Hacker Newsnew | past | comments | ask | show | jobs | submit | castorio's commentslogin


similar approach: https://8ack.de/honeypot/

check the Country-Page


you lost me at 'npm install -g ...'


Aww, c'mon, it's not that hard… npm's a really nice package manager.


- boring - stupid - false - linkbait - spam


yes, i know, but accoring to the blogpost below it should be no problem for newser browsers when using tls 1.2, but might e usefull to keep compatibility with very legacy clients, no? disclaimer: i'm not a crypto-guru, the ciphers used are copypasta'd from https://www.ssllabs.com/projects/best-practices/.

https://community.qualys.com/blogs/securitylabs/2013/03/19/r...


an updated version is available, now with nginx+libressl statically linked


you might be right: i did a new test with nginx+libressl static and the results are very similar: https://www.mare-system.de/static/bimages/nginx-libressl/per...


what do you mean by "Fast"?

from what i've learned with webservers it depends on implementation: cipher-suites, keep-alive, session-ticket-reusage etc. this pic shows the perfomance for a webserver w/ different cipher-suites: https://8ack.de/static/bimages/ssl_perftest_r1.jpg

speaking of webservers, if you use the usual performance-tweaks you wouldnt see a big performance-drawback from userperspective (YMMV)


self-signed is as good as CA-based from a security-POV. it's just that the browsers complain.


It absolutely is not. With CA based you have an existing trust relationship to build on. It may be a flawed one but it is there.

Asking a client to accept self-signed is asking for a MITM attack.


Basically you're saying that I'm playing with fire with SSH because I trust a host on first view: everything not stamped by a third party is rogue.

Trust is not a commodity to be exchanged by money!


>> Basically you're saying that I'm playing with fire with SSH because I trust a host on first view: everything not stamped by a third party is rogue.

Nope. I'm saying nothing of the sort. I'm saying that if you do not have an existing trust relationship then bootstrapping one over a public channel is asking for trouble. Third parties happen to form a part of the solution we use for https. It is a flawed model and it is rife with problems.

But it's better than not having it at all.

So yes, you are playing with fire if you trust an SSH host on first view. You will get protection against someone changing the signature later, but you have no protection against a malicious MITM player who is well resourced. Like, say a government that can insert themselves at various ISPs and do what they like with your traffic.

>> Trust is not a commodity to be exchanged by money!

It's up to you to decide what trust is. What it is not is blindly trusting that nobody out there is performing an MITM on your data.


The likelihood of any one user to be the target of a MITM is vanishingly small. Once that certificate has been accepted, they will be notified if it changes anyways.

Furthermore, the "trust relationship" between a user and a CA is based on nothing more than the CA's sayso. Do you personally trust every cert that your browser does? What about your OS? Trust that they'll never issue a cert they shouldn't? Trust that their operations are secure?

And finally, the self signed CA still protects against passive monitoring and eavesdropping, which I'd say is a much more clear and present threat.


Passive monitoring? Sure. Impossible to detect active monitoring? Also yes.

There are literally governments which have used a fake certificate to monitor SSL connections. It wasn't detected for quite a few months.


The difference being that we know the first one is happening right now.

The average user will probably not be MITM'd. There simply are too many users and not enough attackers. Additionally, the attacker must hit the user during their first visit to the site or never.


The average user may well be MITMd by their own government. Doesn't seem that unlikely any more.

Either way, self signing is not as secure as using a CA and it is not just browsers being picky.


..in which case they'd just compel the CA to cough up a certificate. This does not apply, at all, to the argument for or against self-signed certs.


Depends on the government involved, and on the user, and on the authority.

And then it's still no worse than self signed even in the worst case.


MITM attack if trivial over wifi. And the Snowden files have shown that it is trivial for the NSA too. In fact it is routinely done by the middle-east dictatures to spy on their dissidents.


A self-signed certificate still has the revocation problem, though.


All certificates have the revocation problem. The revocation mechanisms have serious performance and reliability issues (e.g. what do you do if you can't contact the server?) which means that hardly anybody uses them and most people who do are doing it wrong.


Somewhat short lived certificates (two weeks?) solve most problems around online revocation. But on that timescale a self signed isn't terribly convenient, so you still need some kind of issuing authority / infrastructure.


using the CA-model in its current way doesnt protect you from MITM either. diginotar anyone? http://en.wikipedia.org/wiki/DigiNotar


It absolutely does protect you from MitM. Does it offer full proof protection? No. But it adds a barrier between you and being trivially hit with a MitM.

To use an analogy: One could make the statement that a kevlar vest doesn't protect you from bullets, then cite an example when a military grade round went through one and killed a cop. However this statement would be equally misleading to yours, as we all know a kevlar vest is better than nothing and that it will stop a typical street bullet (e.g. handgun round).


You lose 50% of the benefit of HTTPS then. It is 1/2 about encryption and 1/2 about interception/impersonation/MitM protection.

The only way to do a self signed cert while maintaining all of the benefits is to have the client install your root CA into their CA store. However for the user to do so they have to fully trust you and your security (since for all they know you could generate fake certificates for Microsoft, Google, Amazon, etc that would show up as legit for them (certificate pinning aside)).

I really REALLY dislike the current HTTPs/SSL/TLS system, the fact that money and hassle is a literal cost to security is a huge problem. However self-signed certificates aren't remotely a solution.


no, they arent a solution, but they arent a problem either. think ssh/know_hosts - file.

convergence might have been an interesting approach, but i did not heard much of it lately http://convergence.io/


sure, there exists a project already with a local copy of included sites; it would be ease (i think) to modify this project to download and evaluate a current db-copy on browser-start

https://chrome.google.com/webstore/detail/plain-text-offende...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: