Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Harik
Sep 9, 2001

From the hard streets of Moscow
First dog to touch the stars


Plaster Town Cop

gourdcaptain posted:

I'd really rather not rely on an LD_PRELOAD hack for something I'm trying to store data with to other people, that sounds like it could break at the worst possible time if they change it again. Already got to screw around with environmental variables to get Discord to work properly...
I absolutely agree, it was more to point out that the limitation makes absolutely no sense because they're checking for filesystem type instead of attempting to use xattrs and failing if those aren't supported. Don't use the LD_PRELOAD hack, just drop-dropbox.

I'd like to note that I screwed up in my post - it's not a 5-year low I just had my ticker set to 5 years and forgot they only IPO'd in the spring. That'll teach me to pay attention to the x-axis. So it's the lowest stock price they've ever had :v:

Adbot
ADBOT LOVES YOU

Horse Clocks
Dec 14, 2004


Signed up to 1 password.
Stored new Non-memorised master password in gpg encrypted file.
Gpg key expired
Gpg refuses to encrypt file
Lost master password.

All in under 5 minutes. Not one password stored. :downs:

PBS
Sep 21, 2015

Horse Clocks posted:

Signed up to 1 password.
Stored new Non-memorised master password in gpg encrypted file.
Gpg key expired
Gpg refuses to encrypt file
Lost master password.

All in under 5 minutes. Not one password stored. :downs:

:thunk:

I like the master password generator, I just regenerated for a few minutes until I found something that stuck with me.

My previous best password was less than 150 bits of entropy and I constantly mistyped it. 1Pwd's is a fair bit higher than that and I had it down within a day.

Cocoa Crispies
Jul 20, 2001

Vehicular Manslaughter!

Pillbug

Horse Clocks posted:

Signed up to 1 password.
Stored new Non-memorised master password in gpg encrypted file.
Gpg key expired
Gpg refuses to encrypt file
Lost master password.

All in under 5 minutes. Not one password stored. :downs:

Set your clock back or change the expiration date on your gpg key.

Potato Salad
Oct 23, 2014

nobody cares


:yikes:

apropos man
Sep 5, 2016

You get a hundred and forty one thousand years and you're out in eight!

PBS posted:


I like the master password generator, I just regenerated for a few minutes until I found something that stuck with me.


If you were being a purist about entropy you'd have used the first auto-generated password you were given. The one that you liked the look of has slightly less randomness than the first one you were given.

This is a philosophical point and probably has no bearing on the guessability of your chosen phrase. Just sayin'.

PBS
Sep 21, 2015

apropos man posted:

If you were being a purist about entropy you'd have used the first auto-generated password you were given. The one that you liked the look of has slightly less randomness than the first one you were given.

This is a philosophical point and probably has no bearing on the guessability of your chosen phrase. Just sayin'.

If I was being a purest I wouldn't like their generator at all.

1 space-noise generated string for me please!

Potato Salad
Oct 23, 2014

nobody cares


Store you're pass word encrypted with gpg then shred then burn the document, grow an orange tree with the ashes

Alternately just ensure the password isn't your weakest link by several orders of confidence and memorize the fucker.

Saukkis
May 16, 2003

Unless I'm on the inside curve pointing straight at oncoming traffic the high beams stay on and I laugh at your puny protest flashes.
I am Most Important Man. Most Important Man in the World.

apropos man posted:

If you were being a purist about entropy you'd have used the first auto-generated password you were given. The one that you liked the look of has slightly less randomness than the first one you were given.

This is a philosophical point and probably has no bearing on the guessability of your chosen phrase. Just sayin'.

This is something that I have been worrying about "pwgen". I prefer it because it generates memorable passwords, but how much weaker must they be since they are so easy to remember.

Dylan16807
May 12, 2010

Saukkis posted:

This is something that I have been worrying about "pwgen". I prefer it because it generates memorable passwords, but how much weaker must they be since they are so easy to remember.
That's a different problem, really.

Picking a password you like out of a list theoretically reduces your password strength by a few bits, but only if someone can figure out what you like. But when evaluating a password generator, you just look at how much randomness it uses.

