689 entries in 0.794s

decimation: asciilifeform: I assume you saw the sudden freakout over hilariously weak crypto implemented by spec in 
SSL?
 adlai: asciilifeform: the convenience of pgp with all the trustlessness of 
ssl!
 assbot: Logged on 03-03-2015 19:48:15; NewLiberty: 
SSL won't stop WCCP intermediaries or anyone with #enable (or better) in your path, but it keeps the lesser evils at bay.
 NewLiberty: 
SSL won't stop WCCP intermediaries or anyone with #enable (or better) in your path, but it keeps the lesser evils at bay.
 ☟︎ BingoBoingo: NewLiberty: Even if it wasn't hard to count on 
SSL for actual security.
 mike_c: he's done some cool stuff in the past.  most famous (at least to me) for some 
ssl mitm stuff he built.
 lobbes: So getting ZNC configured to use 
SSL ended up being a great 'introduction project' for learning some of the basics of linux. I would recommend to all the other n00bs out there
 herbijudlestoids: so far: squid, ldap, kerberos, djbdns, postfix, and today i finished setting up nginx and getting "A" score on the qualys 
ssl test
 ben_vulpes: punkman: asciilifeform proposed snipping the crypto routines out of 
ssl and dropping them wholesale into the bitcoind
 ben_vulpes: mod6, asciilifeform: forgive my naivte, but what's the recommended approach to efficiently toggling between versions of libs for compiling cturds? in particular, 
ssl for bitcoind.
 phillipsjk: A careful reading of the logs shows that mod6 was careful to use the pre-f revision of debian 
SSL.
 mod6: so far. it's really weird still though, because i wasn't having this problem before. and we've always been using an old 
ssl.
 ben_vulpes: what was the story with a certain version of 
ssl breaking some kinds of btc signatures?
 adlai: right. so this error means that somebody in the middle tried to downgrade our connection, and my 
ssl lib took a shit instead of complying?
 Naphex: TLS 1.2Yes / TLS 1.1Yes / TLS 1.0Yes  / 
SSL 3No / 
SSL 2No
 adlai: thank you btce! error:140943FC:
SSL routines:SSL3_READ_BYTES:sslv3 alert bad record mac
 jurov: it's just all lost cause. self-signed certs yes, but only after 
ssl/tls is ditched.
 davout: fluffypony: nice comment on the "blockchain onion gets an 
ssl cert" derpage
 Naphex: mircea_popescu: BTCXchange offered 
SSL Authenticated with GlobalSign.EU, the registration certificate was posted. And all due dilligance info posted
 dignork: punkman: yes, but in theory signed 
ssl cert provides some identity validation. Although the same can be achieved by gpg signed .onion address.
 punkman: "Creation of X.509 certificates has been improved.  It is now also     possible to export them directly in PKCS#8 and PEM format for use     on TLS servers." << anyone here tried to generate 
ssl certs with GPG yet?
 ben_vulpes: terminate 
ssl for me for 20 dollars a month" button than to...terminate it themselves. on a box they control.
 Naphex: this is how entropy use from /dev/random looks like on a 
SSL gateway (reasonable amount of connections/handshakes)
 Naphex: if you're doing cryptography work (
ssl, keys using randoms) and this value is below 200. you have a problem to fix, fast.
 mike_c: yes, that i agree with.  i thought it might be nice to have some  wallet software  available to the lower tier that doesn't phone home every time you open it and lose your coin everytime 
SSL gets probed.
 mircea_popescu: asciilifeform: ben_vulpes: so far i got qt and 
ssl snipped. mega-triumph! lol << weren't you supposed to work for nsa anyway!!1
 ben_vulpes: all of a sudden i want to rip 
SSL out as well
 mircea_popescu: devthedev: Bitcointalk: "Due to a recently-discovered flaw in the TLS and 
SSL protocols, you may want to change your password, especially if you accessed the forum using Tor." <<< what, tor isn't safe ? incredibru.
 devthedev: Bitcointalk: "Due to a recently-discovered flaw in the TLS and 
SSL protocols, you may want to change your password, especially if you accessed the forum using Tor."
 mircea_popescu: 1.0.1 server implementations for both 
SSL/TLS and DTLS regardless of
 assbot: Google Online Security Blog: This POODLE bites: exploiting the 
SSL 3.0 fallback
 mike_c: so this is it, 
SSL is dead now.  crazy.
 assbot: Free POODLE 
SSL Security Vulnerability Check | Tinfoil Security
 assbot: Google Online Security Blog: This POODLE bites: exploiting the 
SSL 3.0 fallback
 assbot: Google Online Security Blog: This POODLE bites: exploiting the 
SSL 3.0 fallback
 rithm: twitter bootstrap, godaddy 
ssl, c++ backend
 Apocalyptic: the 
ssl cert provided seems to be for *.battlequest.com
 cazalla: i didn't reg an 
ssl cert, the domain was dropped by qntra.com at some point i believe
 Apocalyptic: <Adlai> qntra.net seems to have some 
ssl issue? // just got the error
 kakobrekla: also is there a point in 
ssl if its optional
 Adlai: qntra.net seems to have some 
ssl issue?
 jborkl: ok, thank you I have been busy fixing all the 
ssl crap and forgot about everything else
 jborkl: I moved everything to 
ssl and it should all be green. You guys mind giving it a test and tell me if it all seems good
 mircea_popescu: "Who is sending 1000 BTC to a site with no 
SSL? Any why would anyone trust this site anyways? People are stupid or it's fake."
 decimation: yeah it's pretty much the same way that people think that 
ssl websites are the best practice in 'secure' data transfer
 fluffypony: where they got nailed for old nginx + broken 
SSL et.
 benkay: some of these sites have busted 
ssl configurations
 benkay: i guess ssl_verify might help...
 dignork: mircea_popescu: well, they are actually lying, for this to work, they either have to 
ssl-strip, or plant corporate CA in all their system
 mircea_popescu: "Now you can have visibility into all the encrypted 
SSL traffic on your networkat extremely high performanceso you can inspect it, identify potentially nefarious activities, and feed the intelligence to an ecosystem of security application vendorsall through Blue Coat."
 assbot: Blue Coat – Whats Your 
SSL Traffic Trying to Hide?
 assbot: Blue Coat – Whats Your 
SSL Traffic Trying to Hide?