9fans - fans of the OS Plan 9 from Bell Labs
 help / color / mirror / Atom feed
From: Lucio De Re <lucio@proxima.alt.za>
To: 9fans@cse.psu.edu
Subject: Re: [9fans] spam rejection after reception does have limits
Date: Sun, 28 Sep 2003 13:47:02 +0200	[thread overview]
Message-ID: <20030928134701.P27821@cackle.proxima.alt.za> (raw)
In-Reply-To: <029701c385b0$686b32e0$b9844051@insultant.net>; from boyd, rounin on Sun, Sep 28, 2003 at 01:05:19PM +0200

On Sun, Sep 28, 2003 at 01:05:19PM +0200, boyd, rounin wrote:
>
> > Between you and Choate, you're getting irritating: "You don't
> > understand..."  Maybe you can explain, if you're so fucking clever!
>
> you need a root CA or some other CA you trust.  this depends on
> the DNS, which can be spoofed, hence possiblty giving you a false
> public key.
>
That was the point I was trying to make.  I'll issue you a certificate
(a tiny one, without all the stupid frills).  Not only, I'll issue you
a CA certificate, so you can in turn certify your ISP or your pretty
cousin that acts as your SMTP gateway.  I'll accept their certificates
as being your agent.  I probably won't accept them as proof of their
identity, however.  That's an interesting aside not to be indulged
here.

> key revocation never worked.
>
I accept that.  It doesn't look like it could conceivably be taken
seriously by anyone.  We've had our banks (we have only a few here as
the entrance qualifications are absurdly steep) fall foul of expiry.
But why I should trust Veristupid (sic) in preference to a bank that's
more or less managed my overdraft for the past 25 years, I fail to
understand.  Yet everyone jumped in horror when MSIE raised the alarm.

More of that lack of communication between tech and non-tech.  Even
within one's brain, seemingly, as the only squawkers I heard were
techies.

But when I revoke the certificate I issued to you, I will (hopefully)
know about it.  That type of revocation had better work.

> TLS/SSL is so complex that the bugs kept turning up.  someone at the
> labs even had a theoretical [impractical, but possible] an attack on it.
>
That was addressed and fixed.  I assume that real cryptographers know
what they are doing, the maths is too convoluted (life is too short)
for me to do it myself.  But I'm prepared to respect the experts with
a reputation (Steve Bellovin come to mind, but there are plenty
others).

If there is a preferable approach, it hasn't made any dent in my
awareness.  And I accept I'm not on the coal face, nor does "good"
imply "successful", nor do all clever schemes get published for the
health of the Internet (think NSA), still, if SSL could migrate to
TLS against entropy, maybe further migration towards greater entropy
is possible.

> that's why we don't use 2DES, 'cos there is theoretical attack where
> you meet in the the middle.  sure, it's costly, but the solution is to go
> to 3DES.  DES 'died' back in the early '90s (unless you were the NSA,
> where it probably died well before that).
>
DES has yet to be shown not to be intentionally back-doored.  But
respected encryption algorithms are ten-a-penny, to the great
confusion of those who have to make decisions and cannot possibly be
expected to know everything cryptographic.

I thought TLS used blowfish and that rijndael had been picked as the
final word in international trusted encryption schemes?

> once you had encrypted the 'crack' dictionary [~50k 'words'] with all
> the 4096 salts busting a password file with a shell script and took
> seconds.  generating the dictionary back then took a month.
>
Cracking the Unix security to read /etc/shadow or /etc/master.passwd
takes a different approach.  As you suggest, the solution should
be less expensive than the problem.  You forget that the price you
pay has little in common with the gains of your enemy.  That is
also an important factor.  I'm upgrading a site of some two hundred
users right now, with the option to change from DES to RC5 for
login passwords.  The trauma involved in the migration is going to
offset any possible security gain by orders of magnitude, specially
as the sharing of passwords seems more the norm than the exception
around here.  Why bother?

++L


  reply	other threads:[~2003-09-28 11:47 UTC|newest]

Thread overview: 34+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2003-09-27 22:46 ron minnich
2003-09-28  1:11 ` boyd, rounin
2003-09-28  9:08   ` Charles Forsyth
2003-09-28  9:16     ` boyd, rounin
2003-09-28  8:10 ` Lucio De Re
2003-09-28  8:59   ` boyd, rounin
2003-09-28  9:42     ` Lucio De Re
2003-09-28 10:18       ` boyd, rounin
2003-09-28 10:50       ` boyd, rounin
2003-09-28 11:18         ` Lucio De Re
2003-09-28 11:44           ` boyd, rounin
2003-09-28 11:05       ` boyd, rounin
2003-09-28 11:47         ` Lucio De Re [this message]
2003-09-28 11:58           ` boyd, rounin
2003-09-28 12:17             ` Lucio De Re
2003-09-29  9:14         ` Douglas A. Gwyn
2003-09-29  9:37           ` boyd
2003-09-28 15:33       ` ron minnich
2003-09-28 15:39         ` boyd, rounin
2003-09-28 17:12           ` ron minnich
2003-09-28 17:22             ` boyd
2003-09-28 10:16     ` Charles Forsyth
2003-09-28 10:23       ` boyd, rounin
2003-09-29  3:23         ` salomo3
2003-09-29  3:32           ` boyd
2003-09-29  5:18             ` Lucio De Re
2003-09-29  9:18               ` boyd
2003-09-29 13:53             ` Joel Salomon
2003-09-29  9:14     ` Douglas A. Gwyn
2003-09-29  9:13   ` Douglas A. Gwyn
2003-09-29  9:44     ` SPAM: " Charles Forsyth
2003-09-29 15:21       ` Douglas A. Gwyn
2003-09-29 16:02         ` Joel Salomon
2003-09-29 21:24           ` boyd

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20030928134701.P27821@cackle.proxima.alt.za \
    --to=lucio@proxima.alt.za \
    --cc=9fans@cse.psu.edu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).