Pwgen's pronounceable passwords are worth about 3.4 bits per character for lowercase, and 4 with some capitals and numbers tossed in. So that's less dense than random characters (4.7-6.5 depending on character set), but it's a lot more dense than random words (typically 11-14 bits per word).

So make your pwgen password about 50% longer than it would otherwise be and you're good to go. Or aim directly for 50/60/80/100/120 bits depending on level of paranoia and whether the password hash is any good.

Potato Salad
Oct 23, 2014

nobody cares


Way to go, veeam

PBS
Sep 21, 2015

Potato Salad posted:

Way to go, veeam

It's always Mongo.

Found out the instances on some of the vendor appliances we have weren't set to auth mode a little while back and the application wasn't capable of handling it. Lucky we don't leave our equipment open to the world.

Klyith
Aug 3, 2007

GBS Pledge Week
The master password of your password manager doesn't need as much entropy, because the encryption of the database itself should be providing a lot of resistance against brute-force guessing. The issue with password hashes stolen off the internet is that you can make a billion guesses a second because they're hashed with trivial functions. A keepass database, even with default settings, drops that to a few hundred. (There is an easy option to make it take 1 full second to decrypt, press that button with your slowest device.)

Yes it seems weird that the passwords inside the database are way stronger than what's being used to encrypt them. But it does work. As long as it's not completely trivial, I'd worry more about my system being keylogged than a keepass DB being brute force cracked.



Also re: google drive syncing, I think the wide difference in people's experiences depend a lot on how often we're changing & adding passwords. My keepass DB gets updated pretty infrequently. I'm not really in any danger of making two changes in quick enough succession to create a version conflict.

Absurd Alhazred
Mar 27, 2010

by Athanatos
Someone Hijacked MEGA Chrome Extension to Steal Users' Passwords

Truga
May 4, 2014
Lipstick Apathy
Re: KeepAss sync: it supports the scp protocol, even on windows as long as winscp is installed, though I think a plugin is needed? KeepAss can also act as a ssh agent so if your key is in your vault you don't need to log in either.

Craptacular
Jul 11, 2004

Truga posted:

Re: KeepAss sync: it supports the scp protocol, even on windows as long as winscp is installed, though I think a plugin is needed? KeepAss can also act as a ssh agent so if your key is in your vault you don't need to log in either.

"KeePass", though your version does sound more intriguing.

Docjowles
Apr 9, 2009

I assume that is :thejoke:

RFC2324
Jun 7, 2012

http 418

how dare someone post jokes on my serious internet comedy forums!

ElCondemn
Aug 7, 2005


What do y'all think about Wireguard? We're considering replacing some of our GRE+ipsec tunneling at work with Wireguard, we only use it for cross VPC traffic in AWS to support tunneling to a remote VPN endpoint for one of our customers. Right now we're using some VyOS routers to tunnel and encrypt between VPCs (using local AWS routing wont work since the network we're routing doesn't actually exist in AWS).

EssOEss
Oct 23, 2006
128-bit approved
I eagerly await the day they finally release a Windows version, so I can actually consider it for serious use. The day after that, I will likely discard it due to having nonexisting/userhostile documentation (as I have heard said so far).

Rufus Ping
Dec 27, 2006





I'm a Friend of Rodney Nano
Eh the docs are fine?

I've been using it for about a year, on normal linux and ubiquiti edgeos. Nothing but positive things to say. Previously used OpenVPN fwiw

Volguus
Mar 3, 2009
I played with it since everyone is praising it like it's the second coming. I used openvpn before as a client. I have absolutely no other experience with VPN servers or clients. It took me 10 minutes to install and configure a server following the first guide i found on the internet. The client (my machine) was even shorter. It works fine, it has good throughput. The tutorial I've read held my hand just fine.

Wireguard is fine. Too bad is linux only so far, I hope for a *BSD solution as well. Windows ... meh, who cares.

Sheep
Jul 24, 2003
I've been using wireguard for a couple of months on my home machines and also deployed it on my Ubiquiti routers with great success.

