log☇︎
471300+ entries in 0.261s
bad_duck: hmm, mine has, things like that :
danielpbarron: my log doesn't have this UpdateTip thing
bad_duck: danielpbarron: dependd if the node is running for a long time, it has it after the initial sync (and some missing / wrong poing after downtime when resync / getting last blocks)
danielpbarron: i don't think debug.log would give you the info you want
bad_duck: danielpbarron: anyway I want some more data so I'm looking for someone who is listening the network for a long time / has logs
danielpbarron: remember to copy it into a different location
bad_duck: danielpbarron: yes, I have this info in my debug.log but my node is only running for 1-2 months...
bad_duck: danielpbarron | data signed by WoT members <-- I hope to find a "relyable" person, but yes I'll have to trust him
danielpbarron: does debug.log record the date from the block? or the time on my computer when the block was relayed?
funkenstein_: bad_duck, if you can't rely on the timestamps on the blocks what timestamps can you rely on?
bad_duck: Hi, maybe someone could help me here..? ( http://www.reddit.com/r/Bitcoin/comments/36p1i8/looking_for_some_data_about_time_between_blocks/ ) tl;dr -> I'm looking for some data about time between blocks (cannot rely on timestamps in blocks), if someone has some logs / know where to find this? thx!
trinque: do I understand correctly that you use a "signing key" to sign your various subkeys, thus associating them with one identity?
trinque: and aside that, may the words should, associated, and all other "ignore the gap" terms be put to the spike
danielpbarron: https://twitter.com/infinitechan/status/601176574713569280 >> Load balancer crashed. I asked datacenter for assistance with it. It apparently overheated, fan might be broken. More updates to come. ☟︎
BingoBoingo: mircea_popescu: tbh, someone has to explain this "subkeys" retardation to me sometime. fucking pseudohierarchy devoid of meaning. << Within your big GPG keyblock you can have multiple keys, say a 4096 RSA for signing and another 4096 to encrypt to. Beyond that you can keep stuffing moar keys in there just because...
danielpbarron: Bram Cohen: It's difficult for me to convey just how profoundly idiotic the BitShare mining chip is.
Apocalyptic: isn't that just a primality test ?
mircea_popescu: for some reason i was thinking you're doing rabin-miller
mircea_popescu: mind trying lenstra ?
mircea_popescu: (not saying it's likely the case, anyway)
Apocalyptic: oh, you mean that
mircea_popescu: no, you run it multiple times because it's probabilistic.
Apocalyptic: well that's why you run it multiple times
mircea_popescu: depends a lot on the rng too
Apocalyptic: after 430 runs the probability of error is something like 1/e if I remember and if this doc is correct
Apocalyptic: I will post a report if it leads to something, or if somebody wants it
Apocalyptic: I do count them
mircea_popescu: Apocalyptic you know it'd be halpful if youactually counted them / documented the attempts
Apocalyptic: I guess i'm gonna have to keep increasing it for a while
Apocalyptic: mircea_popescu, rho pollard plus countless iterations of ECM for reasonable bounds assuming there is a 20-30 prime digit factor in the modulus reminder
Apocalyptic: I suppose it's the same as the master one though, so this situation can't happen since e is itself a prime
Apocalyptic: asciilifeform, somehow pgpdump refuses to print info about the invalid subkey, or at least I don't see the keyid referenced the way I see it for the master key and the signature packets
mircea_popescu: Apocalyptic what have you tried ?
mircea_popescu: jurov something like that.
jurov: i stand corrected, it's not this one
jurov: but if i'm ever getting into such uber-illegal territory, i'm not advertising it here
ascii_field: what of the baseband ? ☟︎
jurov: 's got a "new" n900... after just a few hours it's clear why nokia had to be gutted
ascii_field: Apocalyptic: look at the e
Apocalyptic: and as such there is no private to even begin with
Apocalyptic: I guess maybe e isn't even prime with phi(N) on those
ascii_field: and the purpose was to force the victims to revert to plaintext
ascii_field: for all we know, this is a straight 'dos' and no one actually knew the privates to these
Apocalyptic: well given what i've tried on that HPA's i would not fully concur here
ascii_field: the authors of the fakes also relied on the 'plausible deniability' of using random crud rather than proper mods
ascii_field: Apocalyptic: as a general rule, an rsa modulus generated without regard to rules (primality testing, pollard-rho, the lot) is cheap to factor.
