norden.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Moin! Dies ist die Mastodon-Instanz für Nordlichter, Schnacker und alles dazwischen. Folge dem Leuchtturm.

Administered by:

Server stats:

3.5K
active users

#tls

7 posts7 participants0 posts today

About a third of the WWW #TLS traffic is using post-quantum encryption, which is protected against quantum factoring attacks such as Shor's algorithm. This has been achieved since Hybrid ML-KEM has been widely adopted by most web browsers and large service providers such as Cloudflare, Google, AWS, etc. There are no absolute figures available, but for example, Cloudflare has nice statistics about PQ encryption use on their services: radar.cloudflare.com/adoption-

The best part of this adoption is that users haven't had to do anything, or even know that this has been happening. As it should be.

Replied in thread

@jeremiah_ @elb #NNCPNET, the new #NNCP-based email network, now has a bidirectional, opt-in, Internet #email bridge! salsa.debian.org/jgoerzen/dock

This gates Internet email to/from NNCP. The bridge is off by default. It is a full participant in #SPF, #DKIM, #DMARC, and #TLS in both directions.

Yes, now you can get Internet email straight to your #RaspberryPi ! (And even without this, your Pis can email each other!)

GitLabIntroduction to the Internet Bridge · Wiki · John Goerzen / Docker container for email over NNCP · GitLabDebian Salsa Gitlab

In the hope that someone here knows more Java than .. asking for a friend ... or something:

Is there a way to get more information from #Java when outbound #TLS connections fail (trust issues, for example)? And I do not want to enable debugging in the JVM; that would give me gigabytes of logs per second (yes, really). I basically want the application to make a connection, see it fail, and then handle that exception cleanly while also picking up precisely what the error was: Unknown CA, expired certificate, invalid usage flags, etc.

I'm clearly not a Java developer, just a sysadmin who is really frustrated with the extremely unhelpful Internet right now. I really don't need to be told "just turn off validation" or "just use ...javax.net.debug".

pleroma.anduin.netAnduin.net
Die Bibliothek OpenSSL implementiert die Verschlüsselungsprotokolle TLS, DTLS und QUIC. Ihre neue Version bricht in einigen Bereichen mit der Abwärtskompatibilität, unterstützt Service Side QUIC und kennt die PQC-Algorithmen ML-KEM, ML-DSA und SLH-DS…#OpenSSL #QUIC #Sicherheit #TLS
OpenSSL 3.5.0 kennt Server-Side-QUIC und unterstützt PQC-Algorithmen - LinuxCommunity
LinuxCommunity · OpenSSL 3.5.0 kennt Server-Side-QUIC und unterstützt PQC-Algorithmen - LinuxCommunityDie Bibliothek OpenSSL implementiert die Verschlüsselungsprotokolle TLS, DTLS und QUIC. Ihre neue Version bricht in einigen Bereichen mit der Abwärtskompatibilität, unterstützt Service Side QUIC und kennt die PQC-Algorithmen ML-KEM, ML-DSA und SLH-DSA. An diesen Post-Quantum-Cryptography-Verfahren (PQC) sollen sich selbst Quantencomputer die Zähne ausbeißen. Wer OpenSSL 3.5.0 einsetzt, sollte sich auf ein paar Inkompatibilitäten einstellen. So kommt bei den drei Kommandos „req“, „cms“ und „smime“ jetzt standardmäßig das Verschlüsselungsverfahren „aes-256-cbc“ zum Einsatz. Es löst das zuvor genutzte „des-ede3-cb“ ab. Hierbei geht es allerdings nur um die Standardeinstellungen, welche die Entwickler auch an anderen Stellen verändert haben. So bieten die TLS Keyshares jetzt „X25519MLKEM768“ und „X25519“ an. Des Weiteren gelten die mit „BIO_meth_get_“ beginnenden Funktionen als veraltet (depricated). Zusammengehörende Verschlüsselungsverfahren sind in Group Lists zusammengefasst. OpenSSL 3.5.0 enthält und bevorzugt ab sofort hybride PQC KEM Gruppen. Zudem haben die Entwickler einige in der Praxis unbenutzte Gruppen aus dem Standard-Gruppenangebot entfernt. Über die neue Einstellung „no-tls-deprecated-ec“ ignoriert OpenSSL alle TLS Groups, die der RFC8422-Standard als „depricated“ ansieht. Des Weiteren dürfen FIPS-Provider in der Konfiguration via „enable-fips-jitter“ die JITTER Seed Source wählen.

