Canonical Wikileaks URLs and SSL certificate fingerprints.

Official Wikileaks document submission URLs:

https://sunshinepress.org/
http://suw74isz7wqzpmgu.onion/ (Tor only)

Source: /pictures/the_next_hope-2010/img_1624.jpg, taken 17 July 2010 at the keynote address. Image taken of Jacob Appelbaum's presentation slide.

Official SHA-256, SHA-1, and MD5 fingerprints of the Wikileaks document submission URLs:

SHA-256:
85:C3:77:8E:7F:BC:96:42:CF:EE:03:B0:AC:4A:2A:26:
15:18:CB:50:41:EC:7A:2A:CC:9F:56:60:67:94:04:7E

SHA-1:
68:C3:4B:3D:05:7A:53:E3:8C:FE:
71:F1:30:3D:8A:AD:8E:33:0A:76

MD5 …

Read more...

"MD5 considered harmful today"... but why?

If you've been following net.news in the past twenty-four to forty-eight hours you heard about what went down at the Chaos Computer Congress yesterday - a group of security researchers figured out how to exploit the flaws in the MD5 hash algorithm to forge CA certificates, thus placing SSL encryption as we know it in jeopardy.

...right? Breaking SSL is bad, yeah?

Like many things in life (and nearly everything in cryptography) it's not that simple or that straightforward. Yes, this is bad, but it's not "go back to punchcards" bad.

Let's take it step by step. First of all …

Read more...

Random knowledge VIII.

You're getting old if you consider sleeping until 0900 'sleeping in'.



When configuring a firewall with IPTables you have to specify the protocol before the port number(s) in each command. Do this:

iptables -A INPUT -s 1.2.3.4 -p tcp --dport 22 -j ACCEPT

and not this

iptables -A INPUT -s 1.2.3.4 --dport 22 -p tcp -j ACCEPT

If you don't, you'll see error messages to the effect of "Unknown arg '--dport'"

When writing Snort rules, there are a few things to keep in mind. First of all, rules come in two parts: the …

Read more...