Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:DD-WRT? (Score 2) 200

I'm pretty sure DD-WRT doesn't generate a new certificate every reboot, and if it did, generating a new private key would be a required part of that (the private/public keypair are generated in tandem as a necessary step of RSA).

Comment Re:DD-WRT? (Score 2, Informative) 200

I recently just reinstalled DD-WRT on my router for various irrelevant reasons. However, I had set it up with remote SSH access on a non-standard port so I could tunnel through it to my home web server to retrieve documents and such. I just did this over the weekend, and today (my first day back at work since) I ssh'd into it, and was presented with a prompt by PuTTY to accept the key fingerprint. So, it appears, a unique key is generated at least between firmware installs.

Comment Re:what? (Score 5, Informative) 200

1) Router administrator negotiates an HTTPS or SSH session with a router or other hardware
2) Attacker is either listening passively or is a man in the middle (via ARP poisoning or what have you). Because they have the private key, they can advertise themselves as being the router without raising the alarm with your SSH client or browser
3) You provide credentials to the router (or MITM). The credentials are logged by the attacker
4) You proceed to do whatever you intended to do in the router's configuration, and log out.
5) Some time later, the attacker logs into the router as you, and makes nefarious changes to the router configuration (such as uploading compromised firmware which logs traffic, or has a backdoor, etc). Any changes done look like they've been done by the router administrator.

I don't know how likely this is in a work scenario though; I haven't searched the database for common mid-level to enterprise routers/remotely configurable switches. More than likely, in a work situation, you'd be using hardware which generates a key pair upon initial configuration. The scenario above is more likely to apply to SOHO, or to consumer wireless hardware in the home.

Comment New Years (Score 3, Insightful) 422

Christmas for me is a formality, where I have to be at a certain place at a certain time with certain people so as to make my family happy.

New Years on the other hand has fewer constraints. Depending on what I feel like doing that year, I can stay in and surf the web in a drunken haze or go out with friends and work on my hangover for next morning.

Comment Re:But there is a causal link (Score 2) 112

I'm pretty sure the article has no opinion on the link between the local population size and birth rate (where obviously the birth rate is proportional to the local population size). It means to test people's aptitude to incorrectly jump to a casual link between two related--but definitely not causally related--variables.

Comment DMCA notice (Score 1) 161

ctrl+f "DMCA" in that article doesn't find anything. Has this Righthaven organization heard of the DMCA, and the provisions it provides for relief from copyright infringement? Seems like a textbook case for a DMCA takedown notice. IANAL, but I imagine a judge will take one look at this and say "did you even TRY to work something out with the infringing party before litigating?"

Comment Raw sockets and Windows (Score 4, Interesting) 390

As I recall, LOIC is for use with Windows machines. If that's the case, the likely reasoning behind not using any identity-concealing techniques is Windows raw socket restrictions. They're flooding web servers, and TCP packets can't be sent with raw sockets, so there's not much else to do other than repeatedly open valid connections (from the Windows platform).
Encryption

SHA-3 Finalist Candidates Known 194

Skuto writes "NIST just announced the final selection of algorithms in the SHA-3 hash competition. The algorithms that are candidates to replace SHA-2 are BLAKE, Grøstl, JH, Keccak and Skein. The selection criteria included performance in software and hardware, hardware implementation size, best known attacks and being different enough from the other candidates. Curiously, some of the faster algorithms were eliminated as they were felt to be 'too fast to be true.' A full report with the (non-)selection rationale for each candidate is forthcoming."

Comment Re:quit with the gossip (Score 4, Interesting) 469

Agreed on the point of less gossip. Leaks which indicate abuses on the part of the government--such as ordering surveillance of questionable legality or pressuring governments to not serve international arrest warrants--are what should be the highest priority as far as government leaks are concerned. I applaud WikiLeaks for releasing such information, as well as the Iraq War log. But from what I can tell, so far, this information is minimal in the most recent release. It seems that the bulk of this release solely seeks to portray the US in a bad light in a subject matter that's pretty wholly irrelevant (I expect every government uses similar such candid assessments of their foreign counterparts). I'd have wished to see more such evidence of abuse in this release, as they apparently have much more of that in the works.

Slashdot Top Deals

Never test for an error condition you don't know how to handle. -- Steinbach

Working...