jabberati, to random
@jabberati@social.anoxinon.de avatar

Mitigating the Hetzner/Linode XMPP.ru MitM interception incident, part 2: XMPP-specific mitigations

https://www.devever.net/~hl/xmpp-incident-2

#xmpp #mitm #tls

br00t4c, to random
@br00t4c@mastodon.social avatar
jabberati, to random
@jabberati@social.anoxinon.de avatar

Machine-in-the-middle Detection and Monitoring for Servers

https://certwatch.xmpp.net/

This service allows you to check your XMPP server's setup, helps you publicly store the hash of the public key in a secure way, and then monitors your server to make sure that connections to it get the same public key that you have configured and sends notifications if anything changes (which may indicate a attack on your service).

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

Merely saying 'We speak a secret tongue' is not enough. One's wizards must speak the appropriate tongue, and speak it only in a most cautious fashion. https://cromwell-intl.com/cybersecurity/ssl-tls.html?s=mc

conansysadmin, to linux
@conansysadmin@mstdn.social avatar
tdp_org, to webdev
@tdp_org@mastodon.social avatar

Lazy post:
Are there common web clients which do not support TLS SNI but do support TLS1.2+?

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar
voltagex, to webdev
@voltagex@aus.social avatar

: caching for when I'm writing something that's hitting the same sites over and over again. interception included.

nikkasystems, to chrome Swedish
@nikkasystems@social.nikkasystems.com avatar

Veckans poddavsnitt handlar om säkrare webbanslutningar, bättre pixlar, Gmails säkerhetskrav på nyhetsbrev och Europols önskade ändamålsglidning (som avslöjades innan Chat Control 2.0 ens har gått igenom). https://www.youtube.com/watch?v=MHpwv91wLYw

fkooman, to web

Does ECH (Encrypted Client Hello) make sense in the context of "small tech", i.e. hosting your own services, or only when using global CDNs / platforms? I'm guessing the latter...

It is tough place to be in. ECH makes some sense and could "protect" the users, but only if you use Cloudflare. But then Cloudflare gets all the data 🤷

https://blog.mozilla.org/en/products/firefox/encrypted-hello/

pug50, (edited ) to microsoft
@pug50@toot.community avatar

Hmm. The certificate for https://windows.microsoft.com/ has expired.

jschauma, to random
@jschauma@mstdn.social avatar

Yaaaaay, we have a new (old) branded vulnerability, name, logo and all: "The Marvin Attack"

"In this paper we show that Bleichenbacher-style attacks on RSA decryption are not only still possible, but also that vulnerable implementations are common. We have successfully attacked multiple implementations using only timing of decryption operation and shown that many others are vulnerable."

https://people.redhat.com/~hkario/marvin/

tychotithonus, (edited ) to random

Whenever someone insists that their website doesn't need TLS / HTTPS, send them this.

https://mastodon.social/@jsrailton/111111278356432225

See the "visited certain websites not using HTTPS" part?

Unencrypted websites are an essential part of some exploitation chains, due to an attack method called "network injection". If the attacker can get between your website and a vulnerable visitor ... game over.

If your site is worth visiting ... aren't its visitors worth protecting?

Full original article:
https://citizenlab.ca/2023/09/predator-in-the-wires-ahmed-eltantawy-targeted-with-predator-spyware-after-announcing-presidential-ambitions/

Edit: I'm also looking at you, package management frameworks that still use HTTP "because signing":

https://gist.github.com/roycewilliams/cf7fce5777d47a8b22265515dba8d004

bortzmeyer, to ipv6 French
@bortzmeyer@mastodon.gougere.fr avatar

98 % of the capsules use TLS 1.3, 2 % use TLS 1.2. (Source : gemini://gemini.bortzmeyer.org/software/lupa/stats.gmi )

Unlike the migration to , migration to a modern seems almost entirely done.

Tronde, to CA German
@Tronde@social.anoxinon.de avatar

Gestern erreichte mich eine E-Mail von einem ehemaligen Kollegen. Dieser wollte mir unter anderem mitteilen, dass mein TLS/SSL-Kochbuch von 2016 immer noch hoch geschätzt und gelobt wird. Darüber habe ich mich sehr gefreut. 😀

Artikel zum TLS/SSL-Kochbuch: https://www.my-it-brain.de/wordpress/mein-tls-kochbuch/

thurrott, to random
@thurrott@twit.social avatar
adacosta,
@adacosta@twit.social avatar

@thurrott is on a roll with the housekeeping this month: drivers Is this all in preparation for

geekymalcolm, to random
@geekymalcolm@ioc.exchange avatar

Microsoft calls time on ancient in Windows, breaking own stuff in the process

https://www.theregister.com/2023/09/04/tls_windows_deprecation/

cbcrypto, to microsoft

Microsoft deprecates 1.0 and 1.1 in major products including SQL Server.

My takeaway from the deprecation was that we only see global change on rolled out when the likes of and turn a security into an availability issue.

I predict we’ll see the same here.

https://www.theregister.com/2023/09/04/tls_windows_deprecation/

governa, to microsoft
@governa@fosstodon.org avatar
kkarhan, (edited ) to linux
@kkarhan@mstdn.social avatar

YOS!

6.4.12 (with networking support!) + 0.8.10 in 980k using -cross-i686

This is awesome...

Seems like I can fit as client on the 3,5" as well...

I guess it would've been possible to make for a as well... ?


https://github.com/OS-1337/OS1337/commit/d4a59245953bd7529ee8a3c178841b6114cd7881

kkarhan,
@kkarhan@mstdn.social avatar

Sadly, doesn't like to build it's with / due to a missing header file...
https://github.com/OS-1337/OS1337/issues/1

tdp_org, to webdev
@tdp_org@mastodon.social avatar

Does anyone know of a commonly used Chrome/ium extension which would set expect-ct on web pages?
We're getting several million deprecation reports on our web pages for expect-ct but we don't set it ourselves.
Weird.

fell, (edited ) to selfhosted
@fell@ma.fellr.net avatar

I finally understood how to create client certificates, and I like it. It would be a good way to access services in my home network remotely without having to enter a password.

I can access https://fellr.net:1234 just fine, but you can't unless you have the certificate.

mjgardner, to Perl
@mjgardner@social.sdf.org avatar

@Perl A tip from @philsplace for those having trouble connecting to using and an / connection: https://mastodon.sdf.org/@philsplace/110906522769129740

serpentroots, to golang
@serpentroots@hachyderm.io avatar

I find really useful, but it's hard to build into production CI flows when it demands fixes only available in release candidates.

I mean, we upgrade pretty often, but now I'm going to have to turn it off until 1.21 is released. This doesn't seem like a great security practice.

fell, to security
@fell@ma.fellr.net avatar

I found a little malware on my wife's PC. It connects to cdn.discordapp.com and downloads about 1½ KB. Does anyone know a way of peeking into the #TLS traffic? Maybe I could trick it to connect to a proxy by installing a self signed certificate?

#Malware #MalwareAnalysis #Security #InfoSec #Windows #Hacking #ReverseEngineering #Encryption #AskFedi

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • magazineikmin
  • everett
  • InstantRegret
  • rosin
  • Youngstown
  • slotface
  • love
  • khanakhh
  • kavyap
  • tacticalgear
  • GTA5RPClips
  • DreamBathrooms
  • provamag3
  • modclub
  • mdbf
  • normalnudes
  • Durango
  • ethstaker
  • osvaldo12
  • cubers
  • ngwrru68w68
  • tester
  • anitta
  • cisconetworking
  • Leos
  • JUstTest
  • All magazines