Released: #swad v0.1 🥳

Looking for a simple way to add #authentication to your #nginx reverse proxy? Then swad *could* be for you!

swad is the "Simple Web Authentication Daemon", written in pure #C (+ #POSIX) with almost no external dependencies. #TLS support requires #OpenSSL (or #LibreSSL). It's designed to work with nginx' "auth_request" module and offers authentication using a #cookie and a login form.

Well, this is a first release and you can tell by the version number it isn't "complete" yet. Most notably, only one single credentials checker is implemented: #PAM. But as pam already allows pretty flexible configuration, I already consider this pretty useful 🙈

If you want to know more, read here:
github.com/Zirias/swad

Simple Web Authentication Daemon. Contribute to Zirias/swad development by creating an account on GitHub.
GitHubGitHub - Zirias/swad: Simple Web Authentication DaemonSimple Web Authentication Daemon. Contribute to Zirias/swad development by creating an account on GitHub.
Continued thread

System Administration

Week 8, The Simple Mail Transfer Protocol, Part II

In this video, we observe the incoming mail on our MTA, look at how STARTTLS can help protect information in transit, how MTA-STS can help defeat a MitM performing a STARTTLS-stripping attack, and how DANE can be used to verify the authenticity of the mail server's certificate.

youtu.be/RgEiAOKv640

youtu.be- YouTubeEnjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

This morning I spent some time debugging an app which logs as if it's AD 57203, to wit

{"level":20,"time":1742987150412,"pid":1, ...

$ date -r 1742987150412
Fri Jan 24 10:20:12 CET 57203

but it turns out the other instance (the one that works, as in the user is able to download files from there) has roughly the same time internally, so *that* was not its main problem.

Mind boggled, debugging to continue until *something* improves.

So after listening to your feedback, I agree: let’s spend that money in the EU to create a publicly-owned, free and open ACME-compatible certificate authority.

See post quoted below, with links to Tom’s work as he’s already been thinking/working on this.

#EU #ACME #TLS #security #LetsEncrypt #technologyCommons #SmallTech mamot.fr/@tdelmas/114224564125

Mamot - Le Mastodon de La Quadrature du Net Tom (@tdelmas@mamot.fr)@aral@mastodon.ar.al Or let's use the protocol they created - ACME - to create more independent CA, EU-based ! https://github.com/tdelmas/Let-s-Clone

🚨 Let’s Encrypt at risk from Trump cuts to OTF: “Let’s Encrypt received around $800,000 in funding from the OTF”

Dear @EUCommission, get your heads out of your arses and let’s find @letsencrypt €1M/year (a rounding error in EU finances) and have them move to the EU.

If Let’s Encrypt is fucked, the web is fucked, and the Small Web is fucked too. So how about we don’t let that happen, yeah?

(In the meanwhile, if the Let’s Encrypt folks want to make a point about how essential they are, it might be an idea to refuse certificates to republican politicians. See how they like their donation systems breaking in real time…)

CC @nlnet @NGIZero@mastodon.xyz

#USA #fascism #OpenTechFund #LetsEncrypt #SSL #TLS #encryption #EU #web #tech #SmallWeb #SmallTech mastodon.social/@publictorsten

Mastodonpublictorsten (@publictorsten@mastodon.social)Wenn Let’s Encrypt plötzlich nicht mehr klappt, wird das halbe Internet aus Zertifikatsfehlern bestehen. https://www.heise.de/news/Nach-Trump-Dekret-Kampf-um-US-Foerdermittel-fuer-Tor-F-Droid-und-Let-s-Encrypt-10328226.html