The only issue I could really see people having with it is that it just doesn't hold your hand through setting up routes if you don't use wg-quick but at the same time the providers I've used it with (Mullvad, AzireVPN) provide scripts that will do that for you anyways.

Sheep fucked around with this message at 23:41 on Sep 14, 2018

BlankSystemDaemon
Mar 13, 2009



Volguus posted:

Wireguard is fine. Too bad is linux only so far, I hope for a *BSD solution as well. Windows ... meh, who cares.
Jason is doing a lot of good work with Wireguard including keeping it very clean and portable (there's a POSIX-like userspace implementation, a Linux kernel implementation, a Go implementation, and one for both iOS and Android - and the git repository features apps for macOS and Windows though I'm not sure they're complete yet), and as a result there is already a FreeBSD port for it (and even one for the Go implementation), and if Jason dual-licenses the code as 2-clause BSD or ISC, an implementation can go into the kernel of the BSDs too.
I'd be surprised if the other BSDs don't get a port of it, sooner or later, as well.

Sheep posted:

The only issue I could really see people having with it is that it just doesn't hold your hand through setting up routes if you don't use wg-quick but at the same time the providers I've used it with (Mullvad, AzireVPN) provide scripts that will do that for you anyways.
That's actually the only cryptographic argument I've heard against it so far, that its design doesn't lend itself to having forward secrecy for identity hiding (something the presentation is very clear about) when used by providers who host VPN for lots of people - but if you host it on your own device (which is very easy to do), you'll have no problems whatsoever.


People might say its the best thing since sliced bread, but personally, I'd wait for the following notice to disappear from their page:

wireguard.com homepage posted:

WireGuard is not yet complete. You should not rely on this code. It has not undergone proper degrees of security auditing and the protocol is still subject to change.
Specifically, when I last checked, the paper acting as proof has only been cited by one paper (which only makes short mention of it as an example), and independent auditing has yet to begin since the code hasn't stabilized as the notice makes plain.


The biggest problem with it, once it passes muster as it almost assuredly will, will be the same problem OpenVPN has: Using it requires a client to be installed, whereas L2TP/IPsec is built-in to most operating systems - but that's not the fault of either OpenVPN or Wireguard.

BlankSystemDaemon fucked around with this message at 01:03 on Sep 15, 2018

Sheep
Jul 24, 2003
In my opinion OpenVPN's biggest problem isn't that it requires a client, it's that the configuration is obtuse as all gently caress.

IPSec/L2TP being built in is nice but I don't really see 'yum install wireguard' as some sort of hurdle that I actually care about.

Edit: I think Wireguard's biggest problem is that the guy was trying to merge in his own crypto suite to the Linux kernel along with the Wireguard code, which was pretty well shot down last time I checked.

Sheep fucked around with this message at 01:36 on Sep 15, 2018

Dylan16807
May 12, 2010

Sheep posted:

In my opinion OpenVPN's biggest problem isn't that it requires a client, it's that the configuration is obtuse as all gently caress.

IPSec/L2TP being built in is nice but I don't really see 'yum install wireguard' as some sort of hurdle that I actually care about.

Edit: I think Wireguard's biggest problem is that the guy was trying to merge in his own crypto suite to the Linux kernel along with the Wireguard code, which was pretty well shot down last time I checked.

https://lwn.net/Articles/761939/ As far as I know people are pretty favorable of the overall plan, even with the new crypto system.

RFC2324
Jun 7, 2012

http 418

Does anyone know how secure projecting your screen to another PC is in win 10? I couldn't find any information on how secure the connection is one way or another, so I'm assuming its just a raw video stream or something.

ElCondemn
Aug 7, 2005


Dylan16807 posted:

https://lwn.net/Articles/761939/ As far as I know people are pretty favorable of the overall plan, even with the new crypto system.

I’m not sure this article represents the majority of users of the crypto API in the kernel. There are tons of companies that rely on hardware offload, it’s a pretty important layer that maybe desktop Linux users don’t care about but would have serious implications for hardware manufacturers and embedded software developers.

Klyith
Aug 3, 2007

GBS Pledge Week

RFC2324 posted:

Does anyone know how secure projecting your screen to another PC is in win 10? I couldn't find any information on how secure the connection is one way or another, so I'm assuming its just a raw video stream or something.

It uses Miracast, which is a direct WPA2-secured wifi connection between the devices -- the router is only used to initiate the link. Inside that it's a plain h.264 video stream.

RFC2324
Jun 7, 2012

http 418

Klyith posted:

It uses Miracast, which is a direct WPA2-secured wifi connection between the devices -- the router is only used to initiate the link. Inside that it's a plain h.264 video stream.

that's actually pretty cool. thanks

Sheep
Jul 24, 2003

Dylan16807 posted:

https://lwn.net/Articles/761939/ As far as I know people are pretty favorable of the overall plan, even with the new crypto system.

"Shot down" was probably a poor choice of wording, I just meant that getting it merged in the short term is probably out of the question due to issues such as those raised in this thread.

Sheep fucked around with this message at 08:52 on Sep 16, 2018

Double Punctuation
Dec 30, 2009

Ships were made for sinking;
Whiskey made for drinking;
If we were made of cellophane
We'd all get stinking drunk much faster!
It annoys me to no end that Linux still doesn’t support Curve25519. By the time they do, it will already be obsolete, and we’ll be on to NTRU and Bliss and poo poo.

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

Double Punctuation posted:

It annoys me to no end that Linux still doesn’t support Curve25519. By the time they do, it will already be obsolete, and we’ll be on to NTRU and Bliss and poo poo.
What?

Double Punctuation
Dec 30, 2009

Ships were made for sinking;
Whiskey made for drinking;
If we were made of cellophane
We'd all get stinking drunk much faster!

We’re rapidly approaching the point where we need algorithms that are secure against quantum computers, which RSA and ECDSA are not. Linux’s IPsec code doesn’t even support the current best-in-class curves, so I doubt they will be ready when that time comes.

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

Double Punctuation posted:

We’re rapidly approaching the point where we need algorithms that are secure against quantum computers, which RSA and ECDSA are not. Linux’s IPsec code doesn’t even support the current best-in-class curves, so I doubt they will be ready when that time comes.
What are you talking about

Klyith
Aug 3, 2007

GBS Pledge Week

anthonypants posted:

What are you talking about

"Linux doesn't support this advanced cryptographic system that's known to be insecure to quantum computing, which means they'll be equally far behind when we actually need stuff that's hardened against quantum magic."

some people take D-Wave's press releases about how they have a 2000 qbit system seriously I guess

either that or have a definition of rapidly approaching that includes things that might happen in 4 or 5 years

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

Klyith posted:

"Linux doesn't support this advanced cryptographic system that's known to be insecure to quantum computing, which means they'll be equally far behind when we actually need stuff that's hardened against quantum magic."

some people take D-Wave's press releases about how they have a 2000 qbit system seriously I guess

either that or have a definition of rapidly approaching that includes things that might happen in 4 or 5 years
I would very much like to see their definition of support for Curve25519

Rufus Ping
Dec 27, 2006





I'm a Friend of Rodney Nano
he probably means the kernel crypto api which only supports the unsafe nist p-192 and p-256 curves for ecdh

e: https://github.com/torvalds/linux/blob/master/crypto/ecdh.c#L33

Rufus Ping fucked around with this message at 21:49 on Sep 16, 2018

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

Rufus Ping posted:

he probably means the kernel crypto api which only supports the unsafe nist p-192 and p-256 curves for ecdh

e: https://github.com/torvalds/linux/blob/master/crypto/ecdh.c#L33
drat...guess I'll stick with Windows and macOS

Adbot
ADBOT LOVES YOU

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Rufus Ping posted:

he probably means the kernel crypto api which only supports the unsafe nist p-192 and p-256 curves for ecdh

e: https://github.com/torvalds/linux/blob/master/crypto/ecdh.c#L33

drat, I get not supporting every latest curve or whatever but 25519 is 13 years old and the NIST curves are from what, 1996?

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply