log☇︎
4300+ entries in 0.33s
asciilifeform: but they ought not to complain when 'my tcp connections are blackholing' or 'someone derived my rsa privkey using known-ciphertext attacks' etc.
mircea_popescu: phf in practice, once tmsr-rsa is here, i'd expect to do exactly the "sling packets" thing
deedbot: http://phuctor.nosuchlabs.com/gpgkey/84FDD00AD2E5C818F1D9A7604EA5447CDA456A25B275975C62A2F1AEB4ED42C3 << Recent Phuctorings. - Phuctored: 126845615151026431976406479 divides RSA Moduli belonging to 'SlowFax <slowfax@googlemail.com>; '
a111: Logged on 2016-08-24 07:09 deedbot: http://phuctor.nosuchlabs.com/gpgkey/9D60710F34429805CA983E018B19C9D0400E3978C6A4F97721303D362A1E9941 << Recent Phuctorings. - Phuctored: 93717621124200192314145705948137075738570941668159058108077267463226172347789 divides RSA Moduli belonging to '189.203.72.147 (ssh-rsa key from 189.203.72.147 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+189.203.72.147@mkj.lt
deedbot: http://phuctor.nosuchlabs.com/gpgkey/839ABB69349BD78F784309DB89D871C3CA284C1EF0E060E1FF3A19BEB3882351 << Recent Phuctorings. - Phuctored: 93717621124200192314145705948137075738570941668159058108077267463226172347789 divides RSA Moduli belonging to '187.188.126.28 (ssh-rsa key from 187.188.126.28 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+187.188.126.28@mkj.lt
deedbot: http://phuctor.nosuchlabs.com/gpgkey/F97816E68FFBD245AD39F3509A34B16D8F193D91A6125903354AB4CB383548F3 << Recent Phuctorings. - Phuctored: 93717621124200192314145705948137075738570941668159058108077267463226172347789 divides RSA Moduli belonging to '189.203.181.149 (ssh-rsa key from 189.203.181.149 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+189.203.181.149@mkj
deedbot: http://phuctor.nosuchlabs.com/gpgkey/9D60710F34429805CA983E018B19C9D0400E3978C6A4F97721303D362A1E9941 << Recent Phuctorings. - Phuctored: 93717621124200192314145705948137075738570941668159058108077267463226172347789 divides RSA Moduli belonging to '189.203.72.147 (ssh-rsa key from 189.203.72.147 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+189.203.72.147@mkj.lt ☟︎
asciilifeform: for ip in `curl -s http://phuctor.nosuchlabs.com/phuctored | grep "ssh-rsa key from" |cut -d' ' -f23`; do timeout -k 0m 3s nc $ip 22 ; done
a111: Logged on 2016-08-24 01:49 asciilifeform: for ip in `curl -s http://phuctor.nosuchlabs.com/phuctored | grep "ssh-rsa key from" | cut -d' ' -f23`; do nc -w 5 $ip 22 ; done
asciilifeform: for ip in `curl -s http://phuctor.nosuchlabs.com/phuctored | grep "ssh-rsa key from" | cut -d' ' -f23`; do nc -w 5 $ip 22 ; done ☟︎
asciilifeform: meanwhile: curl -s http://phuctor.nosuchlabs.com/phuctored | grep "ssh-rsa key from" | cut -d' ' -f23 | sort | uniq
deedbot: http://phuctor.nosuchlabs.com/gpgkey/264C89BED70EDF1ABBD841805C2A3EF1275599C01C8601A53097FE0FE8F4524C << Recent Phuctorings. - Phuctored: 112272957310520557937287888630701884074400262312252660684746015492220368624387 divides RSA Moduli belonging to '177.234.1.73 (ssh-rsa key from 177.234.1.73 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+177.234.1.73@mkj.lt>; '
deedbot: http://phuctor.nosuchlabs.com/gpgkey/3F0F2B8C4D3CA8AB2E472F60F174C6C8FEE475C87E9B966190C9B8A80C02FC23 << Recent Phuctorings. - Phuctored: 112272957310520557937287888630701884074400262312252660684746015492220368624387 divides RSA Moduli belonging to '177.234.6.21 (ssh-rsa key from 177.234.6.21 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+177.234.6.21@mkj.lt>; '
deedbot: http://phuctor.nosuchlabs.com/gpgkey/24698AD72475BB28F25AD63CC626A01EC41AF82BC51BC4CB8118FC5B15BDF42E << Recent Phuctorings. - Phuctored: 109599797444024509787856438588803873233485202369776957423109401507256514201183 divides RSA Moduli belonging to '217.57.196.179 (ssh-rsa key from 217.57.196.179 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+217.57.196.179@mkj.l
deedbot: http://phuctor.nosuchlabs.com/gpgkey/A558B10A1CCC09194358E0502CAFA4415F57F1944DD9FE618E2A2E2D29EFAC0F << Recent Phuctorings. - Phuctored: 109599797444024509787856438588803873233485202369776957423109401507256514201183 divides RSA Moduli belonging to '217.57.196.177 (ssh-rsa key from 217.57.196.177 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+217.57.196.177@mkj.l
deedbot: http://phuctor.nosuchlabs.com/gpgkey/F7EE9D7418360EBF5222D566B0A5B811023AC29616EBC02A9EE52BDB5A00038A << Recent Phuctorings. - Phuctored: 109599797444024509787856438588803873233485202369776957423109401507256514201183 divides RSA Moduli belonging to '2.116.209.1 (ssh-rsa key from 2.116.209.1 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+2.116.209.1@mkj.lt>; '
deedbot: http://phuctor.nosuchlabs.com/gpgkey/700B8BCB736ABB90FBD44CF67F97D08BC607249723DCD55DBC2A7CD36C495D4E << Recent Phuctorings. - Phuctored: 29 divides RSA Moduli belonging to '71.39.252.162 (ssh-rsa key from 71.39.252.162 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+71.39.252.162@mkj.lt>; '
deedbot: http://phuctor.nosuchlabs.com/gpgkey/9B9B0ED6921A8C15003519B16DAED0FB79CB70782F178A4DD5CE5FBDCF85C47A << Recent Phuctorings. - Phuctored: 29 divides RSA Moduli belonging to 'Yumeomi Tanaki; '
deedbot: http://phuctor.nosuchlabs.com/gpgkey/609AF429A536FCA467F01F21DA23DA79C5663B50FCF17243C6AF812E8D86E222 << Recent Phuctorings. - Phuctored: 11077075678020735934526148020847970758896871547063037169613263824976154697682093654805709367957440110046911224501506446879317626764896123149439487419328499 divides RSA Moduli belonging to '183.246.69.24 (ssh-rsa key from 183.246.69.24 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on
deedbot: http://phuctor.nosuchlabs.com/gpgkey/92EF45902AD5DDD496F233A413911C8A77BF9FAB0F6605ACC1B305A87C863708 << Recent Phuctorings. - Phuctored: 11077075678020735934526148020847970758896871547063037169613263824976154697682093654805709367957440110046911224501506446879317626764896123149439487419328499 divides RSA Moduli belonging to '112.16.4.21 (ssh-rsa key from 112.16.4.21 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Fre
asciilifeform: http://phuctor.nosuchlabs.com/gpgkey/92EF45902AD5DDD496F233A413911C8A77BF9FAB0F6605ACC1B305A87C863708 ; Phuctored: 11077075678020735934526148020847970758896871547063037169613263824976154697682093654805709367957440110046911224501506446879317626764896123149439487419328499 divides RSA Moduli belonging to '112.16.4.21 (ssh-rsa key from 112.16.4.21 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Fr
deedbot: http://phuctor.nosuchlabs.com/gpgkey/609AF429A536FCA467F01F21DA23DA79C5663B50FCF17243C6AF812E8D86E222 << Recent Phuctorings. - Phuctored: 11077075678020735934526148020847970758896871547063037169613263824976154697682093654805709367957440110046911224501506446879317626764896123149439487419328499 divides RSA Moduli belonging to '183.246.69.24 (ssh-rsa key from 183.246.69.24 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on
asciilifeform: full control to make bad decisions. We hide Key IDs from the user, we don't use the words public and private, we never mention Key Signing or Keyservers, and we don't generate 8192 RSA keys. In this talk we give an overview over our different UX decisions, the reasoning behind them...'
asciilifeform: where the rsa-diddling is, etc.
