39100+ entries in 0.263s

avgjoe: hello, can
i ask why deedbot doesn't send me the challange to solve? instead it tells me that
i should not up myself
BingoBoingo: <ben_vulpes>
i have been seduced into liking sugary delights! << It's scarcely been more than a month since a fractional alfajore gave you sugar shock
ben_vulpes:
i was halfway expecting to see the classic machinegeneratedliquishit objections
ben_vulpes: experiments from the kitchen, im sure more variants with chocolate will appear as soon as
i mention the idea
mircea_popescu: hey,
i didn't think
i even liked girls, as a 14yo. people get strange ideas in their heads.
ben_vulpes:
i have been seduced into liking sugary delights!
ckang: lol
i try and connect people ;)
zx2c4:
i need to head out for a bit now
zx2c4:
i dont have enough exposure to ada to say for certain. how come?
zx2c4: unlikely that'd make it upstream if
i did wireguard that way, but neat that that's possible
zx2c4:
i suppose your point is that you _could_ choose to obscure the lengths of the messages youre sending back? whereas with zero that isnt a possibility?
mircea_popescu: zx2c4 is this constant time ecc implementation on display somewhere btw ?
i don't think
i ever saw one before.
mircea_popescu: in any case, cryptography comes in two sorts : sort a), known here as "this must be secure, it's so confusing to me", and sort b). the moment you say "
i can't see what this gives attacker" you force-shove yourself in group a. it's not your business to know the attacker, that's the whole fundamental philosophy of ciphering, that you do not need to know the attacker.
mircea_popescu: because
i can turn a 31 message into two 15 messages or back ; but
i can't turn 0 messages into anything else.
zx2c4: mircea_popescu: an attacker can also distinguish between a length 15 message and a length 31 message.
i still maintain this doesnt give an attacker anything useful
mircea_popescu: well, for instance, if
i know six nodes in your network and know asciilifeform uses at most two, and
i see those are not transmitting,
i know he's asleep and send the titassassins.
zx2c4: there _are_ attacks, on say voice compression algorithms, which can gather some information from having precise sizes alone, which is why things are padded to nearest 16. but
i dont see what would be gathered by what youre suggesting
mircea_popescu: why am
i held to explain how a protocol breach can be elevated to arbitrary height ? the attracker FIND SOMETHING
mircea_popescu: so wouldn't it make sense for me to send 8 whether
i have anything to say or not ?
mircea_popescu: and if my slut eve in the other room is listening in, she can distinguish the case where
i sent 0 from the case where
i sent 8 ?
zx2c4: no,
i dont think sending a random string would make it more secure
zx2c4: because all
i need is the valid authtag/nonce.
i dont have any actual content to put in there
zx2c4: in this case, its important that you send me a keepalive, so that
i know you at least got it. however, these keepalives arent persistent. if subsequently,
i have nothing more to say to you, then we both go silent and dont say anything.
zx2c4: every time
i send you something,
i expect to hear back from you. if
i dont hear back from you, then something bad has happened,and
i should start over with a new handshake. my way of hearing back to you might be in the natural sense --
i send a TCP SYN, you send me back a TCP ACK -- or it might be the case that you actually just have nothing to send back to me. you got my message just fine, but really just cant think of anything to say back to me.
zx2c4:
i remember asking for this on the mailing list at some point
zx2c4: Noise is from Trevor Perrin.
I've been very involved in contributing to the project though (
i mentioned at the end of the specification)
a111: Logged on 2018-04-12 09:42 spyked:
http://btcbase.org/log/2018-04-12#1796749 <-- that's probably my thing,
I've been playing with it for the last two weeks or so,
I have it in a loop grabbing feeds from republican blogs.
mircea_popescu:
http://btcbase.org/log/2018-04-12#1796976 << you know me. he doesn't know you. this makes all the difference in the world --
i can whip my slavegirls into shape because they ~love me~. people without this benefit are stuck going at snail speed, which is why "education" in the unsexualized way it's implemented publicly does not work. it couldn't fucking work.
☝︎ mircea_popescu: speaking of which and ben_vulpes boyhood dreams, ssto and so on :
i dreamt last night that someone actually managed to create that true wunderwaffen material, the composite/ceramic with higher tensile strength than steel, but negligible caloric conductivity. making some iiiincredible jet engines.
mircea_popescu:
i think if you have not enough in your wallet it drops it silently ; and if the payment's not processed yet you might have nothing in your wallet yet.
zx2c4:
i wonder if that verification worked
i just posted
zx2c4: if you guys wind up using wireguard for part of your infra and want to support wireguard for a year,
i'm always looking for large donations, etc. not sure if that's what deedbot is for exactly but that would be quite the nice deed
zx2c4: no, not at all. im also not quite sure what to do with these pgp encrypted blobs
i cant decrypt
zx2c4: asciilifeform: oh, okay. im happy to keep going though. and if you want to be uncivilized, ill gladly accept any harshness you want to throw my way.
i dont scare easilyt
zx2c4:
i tried registering my key privately to deedbot but it didnt respond
zx2c4:
i havent compiled a list of Name+WrittenReview. maybe
i should do that
☟︎ zx2c4:
i dont think they post the reviews? except that it was "accepted" to the conference
zx2c4:
i dont think hmac-md5 is anywhere near broken, actually.
zx2c4:
i'd be surprised to see all 20 rounds of chacha broken
zx2c4:
i'm pretty sure there's no conspiracy
zx2c4: if you're interested in crypto primitives in wireguard in general,
i can give you an overview of our implementations. the hacl and fiat code is not the only code we have in there
zx2c4:
i dont own any via 2000 hardware to test on
zx2c4: asciilifeform:
i haven't been able to observe any non-constant time multiplications on intel in that code
a111: Logged on 2018-02-17 04:22 asciilifeform: mod6:
i will share my current hypothesis : all current intels have MUL leakage
zx2c4:
i can check for you one sec
zx2c4: (
i've got a project going on right now to rewrite that actually)
zx2c4: ive got some more design properties to enumerate if you'd like, but
i can answer your direct questions too
zx2c4: asciilifeform:
i agreed to stick around for 2 hours. worry not. :P
zx2c4: asciilifeform: oh cool.
i havent seen this ill take a look
zx2c4: indeed.
i guess you could call the property 'stealthiness'
zx2c4: then on top of that
i wanted a few nice properties:
zx2c4: wireguard is supposed to be implementable using simple algorithms with as small of a state machine as possible, so that the code size and complexity is kept at a minimum. in otherwords, it aims to be easily auditable so that people can actually read it and feel confident that it doesnt have horrible vulnerabilities. with massive codebases and highly complex designs like openvpn or ipsec, this obviously isnt possible. so with wireguard
i was trying
zx2c4: are you interested in learning about the security properties
i had in mind when designing wireguard?
zx2c4: it's small, minimal, has the flexibility to be exactly what
i needed and nothing larger. makes conservative choices. fits into the security model
i was aiming for with the implementation properties
i was looking for.
i was also involved with noise from very early on, so several concerns and needs
i had with wireguard got factored into noise. and since noise is a very interesting framework, it's now receiving much needed academic attention in