Re: 'post quantum' encryption algorithm(s) in latest libressl and upcoming 6.7 to chose

2020-05-09 Thread Aisha Tammy
On 5/8/20 3:16 PM, Martin wrote: > Which 'quantum' resistant algorithms can be used right now to prevent data > decryption in future by 'quantum' computers (when they can do this) of > currently collected data flows? this is so dumb. worry about this when there are computers which can actuall

Re: 'post quantum' encryption algorithm(s) in latest libressl and upcoming 6.7 to chose

2020-05-09 Thread Kevin Chadwick
On 2020-05-09 07:41, Martin wrote: > This one > https://www.tomshardware.com/news/d-wave-5000-qubit-first-sale,40470.html > is the most powerful 5000qbits quantum computer sells nowadays. > > Moreother, D-Wave opened online service to access 5000qbit remotely for > solving 'special' tasks which

Re: 'post quantum' encryption algorithm(s) in latest libressl and upcoming 6.7 to chose

2020-05-09 Thread Kevin Chadwick
On 2020-05-09 07:41, Martin wrote: > This one > https://www.tomshardware.com/news/d-wave-5000-qubit-first-sale,40470.html > is the most powerful 5000qbits quantum computer sells nowadays. D-waves definition of qubit is different and their machines will never be capable of breaking public key cryp

Re: gnutls cannot connect to openbsd.org -- TLS 1.3 issue?

2020-05-09 Thread Stuart Henderson
On 2020-05-08, openbsdli...@uninformativ.de wrote: > It only fails with gnutls, so I first reported it there: > > https://gitlab.com/gnutls/gnutls/-/issues/984 > > However, Daiki Ueno said it looks like an issue with LibreSSL. Quoting > in full: > >> This looks like an issue in the server side (L

Re: gnutls cannot connect to openbsd.org -- TLS 1.3 issue?

2020-05-09 Thread openbsdlists
Has been fixed in LibreSSL. Thank you!

Re: 'post quantum' encryption algorithm(s) in latest libressl and upcoming 6.7 to chose

2020-05-09 Thread Martin
This one https://www.tomshardware.com/news/d-wave-5000-qubit-first-sale,40470.html is the most powerful 5000qbits quantum computer sells nowadays. Moreother, D-Wave opened online service to access 5000qbit remotely for solving 'special' tasks which can be accelerated using quantum architecture.

Re: 'post quantum' encryption algorithm(s) in latest libressl and upcoming 6.7 to chose

2020-05-09 Thread info
OpenSSH allows to use hybrid mode with many private keys of different type and even stored on different hardware like Nitrokey, Rutoken, etc. at the same time for a single session. E.g. 4 different private keys are required (say Nitrokey, Rutoken ECP2, Curve25519 and Postquantum one): Authenic

Re: 'post quantum' encryption algorithm(s) in latest libressl and upcoming 6.7 to chose

2020-05-09 Thread info
D-waves has too uncoupled qubits if I understand it correctly, it is nothing to do about qubits quantity as we used to think about it. Like a "cluster" of completely isolated hosts (which is already not a cluster or course).

Re: 'post quantum' encryption algorithm(s) in latest libressl and upcoming 6.7 to chose

2020-05-09 Thread Kevin Chadwick
On 2020-05-09 14:31, i...@aulix.com wrote: > guessed by quantum provided session symmetric cipher is strong enough? Quantum does not break any in use today and AES-256 symmetric is expected to be quantum resistant in any case. I personally prefer AES-256 ctr over the more complex GCM. I am not a

Re: 'post quantum' encryption algorithm(s) in latest libressl and upcoming 6.7 to chose

2020-05-09 Thread Kevin Chadwick
On 2020-05-09 14:34, i...@aulix.com wrote: > D-waves has too uncoupled qubits if I understand it correctly, it is nothing > to do about qubits quantity as we used to think about it. Like a "cluster" of > completely isolated hosts (which is already not a cluster or course). I don't care for the d

reposync out of memory

2020-05-09 Thread Lucas
Hello misc@, Starting today, reposync is running out of memory for me. Happened 3 times in a row already, in different stages. It looks like this when it happens: >f.st.. ports/net/megatools/pkg/PLIST,v ERROR: out of memory in flist_expand [receiver] rsync error: error allocating core memory

Re: 'post quantum' encryption algorithm(s) in latest libressl and upcoming 6.7 to chose

2020-05-09 Thread info
Though I am a very noob in understanding crypto from a mathematical point of view (not just as an user of some ready program) IMHO following message can contain some truth about insecurity and intentional flaws of hardware crypto in X86 CPUs: https://support.nitrokey.com/t/spectre-or-meltdown-v