asciilifeform: would mean that popping rsa is in P
mircea_popescu: so yes, vijay menon claimed in 2013 that his implementation of agrawal-kayal-saxena took 5k seconds for a 25 digit number ; and consequently we could expect as much as 1 minute/bit or cca 4k minutes for a tmrs-rsa key.
asciilifeform: 'Someone please prove me wrong, but I think there is a bug in the function mp_modexp_crt (RSA decryption and signing) in PGP23a's MPI library. Attached to this message is a program which demonstrates the bug. While testing Magic Money for lingering bugs, the client gave the error "Coin from server has bad signature!" I tried again with different coins, and the program worked. The proto.dat file had been cleared as the coins were rea
asciilifeform: ('pcp' was an early attempt, it appears, at a stateless and rsa-only pgp replacement)
a111: Logged on 2016-08-18 12:32 mircea_popescu: asciilifeform since we're on this btw, the way i want tmsr-rsa key generation to work is as follows : a contains a number of entropy bytes specified by user in tmsr-rsa.conf read whenever tmsr-rsa.conf specifies (such as urandom); b contains a base-tmsr string specified by user. c = base-tmsr(a).b ; p = nextprime(cut(sha512(c),257)) ; process is repeated for q = nextprime (cut(sha512(c'),258));
asciilifeform: 'RSA keysizes must be in the range 1024-4096' << ?!!!!
mircea_popescu: oh and also asciilifeform : e not to be provided by user. tmsr-rsa uses 0x010001 and that's that.
mircea_popescu: seems certain kock-rsa aka "gnupg" is getting uprooted.
mircea_popescu: asciilifeform sha512 and cut to be defined by user ; with the caveat that if they don't produce a min of 258 bytes / 257 258 bytes user is taking life in his own hands. we provide defaults (keccak , "take first nth bytes" respectrively). key size NOT to be defined by user ; tmsr-rsa keys are al 515 bytes long.
mircea_popescu: asciilifeform since we're on this btw, the way i want tmsr-rsa key generation to work is as follows : a contains a number of entropy bytes specified by user in tmsr-rsa.conf read whenever tmsr-rsa.conf specifies (such as urandom); b contains a base-tmsr string specified by user. c = base-tmsr(a).b ; p = nextprime(cut(sha512(c),257)) ; process is repeated for q = nextprime (cut(sha512(c'),258)); ☟︎☟︎☟︎☟︎☟︎
deedbot: http://phuctor.nosuchlabs.com/gpgkey/225ED2BD4112F1BF529CFB1D4D37A9DE03C198284C418AD85364A543BD795AAE << Recent Phuctorings. - Phuctored: 94498898625323854064565881858724834160435948913137983974021999533025286133157 divides RSA Moduli belonging to '177.234.1.91 (ssh-rsa key from 177.234.1.91 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+177.234.1.91@mkj.lt>; '
deedbot: http://phuctor.nosuchlabs.com/gpgkey/59CF09B5A54C07B13532A929E710A3DC31279D3683F660369BE64C0EAF77B7CB << Recent Phuctorings. - Phuctored: 94498898625323854064565881858724834160435948913137983974021999533025286133157 divides RSA Moduli belonging to '177.234.0.97 (ssh-rsa key from 177.234.0.97 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+177.234.0.97@mkj.lt>; '
deedbot: http://phuctor.nosuchlabs.com/gpgkey/225ED2BD4112F1BF529CFB1D4D37A9DE03C198284C418AD85364A543BD795AAE << Recent Phuctorings. - Phuctored: 94498898625323854064565881858724834160435948913137983974021999533025286133157 divides RSA Moduli belonging to '177.234.1.91 (ssh-rsa key from 177.234.1.91 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+177.234.1.91@mkj.lt>; '
asciilifeform: doing that for RSA, to make sure that the modulus does have
asciilifeform: generate(...) in rsa.c
mircea_popescu: anyway, seems proper tmsr-rsa will have to come sooner rather than later.
mod6: downloaded most RSA keys from a keyserver and tried to factor 1.9
mircea_popescu: yes, we're adjusting the meaning of rsa-crypto to explicitly not care, as discussed yest. but this is novel.
