben_vulpes: <Chillum> [14:55] In my opinion
SSL is not a turd to be ripped out << dude this is a something like 4 month long project going on here
Chillum: asciilifeform: nobody is disputing that
SSL has issues, but plaintext is not a better alternative
Chillum: I certainly did not mean to offend anyone by saying
SSL is not a turd, if this is a controversial statement I will keep it to myself
funkenstein_: sslsniff is a tool you can use to capture
ssl data
Chillum: It is clear I have stumbled into a religious debate. I have no more interest in changing your mind about
SSL than I do with you changing my mind. I will run
SSL on my bitcoind API if you don't mind.
funkenstein_: nokia was caught capturing all
ssl traffic through their networks at one point
mircea_popescu: "
ssl will stop all but the actual attacks you will encounter"
Chillum:
SSL will stop all but the most advanced of attackers
Chillum: so because
ssl has had problems it is better to use plain text?
Chillum: I think it should come with a big "NO
SSL" warning next to the download so people are not caught unaware
Chillum: I have worked in computer security for 15 years. While many implementations of
SSL host checking are flawed and the hierarchial trust model is a joke the underlying encryption is solid until some learns to find prime factors of large numbers easily.
Chillum: how is using plaintext instead of
SSL better?
Chillum: most
ssl vulnerabilities come from poor cert checking
pete_dushenski:
ssl provides much security theatre and little apparent security
assbot: Logged on 28-03-2015 14:56:34; Chillum: In my opinion
SSL is not a turd to be ripped out
Chillum: the bandwidth that goes through the API is so small that the
SSL module would be using a negligible amount of resources
Chillum: In my opinion
SSL is not a turd to be ripped out
☟︎ Chillum: really
SSL is not using that much horse power compared to the other stuff the client does
trinque: pete_dushenski: got the "
ssl everywhere" extension?
danielpbarron: i thought this is supposed to download a specific version of
ssl and use a local copy
mod6: x32 OpenSSL built: requires adding -m32 flag to ./Configure & setting: SSL_ARCH_TYPE=linux-generic32
nubbins`: sum total of changes: modify SSL_ARCH_TYPE to Darwin64-x86_64-cc
mircea_popescu: ahaha epic. no fucking wonder bitcoin-proto works on open-
ssl mircea_popescu: STACK_OF(X509_NAME) *SSL_load_client_CA_file(const char *file)