pug50, (edited ) to microsoft
@pug50@toot.community avatar

Hmm. The certificate for https://windows.microsoft.com/ has expired.

dec_hl, to VintageOSes
@dec_hl@mastodon.social avatar
jabberati, to random
@jabberati@social.anoxinon.de avatar

Machine-in-the-middle Detection and Monitoring for Servers

https://certwatch.xmpp.net/

This service allows you to check your XMPP server's setup, helps you publicly store the hash of the public key in a secure way, and then monitors your server to make sure that connections to it get the same public key that you have configured and sends notifications if anything changes (which may indicate a attack on your service).

tdp_org, to infosec
@tdp_org@mastodon.social avatar

Earlier we were talking about DDOS & a colleague asked what TLS versions are used by the botnets these days...So I checked the most recent big-ish one we had :
TLS Protocol Percentage
TLSv1.3 55.77%
TLSv1.2 44.23%
TLSv1 0.00%
This was over something like 115M total requests.
So the answer is that the botnets have better TLS libs than our overall audience. Fun times.

tychotithonus, (edited ) to random

Whenever someone insists that their website doesn't need TLS / HTTPS, send them this.

https://mastodon.social/@jsrailton/111111278356432225

See the "visited certain websites not using HTTPS" part?

Unencrypted websites are an essential part of some exploitation chains, due to an attack method called "network injection". If the attacker can get between your website and a vulnerable visitor ... game over.

If your site is worth visiting ... aren't its visitors worth protecting?

Full original article:
https://citizenlab.ca/2023/09/predator-in-the-wires-ahmed-eltantawy-targeted-with-predator-spyware-after-announcing-presidential-ambitions/

Edit: I'm also looking at you, package management frameworks that still use HTTP "because signing":

https://gist.github.com/roycewilliams/cf7fce5777d47a8b22265515dba8d004

booteille, to random French
@booteille@framapiaf.org avatar
teleclimber, to random
@teleclimber@social.tchncs.de avatar

in a private home network: is there anything being worked on to make this easier? The options seem to be:

  • get a valid cert using a purchased domain name and use it internally
  • become your own root CA and install root certs on each device

Both have significant downsides. But if you do neither you don't get that sweet sweet HTTPS that is needed for so many web features (webcam access, PWA, etc..)

Is any work being done to help improve this situation?

jschauma, to random
@jschauma@mstdn.social avatar

Yaaaaay, we have a new (old) branded vulnerability, name, logo and all: "The Marvin Attack"

"In this paper we show that Bleichenbacher-style attacks on RSA decryption are not only still possible, but also that vulnerable implementations are common. We have successfully attacked multiple implementations using only timing of decryption operation and shown that many others are vulnerable."

https://people.redhat.com/~hkario/marvin/

ferrous, to rust
@ferrous@social.ferrous-systems.com avatar

🦀 New blog post alert 🦀

"Using mem::take to reduce heap allocations"

This is the first post of a series where we go through the performance work we did in rustls, a modern TLS library in Rust. Today we tame the borrow checker using mem::take.

https://ferrous-systems.com/blog/rustls-borrow-checker-p1/

cacu, to MLS Spanish
@cacu@todon.nl avatar
pitrh, to security
@pitrh@mastodon.social avatar
guardianproject, to privacy

We have started the second round of our partnership https://defo.ie to ensure that the new standard called () works for public interest use cases. We also are working to reduce the pressure towards inherent to the improvements of hiding the domain name. You can find more details in our project announcement: https://guardianproject.info/2023/11/09/defo-developing-ech-for-openssl-round-two/

guardianproject, to HowTo

We just created a for how to set up dev/test servers using our enabled forks of and running on . It should be very quick to get started using a new domain: https://guardianproject.info/2023/11/10/quick-set-up-guide-for-encrypted-client-hello-ech/

kubikpixel, (edited ) to linux German
@kubikpixel@chaos.social avatar

Wait wat, a pure Bush script is a web client!? 😲

»A minimal TLS 1.2 implementation in a pure Bash script:
bash_tls implements TLS well enough to make a simple HTTPS request to most web servers.«

🧑‍💻 bash_tls
https://github.com/gh2o/bash_tls


fkooman, to web

Does ECH (Encrypted Client Hello) make sense in the context of "small tech", i.e. hosting your own services, or only when using global CDNs / platforms? I'm guessing the latter...