Framedragger: mircea_popescu: http://trilema.com/2015/more-factored-rsa-keys-and-assorted-other-considerations/#selection-467.207-467.303 << with regards to "may have", can't see how that could be a problem - would be non sequitur masturbation on my part for sure; but the selected text - "Some are not signed at all - which notably means that yes gpg will import, and yes gpg will use." - does gpg actually
mircea_popescu: nevertheless - we're fortunate, in that the job for eulora is for rsa only.
mircea_popescu: now asciilifeform if cs were well specified and well understood from usage ; i wouldn't be against making "key" ambiguous as to which of rsa, cs it is.
mircea_popescu: should we tomorrow move to cs crypto, there'd be no reason to "upgrade" "extant" rsa keys.
asciilifeform: but it do NOT see the win from letting any arbitrary bit of binary garbage pass itself off as a valid rsa key + userid set.
asciilifeform: in gpg it is rsa sig of all the bits in the turd other than itself.
asciilifeform: well, the way it is done in gpg (rsa sig of sha1) is indeed retarded
mircea_popescu: it's not "the sks server" that is retarded. is the concept of machine-spread rsa key that's retarded ; much in the way of "machine-generated trust", be it embodied in "dao" or "colored coins" or "safe bitbet" ☟︎☟︎
mircea_popescu: machine processes ; people spread/administer. that's rsa key lifecycle.
mircea_popescu: if your process can't detect rot, you can't use rsa.
asciilifeform: the e and the N. (in the case of rsa.)
mircea_popescu: asciilifeform ideally tmsr rsa, such as for eulora etc, uses a fp and armored base90 as above. so there!
mircea_popescu: yeah this entire "id of rsa key" thing needs a fix. i imagine sha512 of tmsr standard is the only way to go.
a111: Logged on 2016-08-01 19:47 deedbot: [Recent Phuctorings.] Phuctored: 126044733741731328742413066718552314382419228167112456334027928884317367999330241024168451126326383475145520025295451544372438227070210798265767098934250820341305937931860061514790268968891523470454082874208728274680634763462042122485524526243688604432591998753006364684812749745538152702859571396997177876337 divides RSA Moduli belonging to '<>&%"\${}`'deadbeef1; ' - http://phuctor.nosuchlabs.com/gpgkey/617706D7A6FC1817D01
asciilifeform: 'In the exceptional case of the Oberthur Cosmo Dual 72K cards, approximately 0.05% of the generated keys shared a specific value of prime q. The flaw was discovered in all three tested physical cards for both 512-bit and 1024-bit keys. The repeated prime value was equal to 0xC000...0077 for 512-bit RSA keys and 0xC000...00E9B for 1024-bit RSA keys. These prime values correspond to the first Blum prime generated when starting from the
jurov: "The Million-Key Question—Investigating the Origins of RSA Public Keys"
deedbot: http://phuctor.nosuchlabs.com/gpgkey/FBC53C4FC84FB6570CC9AACEE304CF6E13339C4581D517A786C30DABA3995874 << Recent Phuctorings. - Phuctored: 90055334522847202481312882334750017605897224759371784435327473584564809667943 divides RSA Moduli belonging to '177.234.13.179 (ssh-rsa key from 177.234.13.179 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+177.234.13.179@mkj.lt
deedbot: http://phuctor.nosuchlabs.com/gpgkey/62A0A5FF9984D126E11550FC9BAFE24C40A6B55F885AA428EFFDF4AF59405FC6 << Recent Phuctorings. - Phuctored: 90055334522847202481312882334750017605897224759371784435327473584564809667943 divides RSA Moduli belonging to '177.234.4.97 (ssh-rsa key from 177.234.4.97 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+177.234.4.97@mkj.lt>; '
deedbot: http://phuctor.nosuchlabs.com/gpgkey/FBC53C4FC84FB6570CC9AACEE304CF6E13339C4581D517A786C30DABA3995874 << Recent Phuctorings. - Phuctored: 90055334522847202481312882334750017605897224759371784435327473584564809667943 divides RSA Moduli belonging to '177.234.13.179 (ssh-rsa key from 177.234.13.179 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+177.234.13.179@mkj.lt
deedbot: http://phuctor.nosuchlabs.com/gpgkey/CEB08E08EEF3C71AEC185767B076C306E945E535BE55A8CAAAB9378A9F7CD4D1 << Recent Phuctorings. - Phuctored: 5683000818959356094387121433230433 divides RSA Moduli belonging to 'Andreas Fleig <andreasfleig@googlemail.com>; '
mircea_popescu: anyway : the rsa/otp scheme is also bw-wasting, up to a factor of 2 if no hashing, or otherwise depending on how many hash passes, with 20 it's just 1.05 ie 5% more bw etc.
