Re: [openssl-users] Lattice Ciphers

2017-12-18 Thread Jakob Bohm
On 19/12/2017 02:10, Colony.three via openssl-users wrote: On 18/12/2017 22:35, Colony.three via openssl-users wrote: PS, Jakob I'm getting on your email:  "This email has failed its domain's authentication requirements. It may be spoofed or improperly forwarded!" The reason

Re: [openssl-users] Lattice Ciphers

2017-12-18 Thread Colony.three via openssl-users
> I find that Firefox refuses to do any ephemeral ciphers whatsoever. What the > heck? Why am I surprised. Somebody paid them. > > If you follow Schnieder, elliptic curve is not an option. > > I know you guys are severely underfunded, but is there any chance that > lattice encryption will be

Re: [openssl-users] Lattice Ciphers

2017-12-18 Thread Colony.three via openssl-users
On 18/12/2017 22:35, Colony.three via openssl-users wrote: >> PS, Jakob I'm getting on your email: "This email has failed its >> domain's authentication requirements. It may be spoofed or improperly >> forwarded!" >> The reason is: HEADER_FROM_DIFFERENT_DOMAINS,T_DKIM_INVALID > > Can you send me

Re: [openssl-users] Lattice Ciphers

2017-12-18 Thread Jakob Bohm
On 18/12/2017 22:35, Colony.three via openssl-users wrote: PS, Jakob I'm getting on your email:  "This email has failed its domain's authentication requirements. It may be spoofed or improperly forwarded!" The reason is: HEADER_FROM_DIFFERENT_DOMAINS,T_DKIM_INVALID Can you send me the full

Re: [openssl-users] Lattice Ciphers

2017-12-18 Thread Colony.three via openssl-users
PS, Jakob I'm getting on your email: "This email has failed its domain's authentication requirements. It may be spoofed or improperly forwarded!" The reason is: HEADER_FROM_DIFFERENT_DOMAINS,T_DKIM_INVALID-- openssl-users mailing list To unsubscribe:

Re: [openssl-users] Lattice Ciphers

2017-12-18 Thread Colony.three via openssl-users
. > For your information, I actually tracked down the original report > about this (and posted some corrections in a comment to the > researcher): > > - This was not HP's keyboard driver. This was Synaptics' touch > pad driver (SynTP.sys). Never said it is HP's driver. But understand, that

Re: [openssl-users] Lattice Ciphers

2017-12-18 Thread Jakob Bohm
On 18/12/2017 20:50, Colony.three via openssl-users wrote: On Mon, Dec 18, 2017 at 9:59 AM, Colony.three via openssl-users openssl-users@openssl.org wrote: Hear about the HP keylogging case recently? Do you think a keylogger is actually used in

Re: [openssl-users] Lattice Ciphers

2017-12-18 Thread Colony.three via openssl-users
>> On Mon, Dec 18, 2017 at 9:59 AM, Colony.three via openssl-users >> openssl-users@openssl.org wrote: >> >>> Hear about the HP keylogging case recently? Do you think a keylogger is >>> actually used in testing of a keyboard driver, in practice? >>> >>> Yes. >>> >>> More specifically, it's used to

Re: [openssl-users] Lattice Ciphers

2017-12-18 Thread Colony.three via openssl-users
> On Mon, Dec 18, 2017 at 9:59 AM, Colony.three via openssl-users > openssl-users@openssl.org wrote: > >> Hear about the HP keylogging case recently? Do you think a keylogger is >> actually used in testing of a keyboard driver, in practice? >> >> Yes. >> >> More specifically, it's used to ensure

Re: [openssl-users] Lattice Ciphers

2017-12-18 Thread Kyle Hamilton
On Mon, Dec 18, 2017 at 9:59 AM, Colony.three via openssl-users wrote: > > Hear about the HP keylogging case recently? Do you think a keylogger is > actually used in testing of a keyboard driver, in practice? Yes. More specifically, it's used to ensure that the