Re: reposync out of memory

2020-05-09 Thread Stuart Henderson
On 2020-05-09, Lucas wrote: > Hello misc@, > > Starting today, reposync is running out of memory for me. Happened 3 > times in a row already, in different stages. It looks like this when it > happens: > >>f.st.. ports/net/megatools/pkg/PLIST,v > ERROR: out of memory in flist_expand [receiver]

Re: 'post quantum' encryption algorithm(s) in latest libressl and upcoming 6.7 to chose

2020-05-09 Thread Kevin Chadwick
On 2020-05-09 16:25, i...@aulix.com wrote: > Note: Since these MS / U.S. government keys are deeply sticking in Intel XEON > processor hardware, it doesn’t play a role, what other OS you install or boot > afterwards: Debian/UBUNTU Linux, OpenBSD, … If your software uses Intel > AES-NI hardware e

Re: TOFU/cert pinning in libtls

2020-05-09 Thread Lucas
Hello Stephen, > My basic idea for the client is: > > - load a db of self-signed certs. > - connect to host > - if host cert is self signed > - if not in db, prompt user and add to db > - if in db, check fingerprint and warn user if they don't match. > > Browsing the manuals/source code, the

Re: reposync out of memory

2020-05-09 Thread Lucas
Stuart Henderson wrote: > I can add something to the readme after the ports tree has unlocked. > > I think you're seeing this now due to the churn because every file in > the repositories was touched when the tree was tagged with OPENBSD_6_7. > I haven't seen it on the 2 machines I have running r

@OpenBSD_CVS Twitter 140char limit?

2020-05-09 Thread Tommy Nevtelen
Hi there! Does anybody on this list manage @OpenBSD_CVS? Would be nice to lift the message truncation from the old 140char limit to the new 280char limit. Super annoying when I can't read an interesting commit message that is just a little longer :) -- TN

Re: TOFU/cert pinning in libtls

2020-05-09 Thread Bob Beck
On Sat, May 09, 2020 at 06:18:50PM +, Lucas wrote: > Hello Stephen, > > > My basic idea for the client is: > > > > - load a db of self-signed certs. > > - connect to host > > - if host cert is self signed > > - if not in db, prompt user and add to db > > - if in db, check fingerprint an

Re: 'post quantum' encryption algorithm(s) in latest libressl and upcoming 6.7 to chose

2020-05-09 Thread Raul Miller
On Sat, May 9, 2020 at 1:05 PM Kevin Chadwick wrote: > Careful of what sources you trust! If a processor was storing the keys used, > non > volatile then people would have found out. Software encryption wouldn't save > you > either. If there is a back door it won't have anything to do with AES-N

Re: 'post quantum' encryption algorithm(s) in latest libressl and upcoming 6.7 to chose

2020-05-09 Thread Martin
Some time ago Google bought 2000qbit version from D-wave and confirmed it is a quantum computer bla bla bla... but cluster consists of eight qbit blocks to build advertised capacity if I understand googles papers right. My question was about decrypting currently generated and accumulated encrypt

Re: TOFU/cert pinning in libtls

2020-05-09 Thread Ted Unangst
On 2020-05-09, Bob Beck wrote: > > oolong$ man -k Xr=tls_peer_cert_hash > > nc(1) - arbitrary TCP and UDP connections and listens > > > > That's far from ideal IMO, but I don't know where, of the many tls_* > > manpages, would I reference it. > > man tls_peer_cert_hash > > happily brings up th

TOFU/cert pinning in libtls

2020-05-09 Thread Stephen Gregoratto
I am currently implementing a simple C client for the gemini protocol[1]. All transactions are protected using TLS, with a catch: > Clients can validate TLS connections however they like (including not > at all) but the strongly RECOMMENDED approach is to implement a > lightweight "TOFU" certifica

Full disk encryption FAQ update request

2020-05-09 Thread Sarah Newman
We had a VPS customer ask for help on full disk encryption, and since following the instructions on https://www.openbsd.org/faq/faq14.html#softraidFDE did not work with a serial console, we published a blog post on it: https://prgmr.com/blog/openbsd/2020/05/08/openbsd-encrypted-root.html I don't

Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-09 Thread Brian Waters
At risk of responding without having read through the entire website, it seems to mostly be about OpenBSD's exploit mitigations, and nothing else. But OpenBSD does a lot of other things well, like doing lots of code reviews, having a culture of writing code with an eye toward security in the fir

Re: OpenBSD insecurity rumors from isopenbsdsecu.re

2020-05-09 Thread Stéphane Aulery
Hello, Le 07/05/2020 à 16:00, i...@aulix.com a écrit : Can you please comment negative appraisal from the following website: https://isopenbsdsecu.re/quotes/ I did not want to hurt anyone, just looking for a secure OS and OpenBSD looked very nice to me before I have found this website. Th