asciilifeform: the only aspect of rsa that actually takes palpable time on a modern box is key gen.
asciilifeform: mircea_popescu: 'rsa the actual message back and forth' << not same. for instance, if you have the pump going at all times, it can be cache-local.
mircea_popescu: asciilifeform you understand that if you never hash them, you might as well not use them at all and simply rsa the actual message back and forth. as appealing as the idea is in theory, it's not workable in practice because even with a game as relaxed as eulora, it'll still be too laggy.
asciilifeform: PeterL: mircea_popescu's original suggestion was to transfer properly random messages, via rsa, continuously, thereby keeping a supply of otp warm on both sides
ben_vulpes: actually greenwald schmeenwald you backed *anyone* who suggested the use of anything other than RSA.
a111: Logged on 2016-08-06 18:43 deedbot: [Recent Phuctorings.] Phuctored: 12162511443944070773219991934677582698468209730498855355911521948607449303537567609416882598773485743668093728963053579135929514188223460244897500435488727 divides RSA Moduli belonging to '197.221.61.38 (ssh-rsa key from 197.221.61.38 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+197.221.61
a111: Logged on 2016-08-06 19:01 deedbot: [Recent Phuctorings.] Phuctored: 12162511443944070773219991934677582698468209730498855355911521948607449303537567609416882598773485743668093728963053579135929514188223460244897500435488727 divides RSA Moduli belonging to '197.221.61.38 (ssh-rsa key from 197.221.61.38 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+197.221.61
deedbot: [Recent Phuctorings.] Phuctored: 12162511443944070773219991934677582698468209730498855355911521948607449303537567609416882598773485743668093728963053579135929514188223460244897500435488727 divides RSA Moduli belonging to '197.221.61.38 (ssh-rsa key from 197.221.61.38 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+197.221.61.38@mkj.lt>; ' - http://phuctor.nosuchla ☟︎
deedbot: [Recent Phuctorings.] Phuctored: 12162511443944070773219991934677582698468209730498855355911521948607449303537567609416882598773485743668093728963053579135929514188223460244897500435488727 divides RSA Moduli belonging to '197.221.63.150 (ssh-rsa key from 197.221.63.150 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+197.221.63.150@mkj.lt>; ' - http://phuctor.nosuc
deedbot: [Recent Phuctorings.] Phuctored: 12162511443944070773219991934677582698468209730498855355911521948607449303537567609416882598773485743668093728963053579135929514188223460244897500435488727 divides RSA Moduli belonging to '197.221.61.38 (ssh-rsa key from 197.221.61.38 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+197.221.61.38@mkj.lt>; ' - http://phuctor.nosuchla ☟︎
asciilifeform: soooo, http://trilema.com/2016/eulora-forward-looking-statement-august-2016 << 'From a technical perspective, the RSA migration is intended to work on the following scheme : RSA privkey is generated correctly ; this key and the server's key are used to pass OTPs between client and server' is fundamentally Right Thing.
asciilifeform: also holy FUCK is pig-wrestling a waste of time, http://security.stackexchange.com/questions/89713/offline-rsa-strong-prime-test-similar-to-phuctor#comment247283_89715
deedbot: [Recent Phuctorings.] Phuctored: 13118913265992357713749906968914856459229448329385353928317865240153186990772616410386066804476994406481496060266687741570826925431077185850750051547683307 divides RSA Moduli belonging to '112.16.65.245 (ssh-rsa key from 112.16.65.245 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+112.16.65.245@mkj.lt>; ' - http://phuctor.nosuchla
deedbot: [Recent Phuctorings.] Phuctored: 13118913265992357713749906968914856459229448329385353928317865240153186990772616410386066804476994406481496060266687741570826925431077185850750051547683307 divides RSA Moduli belonging to '112.16.65.247 (ssh-rsa key from 112.16.65.247 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <sshscan-queries+112.16.65.247@mkj.lt>; ' - http://phuctor.nosuchla
a111: Logged on 2016-08-05 00:40 mircea_popescu: "Testing RSA keys after generation is a fool's quest. This is a nice thing to do to detect some poor implementations, not poor keys. Moreover, it detects only certain classes of poor keys (specifically, those with small factors). It does not detect poorly seeded RNG used in an otherwise correct RSA private key generation." << god i love reading year-old webwisdom/community consensusi.