Re: [openssl-users] Lattice Ciphers

2017-12-18 Thread Colony.three via openssl-users
> Colony.three via openssl-users wrote: > >> I've set mine to test this comprehensively. (Apache and NginX) With >> Apache Firefox -ignores- server-prescribed ciphers and chooses an EC. >> NginX does properly prevail with the algo. Was this an accident, Apache? >> >> I'd suggest to read the

Re: [openssl-users] Lattice Ciphers

2017-12-18 Thread Colony.three via openssl-users
> Have you submitted a bug report for Apache (not honouring server config > cipher order) if one doesn't exist? That never works. > As for resistant to quantum computers, given the current aim is for systems > that can calculate things that would currently take the age of the universe > to

Re: [openssl-users] Lattice Ciphers

2017-12-18 Thread Michael Ströder
Colony.three via openssl-users wrote: > I've set mine to test this comprehensively. (Apache and NginX)  With > Apache Firefox -ignores- server-prescribed ciphers and chooses an EC.  > NginX does properly prevail with the algo.  Was this an accident, Apache? I'd suggest to read the Apache httpd

Re: [openssl-users] Lattice Ciphers

2017-12-18 Thread Alan Buxey
Have you submitted a bug report for Apache (not honouring server config cipher order) if one doesn't exist? As for resistant to quantum computers, given the current aim is for systems that can calculate things that would currently take the age of the universe to calculate, resistance is futile ;)

Re: [openssl-users] Lattice Ciphers

2017-12-18 Thread Colony.three via openssl-users
> - FF [claims it does >

Re: [openssl-users] Lattice Ciphers

2017-12-18 Thread Colony.three via openssl-users
>> Okay, FF does ECDHE not DHE/EDH. The whole industry does that, and most are >> using X25519 which was developed by Dan Bernstein. > > FF [claims it does > DHE/EDH](https://wiki.mozilla.org/Security/Server_Side_TLS#Intermediate_compatibility_.28default.29), > but it does not actually, in

Re: [openssl-users] Lattice Ciphers

2017-12-18 Thread Jeffrey Walton
On Mon, Dec 18, 2017 at 1:38 AM, Colony.three via openssl-users wrote: > > G**gle's Eric Schmidt says, "If you have something that you don't want > anyone to know, maybe you shouldn't be doing it in the first place. This is > a profoundly undemocratic attitude. What

Re: [openssl-users] Lattice Ciphers

2017-12-18 Thread Salz, Rich via openssl-users
Okay, FF does ECDHE not DHE/EDH. The whole industry does that, and most are using X25519 which was developed by Dan Bernstein. The Guardian article you referenced didn’t even have the word curve in it. My question – do you have a reference that shows Schneier says not to use elliptic curve –

Re: [openssl-users] Lattice Ciphers

2017-12-17 Thread Colony.three via openssl-users
> - I find that Firefox refuses to do any ephemeral ciphers whatsoever. What > the heck? Why am I surprised. Somebody paid them. > > I don’t know what server you are testing against, but FF does ECDHE all the > time with no problems. I should have said, "I find that Firefox refuses to do any

Re: [openssl-users] Lattice Ciphers

2017-12-17 Thread Kyle Hamilton
On Sun, Dec 17, 2017 at 3:58 PM, Salz, Rich via openssl-users wrote: >> If you follow Schnieder, elliptic curve is not an option. > > That’s interesting, you have a reference for that? I'm guessing OP's referring to "Applied Cryptography, 2nd Edition". There was one

Re: [openssl-users] Lattice Ciphers

2017-12-17 Thread Salz, Rich via openssl-users
* I find that Firefox refuses to do any ephemeral ciphers whatsoever. What the heck? Why am I surprised. Somebody paid them. I don’t know what server you are testing against, but FF does ECDHE all the time with no problems. * If you follow Schnieder, elliptic curve is not an

[openssl-users] Lattice Ciphers

2017-12-17 Thread Colony.three via openssl-users
I find that Firefox refuses to do any ephemeral ciphers whatsoever. What the heck? Why am I surprised. Somebody paid them. If you follow Schnieder, elliptic curve is not an option. I know you guys are severely underfunded, but is there any chance that lattice encryption will be coming soon?