Apocalyptic: ascii_field, this may be more affordable to fully factor than HPA invalid's
fluffypony: yeah I know, but neither of us are terribly au fait with it, so we'll just dip our toe in;)
fluffypony: and then we'll probably do the Louvre because we haven't been in AGES
davout: ah you took her with, nice!
fluffypony: I need to tweak the presentation a bit, so the wife will go to the spa for a couple of hours
davout: fluffypony: what are you keeping yourself busy with tomorrow? visiting?
davout: fluffypony: neat! never been there
trinque: https://www.sqlite.org/wal.html << I think this helps
jurov: GNU picked it up then
jurov: someone has to explain this "subkeys" retardation << guess mr.zimmermann overengineered it and then left to rot
trinque: ah yeah I guess it's bad at concurrent writes; that's fair
trinque: probably comes with comparisons to key-value stores that do barely anything aside retrieve by key
trinque: sure, I am saying I've personally never found sqlite3 to be slow
ascii_field: trinque: was going for 'simple' rather than 'fast'
trinque: I wonder if anyone ever tests this hypothesis
mircea_popescu: they're all keys. how you package them is irrelevant
Hasimir: I recognise most of the names
mircea_popescu: tbh, someone has to explain this "subkeys" retardation to me sometime. fucking pseudohierarchy devoid of meaning.
Hasimir: well, that list 160 reads like regular posters to the enigmail mailing list
ascii_field: Hasimir: read carefully. we do not know where they came from. but the largest class we identified so far appears to consist of carefully crafted spurious keys, made with a particular transformation of original legit ones.
Hasimir: do they all have subkeys or not?
mircea_popescu: at least two, maybe three different types so far
Hasimir: and v2 keys == pgp 2.3 to pgp 2.6(i)
mircea_popescu: they're not even all in the same class.
Hasimir: ok, these weak ones you found, have you identified a common generation program?
Hasimir: but then we should probably lose them anyway
ascii_field: no thanks.
Hasimir: though you'll lose all the v2 keys
Hasimir: yeah, you might want to look at the keybox (.kbx) format used in gpg 2.1, designed to improve lookup speed with larger keyrings
ascii_field: Hasimir: whole thing was ~2 days' work
Hasimir: though probably better than the sks solution
Hasimir: ascii_field, where's the code you use to run these tests anyway?
mircea_popescu: oh, is it rebuilding the P huh ascii_field
mircea_popescu: there's no such thing as a retest
mircea_popescu: that'd be the sadness of all time.
ascii_field: at least this.
ascii_field: were all of them even odd, lol
ascii_field: mircea_popescu: quite a few. which is consistent with the 'random bits make terrible rsa moduli' thing.
mircea_popescu: ascii_field some that had only broken moduli, in pairs.
ascii_field: i will be very surprised when a 'proper' pubkey that some fella actually has on his own box, fails the test
mircea_popescu: Hasimir just put the pubkey in the box and it'll tell you if it has or hasn't
ascii_field: Hasimir: add it to the queue
mircea_popescu: Hasimir if it's been already processed you can see yourself the result
Hasimir: alright then, take a crack at mine, same one as used with -otc and in my /ns info
ascii_field: and the panic is entirely the work of the enemy, who is passing around the idiot strawman that 'rsa was broken. oh wait, no it wasn't! disregard the whole thing!'
mircea_popescu: Hasimir you have read the paragraph at the beginning yes ?
ascii_field: Hasimir: so far each of the cases i have examined in detail had -at least one- legit rsa modulus in subkeys
assbot: Logged on 20-05-2015 11:53:36; *: mircea_popescu underscores the ~probably~. it is not a certainly. not yet at least. moar uranium has to be mined first.
Hasimir: which is why you need to specify the key ids, otherwise you're spreading unnecessary panic
ascii_field: Hasimir: the shenanigans exposed appear to have an intent which includes - but not necessarily limited to - passing off spurious rsa keys for various names
mircea_popescu: two examples are given there, each with two moduli with 8-12 digit factos known
mircea_popescu: now, of that list, at least some are thoroughly broken
Hasimir: as all the president@whitehouse.gov ones prove
mircea_popescu: what's one to do ?