Re: [cryptography] anyone got a how not to use OpenSSL list?

2012-10-24 Thread Patrick Mylund Nielsen
Related: https://crypto.stanford.edu/~dabo/pubs/abstracts/ssl-client-bugs.html http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf On Wed, Oct 10, 2012 at 10:26 PM, travis+ml-rbcryptogra...@subspacefield.org wrote: On Wed, Oct 10, 2012 at 08:56:29PM +0100, Patrick Mylund Nielsen wrote: One

Re: [cryptography] DKIM: Who cares?

2012-10-24 Thread John Levine
Does anyone know why they all do this? Hi. I'm was a member of the working group that developed DKIM. The problem is set and forget software. DKIM is a descendant of Yahoo's DomainKeys, which was developed in about 2005. DKIM is sufficiently upward compatible with DK that most DK key records

Re: [cryptography] DKIM: Who cares?

2012-10-24 Thread Nicolai
On Wed, Oct 24, 2012 at 07:57:54PM -0400, Matthew Green wrote: That's my impression. Others have pointed out that 512 bits is a limit imposed by DNS/UDP text record sizes (much more and you need TCP). I don't know if that's accurate and I'm not sure it contradicts my first answer. DNS

Re: [cryptography] DKIM: Who cares?

2012-10-24 Thread Peter Gutmann
Zack Weinberg zack.weinb...@sv.cmu.edu writes: Or perhaps the mere presence of a DKIM record is sufficient deterrent against spam with forged From addresses at a particular domain, and that's the only thing these organizations thought DKIM was good for. I think it's more likely that DKIM is

Re: [cryptography] anyone got a how not to use OpenSSL list?

2012-10-24 Thread Jeffrey Walton
On Wed, Oct 10, 2012 at 1:34 PM, travis+ml-rbcryptogra...@subspacefield.org wrote: I want to find common improper usages of OpenSSL library for SSL/TLS. Can be reverse-engineered from a how to properly use OpenSSL FAQ, probably, but would prefer information to the first point rather than its

Re: [cryptography] DKIM: Who cares?

2012-10-24 Thread Jon Callas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 As someone who is one of the DKIM authors, I can but roll my eyes and shrug. It's an interesting, intentional facet of DKIM that any given key being used only has to last as long as it takes the email to go from the sender's domain to the

Re: [cryptography] DKIM: Who cares?

2012-10-24 Thread ianG
On 25/10/12 14:34 PM, Peter Gutmann wrote: Zack Weinberg zack.weinb...@sv.cmu.edu writes: Or perhaps the mere presence of a DKIM record is sufficient deterrent against spam with forged From addresses at a particular domain, and that's the only thing these organizations thought DKIM was good