58 entries in 0.956s
zx2c4: another advantage of
DH over RSA is that ECDH allows for really short and sweet keys
zx2c4: KEMs like RSA are more complicated to implement in as few round trips as
DH-based protocols
mircea_popescu:
http://btcbase.org/log/2017-08-22#1701966 << more importantly, and more subtly, it sells you on the notion that "
dh is a prerequisite for handshakes", which happens to be false. for one thing, you can shake a friend's hand without the usg being involved. for another, gossipd does not use
dh for handshake. in short, the usgtardian nonsense is always there to distract you while it implants simpler points deep into the reptile b
☝︎ spyked: valentinbuza, to exemplify asciilifeform's point ^ I shall quote from the docs: "A Noise protocol begins with two parties exchanging handshake messages. During this handshake phase the parties exchange
DH public keys and perform a sequence of
DH operations" <-- this requires me to import a couple of concepts: handshake messages,
DH public keys, there may be others along the line. now, given that my crypto brain-memory module is not
spyked: valentinbuza, "Noise is a framework for crypto protocols based on Diffie-Hellman key agreement. Noise can describe protocols that consist of a single message as well as interactive protocols." in what's a tradition here,
http://btcbase.org/log-search?q=dh I'll let the more knowledgeable ppl hammer it.
a111: Logged on 2017-07-10 19:50 asciilifeform: mircea_popescu: this'd be an interesting adjunct to the
dh tests even.
Framedragger: i don't recall but i believe you can define ~all the params for
DH key exchange in ssl, i think
mod6: <+asciilifeform> mod6, mircea_popescu : no word from the
dh d00d, eh << tbh, I haven't even reached out myself yet.
mod6: Update: Moving on to FG #2. Will collect just over 1.0 Gb and then do ent/
dh tests.
mod6: I'm also running ent/
dh against 1.2Gb of collected fg entropy, but this time I did it with: `dd iflag=fullblock if=/dev/ttyUSB0 of=fg1.fg4.bin`
mod6: third collection of ~1Gb of entropy is complete from my first fg. running ent &
dh now...
mod6: I'm going to collect one more 1Gb+ from this 1st FG, run the ent &
dh again, and then move on to the next one. Results should be done in ~24hrs.
mod6: running ent &
dh on the output file. this was produced from the same fg unit that the blog was covering.
mod6: <+asciilifeform> NOW if it happens with all of the units in mod6 's parcel, and ~every~ run -- then problem. << this is key too. i'll perhaps collect another 1Gb+ a few more times from that initial first one and report back on the ent/
dh results too.
mod6: i'll be testing the other ones and will report back how the ent/
dh results look on each.
mod6: anyway, just wanted to be /sure/ that I wasn't getting some sort of varient test results from the
dh.
mod6: I re-ran the
dh on the same fg.bin file (~1.2Gb) and the 'WEAK' tests were exactly the same ones, with exactly the same output values.
a111: Logged on 2017-01-26 22:42 asciilifeform: 'There is a carry propagating bug in the x86_64 Montgomery squaring procedure. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against
DH are considered just feasible (although very difficult) because...
Framedragger:
DH exchange gets temporally split, so to speak
mircea_popescu: 4. Long-term answer: don't use RSA. RSA is well on its way to obsolescence. Most problems you'd ever want to solve with RSA are better solved with Curve25519 (for
DH) and Ed25519 (for signing). Not coincidentally, these are the algorithms implemented by Nacl, the only crypto library you should consider using.
ascii_butugychag: 'Perfect Forward Secrecy (PFS) by means of ECDH or
DH Kex ... opmsg builds fine with any of the OpenSSL, LibreSSL and BoringSSL...' << i've read enough.
BingoBoingo: "Remove disabled (weakened export and non-ephemeral
DH) cipher suites from the cipher list. This reduces code size, saves data segment space and prevents them from being turned back on at runtime by flipping a bit in memory."
Naphex: if i have to deliver
DH/GPG secret to the client for GAuth
mikaeldice: How can I confirm and test (on the endpoint) the connection to the
DH?
mod6: bouncy-castle is this lib that is available for use, which works fine with RSA but when it comes to
DH/DSS or DSA/ElGamal no worky.
Scrat: most standard web setups use ephemeral
DH keys nowadays
gribble: Nick 'Bane_Capital', with hostmask 'Bane_Capital!~clown@r74-192-154-88.gtwncmta01.grtntx.tl.
dh.suddenlink.net', is not identified.