It is tough place to be in. ECH makes some sense and could "protect" the users, but only if you use Cloudflare. But then Cloudflare gets all the data 🤷

https://blog.mozilla.org/en/products/firefox/encrypted-hello/

fell, to SmartHome
@fell@ma.fellr.net avatar

I stopped messing with client certificates and went back to good old HTTP basic authentication for my little digital light switch panel.

It's a shame nobody cares about TLS client certificates. With a bit more effort we could've gotten rid of passwords a long time ago.

I wish there was something like SSH keys for the web.

Yeah I know, Passkeys are a thing... but also not really.

jbr_IC, to random German
@jbr_IC@social.tchncs.de avatar

Für Leute, die eigene Server betreiben und mal Klarheit bei der vorliegenden benötigen, können es hiermit testen.

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL , protocols as well as recent cryptographic flaws and more.

https://testssl.sh/

emanuelduss, to security

Very cool new Wireshark @wireshark feature "TLS Keylog Launcher" (1) can automatically set the SSLKEYLOGFILE environment variable (2), start an application/browser (3) and directly decrypt the data (4) so you can see the cleartext (5) of TLS connections. No need to manually configure the environment/file anymore.

ferrous, to rust
@ferrous@social.ferrous-systems.com avatar

If you have been waiting for part 2 of the blog series about the performance work we have been doing on for Prossimo ISRG, your wait is over!

https://ferrous-systems.com/blog/rustls-borrow-checker-p2/

RTP, to news
@RTP@fosstodon.org avatar
nikkasystems, to chrome Swedish
@nikkasystems@social.nikkasystems.com avatar

Veckans poddavsnitt handlar om säkrare webbanslutningar, bättre pixlar, Gmails säkerhetskrav på nyhetsbrev och Europols önskade ändamålsglidning (som avslöjades innan Chat Control 2.0 ens har gått igenom). https://www.youtube.com/watch?v=MHpwv91wLYw

tdp_org, to infosec
@tdp_org@mastodon.social avatar

TIL you can show only the SAN list of a cert via openssl:
echo| openssl s_client -connect www.bbc.co.uk:443 -showcerts 2>/dev/null | openssl x509 -noout -ext "subjectAltName"
I'd always parsed that out manually..🤦🏻‍♂️.

cstrotm, to random
@cstrotm@mastodon.social avatar

CAA DNS records will now be used to assert the certification authority for S/MIME certificates:

https://lists.cabforum.org/pipermail/smcwg-public/2024-January/000928.html

develwithoutacause, to windows
@develwithoutacause@techhub.social avatar

I had to install on a machine today and OH MY GOD I forgot how complex of a set up process it is. I went through it again just to count the unbelieveable number of steps it took:

  1. License agreement.
  2. Which components to install (includes proper nouns like "Git Bash", "Git LFS", and "Scalar"). Notably does not enable automatic updates by default.
  3. Default editor for Git (doesn't include as an option).
  4. Default branch name.
  5. How to configure the PATH.
  6. Which to use.
  7. Which / library to use.
  8. How to handle CRLF / LF line endings.
  9. Which terminal emulator to use.
  10. Whether to use merge or rebase by default.
  11. Whether to enable the credential helper.
  12. Extra options:
  • File system caching.
  • Symbolic links.
  1. Experimental options:
  • Pseudo consoles (?)
  • File system monitor (?)

This is utterly absurd and probably the most unnecessarily complicated install experience I can think of.

jschauma, to random
@jschauma@mstdn.social avatar

NIST has a practice guide for "Addressing Visibility Challenges with 1.3 within the Enterprise", discussing "key-management" (control/collect/keep all encryption keys), , and, you know, not encrypting data ("alternative network security protocols where forward secrecy is optional or not supported").

If you have opinions, the public comment period is now open until 2024-04-01...

https://www.nccoe.nist.gov/sites/default/files/2024-01/tls-nist-1800-37b-preliminary-draft.pdf

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • magazineikmin
  • everett
  • InstantRegret
  • rosin
  • Youngstown
  • slotface
  • love
  • khanakhh
  • kavyap
  • tacticalgear
  • GTA5RPClips
  • DreamBathrooms
  • provamag3
  • modclub
  • mdbf
  • normalnudes
  • Durango
  • ethstaker
  • osvaldo12
  • cubers
  • ngwrru68w68
  • tester
  • anitta
  • cisconetworking
  • Leos
  • JUstTest
  • All magazines