kuketzblog, to android German
@kuketzblog@social.tchncs.de avatar

Android: Der Beitrag stellt die Vorbereitung des Testgeräts sowie Werkzeuge (Frida, Magisk) zur Analyse des Datensendeverhaltens von Apps vor. Reinschauen! ✌️ 👇

https://www.kuketz-blog.de/in-den-datenstrom-eintauchen-ein-werkzeugkasten-fuer-analysten-von-android-apps/

pitrh, to security
@pitrh@mastodon.social avatar
br00t4c, to random
@br00t4c@mastodon.social avatar
kubikpixel, (edited ) to linux German
@kubikpixel@chaos.social avatar

Wait wat, a pure Bush script is a web client!? 😲

»A minimal TLS 1.2 implementation in a pure Bash script:
bash_tls implements TLS well enough to make a simple HTTPS request to most web servers.«

🧑‍💻 bash_tls
https://github.com/gh2o/bash_tls


#tls #https #bush #script #webserver #hack #linux #http #webservice #web

sergi, to random
@sergi@floss.social avatar

Please, don't ever let you company adopt Netskope. I'm constantly running into websites wrongly categorized and getting warnings about if I want to proceed.

Plus, they hijack the TLS certificates which makes software development a hell. You need to manually config each of your CLI tools to trust a special set of "Netskope certificates" to have the chain work.

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

Merely saying 'We speak a secret tongue' is not enough. One's wizards must speak the appropriate tongue, and speak it only in a most cautious fashion. https://cromwell-intl.com/cybersecurity/ssl-tls.html?s=mc

conansysadmin, to linux
@conansysadmin@mstdn.social avatar
conansysadmin, to linux
@conansysadmin@mstdn.social avatar
dec_hl, to VintageOSes
@dec_hl@mastodon.social avatar
metabrainz, to random
@metabrainz@mastodon.social avatar

Yet another tale of shitty companies ripping off little charities. This time it’s SSL*com who have enriched themselves.

If you are with SSL*com for your SSL/TLS certificates:

  1. Check your invoices for extra charges
  2. Swap over to the nonprofit Let’s Encrypt!


https://blog.metabrainz.org/2024/04/23/ssl-com-is-evil-and-deceptive-dont-do-business-with-ssl-com

conansysadmin, to opensource
@conansysadmin@mstdn.social avatar

By consulting the proper documents, one may speak a secure and secret tongue. https://cromwell-intl.com/open-source/google-freebsd-tls/tls-certificate.html?s=mc

conansysadmin, to FreeBSD
@conansysadmin@mstdn.social avatar
conansysadmin, to FreeBSD
@conansysadmin@mstdn.social avatar
GrapheneOS, to random
@GrapheneOS@grapheneos.social avatar

SSL Labs (https://www.ssllabs.com/ssltest) from Qualys used to be a useful HTTPS testing tool. However, it hasn't received significant updates since 2019 and is now holding back HTTPS security. The biggest issue is that many of the tests don't support TLSv1.3 so it penalizes disabling legacy TLSv1.2.

dboehmer,

@GrapheneOS Good to know. Thanks for the heads up! 👍

Can't we have a version of SSLlabs? Sounds like generally desirable for the whole industry and likely to receive Merge Requests once established. I think many updates would be mere changes of opinions about recommended settings.

conansysadmin, to linux
@conansysadmin@mstdn.social avatar
fell, to SmartHome
@fell@ma.fellr.net avatar

I stopped messing with client certificates and went back to good old HTTP basic authentication for my little digital light switch panel.

It's a shame nobody cares about TLS client certificates. With a bit more effort we could've gotten rid of passwords a long time ago.

I wish there was something like SSH keys for the web.

Yeah I know, Passkeys are a thing... but also not really.

jbr_IC, to random German
@jbr_IC@social.tchncs.de avatar

Für Leute, die eigene Server betreiben und mal Klarheit bei der vorliegenden benötigen, können es hiermit testen.

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL , protocols as well as recent cryptographic flaws and more.

https://testssl.sh/

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

Merely saying 'We speak a secret tongue' is not enough. One's wizards must speak the appropriate tongue, and speak it only in a most cautious fashion. https://cromwell-intl.com/cybersecurity/ssl-tls.html?s=mc

conansysadmin, to linux
@conansysadmin@mstdn.social avatar
shaft, to random French
@shaft@piaille.fr avatar

Je viens juste de me rendre compte que n'était pas activé sur mes 2 serveurs faisant autorité acceptant les requêtes via (chiffrement opportuniste, les certificats sont auto-signés — mais vérifiables via /TLS). J'étais donc en (léger) froid avec la section 4.1 du RFC 9210 (aka BCP 235) :

servers SHOULD enable TFO wheb possible”

Sachant que là, c'était possible.

wyri, to Rabbits
@wyri@haxim.us avatar

Getting close to a full green running fully on @reactphp. There is one / test left to resolve before this will become the base for 0.6.x.

conansysadmin, to opensource
@conansysadmin@mstdn.social avatar

By consulting the proper documents, one may speak a secure and secret tongue. https://cromwell-intl.com/open-source/google-freebsd-tls/tls-certificate.html?s=mc

ainmosni, (edited ) to random
@ainmosni@berlin.social avatar

Do you, or any place you work with, still pay for ?

Boosts appreciated for reach.

conansysadmin, to FreeBSD
@conansysadmin@mstdn.social avatar
conansysadmin, to linux
@conansysadmin@mstdn.social avatar
  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • mdbf
  • magazineikmin
  • Youngstown
  • thenastyranch
  • rosin
  • slotface
  • vwfavf
  • ngwrru68w68
  • PowerRangers
  • kavyap
  • ethstaker
  • tsrsr
  • DreamBathrooms
  • modclub
  • everett
  • khanakhh
  • Durango
  • cubers
  • osvaldo12
  • InstantRegret
  • tacticalgear
  • tester
  • GTA5RPClips
  • cisconetworking
  • normalnudes
  • Leos
  • provamag3
  • All magazines