mircea_popescu: "Testing RSA keys after generation is a fool's quest. This is a nice thing to do to detect some poor implementations, not poor keys. Moreover, it detects only certain classes of poor keys (specifically, those with small factors). It does not detect poorly seeded RNG used in an otherwise correct RSA private key generation." << god i love reading year-old webwisdom/community consensusi. ☟︎
asciilifeform: fromphuctor: http://btcbase.org/log/2016-08-03#1513678 << example of rsa key generation, as seen in gpg ☝︎
asciilifeform: an rng firing blanks and leading rsa key gen to spit out the square of a prime immediately following a power of two, is simply one way to arrive at such.
fromphuctor: I know that, it works well only on non-properly-generated rsa modulus, which is easily factorizable by 2^x -1
asciilifeform: fromphuctor: in case you didn't know - fermat's method is not an effective way to attack a properly-generated rsa modulus
asciilifeform: ' A common way to speed up the calculation of RSA signatures is an algorithm based on the chinese remainder theorem (CRT) that splits it up into two smaller calculations. However if one of these calculations goes wrong an attacker can learn the private key. Last year Florian Weimer observed that various devices had this error and he could extract their keys. He recently mentioned...'
asciilifeform: ' I just discovered a somewhat similar issue in Nettle. They switched their RSA implementation from GMP's mpz_powm() function to mpz_powm_sec(), which is supposed to be sidechannel resistant. However mpz_powm_sec() is no drop-in replacement. Unlike mpz_pown() it doesn't accept even moduli and crashes with a floating point error. Therefore when trying to use a specifically crafted RSA key with an even modulus this will crash. '
deedbot: [Recent Phuctorings.] Phuctored: 17407531760166155857697 divides RSA Moduli belonging to 'Ismael de Moura Costa (email pessoal) <ismaelcosta@unb.br>; ' - http://phuctor.nosuchlabs.com/gpgkey/7ED61BA9F1483495BAB2CB60A5C9BE858F5C2B37C9856BDEE024A8C5518EB421
mircea_popescu: it just doesn't actually speak to the foregoing. i suppose the correct rsa implementation comes with a kernel patch.
mircea_popescu: when we reimplement rsa plox : a) either p length odd and q length even or vice-versa ; b) neither within 1 of a lattice power
mircea_popescu: asciilifeform btw re the fermat discussion, i wonder if anyone ever did a proper review of rsa code for lattice and fermat-closeness weakness in p,q generation.
nosuchlabswww: Not trying to spam. Check out qntra dot net. Fourth article down is about rsa and brought me here. Good read and new article.
fabio__: your said "fabio__ rsa has the advantage that it's the simpler solution."
mircea_popescu: you mean, "alternatives for rsa are not worth contemplating" ? sure, they are, much like anything's worth contemplating. it's educative if nothing else.
fabio__: so in your mind, new comers are not worth considering RSA unless they are equivalent in complexity or simpler. and until RSA is broken no need to migrate? <-- is this fair?
mircea_popescu: if someone breaks rsa you have all sorts of other problems to contend with.
mircea_popescu: fabio__ rsa is not breakable in the "shit someone broke openssl" sense you seem to be thinking of.
fabio__: so in your mind, new comers are not worth considering RSA unless they are equivalent in complexity or simpler. and until RSA is broken no need to migrate?
asciilifeform: it is, for instance, not proven that rsa reduces to difficulty of factoring integers, or what complexity class factoring is in.
mircea_popescu: fabio__ rsa has the advantage that it's the simpler solution. i thought i said this before.
nosuchlabswww: Not really. Just read about phuctor and the square rsa keys and shit.
fabio__: you use rsa