search for: gutmann

Displaying 14 results from an estimated 14 matches for "gutmann".

Did you mean: guthmann
2015 Jan 05
2
Fwd: [Cryptography] Why aren’t we using SSH for everything?
There were a few notes in this thread that may indicate open areas for development. I forward merely as FYI. http://www.metzdowd.com/pipermail/cryptography/2015-January/024231.html ---------- Forwarded message ---------- From: Peter Gutmann <pgut001 at cs.auckland.ac.nz> Date: Sun, Jan 4, 2015 at 9:29 PM Subject: Re: [Cryptography] Why aren?t we using SSH for everything? To: calestyo at scientia.net, pgut001 at cs.auckland.ac.nz Cc: cryptography at metzdowd.com Christoph Anton Mitterer <calestyo at scientia.net> writes: &...
2004 Mar 03
1
Big VPN
Richard Atterer wrote: >On Tue, Mar 02, 2004 at 10:00:58PM +0100, I.R. van Dongen wrote: > > >>You might want to check tinc (http://tinc.nl.linux.org) >> >> > >I strongly recommend *not* to use tinc. ><http://www.securityfocus.com/archive/1/249142> illustrates that the >authors didn't have enough expertise to build a secure tool 2 years ago.
2012 Nov 14
1
[olug] TINC
...topher-olug at zyp.org>wrote: > On Tue, Nov 13, 2012 at 5:04 PM, Sam Flint <harmonicnm7h at gmail.com> wrote: > > Does anyone have experience with tinc vpn? > > It was not looked on particularly favorably in a comparison some years > ago by well known cryptographer Peter Gutmann: > http://www.cs.auckland.ac.nz/~pgut001/pubs/linux_vpn.txt > > Admittedly, that review was from 2003. However, one of the things > that post discusses in length, and does a great job of illustrating, > is that security software like VPNs are difficult to get right, and > very ea...
2003 Sep 26
0
Security issues in tinc
Hello, More than a week ago Peter Gutmann contacted us and showed us a writeup in which he analysed CIPE, VTun and tinc. A few days ago he posted this to a cryptography mailing list, and someone posted this on Slashdot. In response we've added a new section to the website dedicated to the current security issues. Currently, you can fin...
2003 Sep 26
0
Security issues in tinc
Hello, More than a week ago Peter Gutmann contacted us and showed us a writeup in which he analysed CIPE, VTun and tinc. A few days ago he posted this to a cryptography mailing list, and someone posted this on Slashdot. In response we've added a new section to the website dedicated to the current security issues. Currently, you can fin...
2002 Nov 08
2
ext3 and secure deletion of files and file slack
...aster, you may add -l (one random pass, on 0xff pass) or -ll (one 0xff pass) to the parameters. The secure overwrite mode works that way: 1x overwrite with 0xff 5x random passes 28x overwriting with special values to make the recovery from MFM and RLL encoded harddisks hard/impossible - see Gutmann's paper on that which is also included. 5x random passes __________________________________________________ Do You Yahoo!? Everything you'll ever need on one web page from News and Sport to Email and Music Charts http://uk.my.yahoo.com
2015 Jan 06
2
RE: Fwd: [Cryptography] Why aren’t we using SSH for everything?
...2015, grarpamp wrote: > There were a few notes in this thread that may indicate open areas for > development. I forward merely as FYI. > > http://www.metzdowd.com/pipermail/cryptography/2015-January/024231.htm > l > > ---------- Forwarded message ---------- > From: Peter Gutmann <pgut001 at cs.auckland.ac.nz> > Date: Sun, Jan 4, 2015 at 9:29 PM > Subject: Re: [Cryptography] Why aren?t we using SSH for everything? > To: calestyo at scientia.net, pgut001 at cs.auckland.ac.nz > Cc: cryptography at metzdowd.com > > Christoph Anton Mitterer <calestyo...
2005 Jan 16
1
Designing Tinc with Threads and Groups
Hello All, I have been trying to get a feel for the Tinc sources because I would like to see about developing a version of Tinc that uses threads and also incorporated the idea of groups so that when a user starts up their daemon they can join one or more groups. I know that you can establish multiple "networks" on a single daemon, but from what I understand, you also have to have
2001 May 01
1
connecting to non-responding hosts: 1 hr timeout (fwd)
Hello all, If you try to make a TCP connection to a host, and the host is down, timeouts can be as long as an hour. This is not specific to ssh, or OS. Is this a scenario worth working around, e.g. with a timer when connecting or the like? -- Pekka Savola "Tell me of difficulties surmounted, Netcore Oy not those you stumble over and fall" Systems.
2004 May 28
4
sftp Client for Windows XP
Folks, Excuse my ignorance on the subject but I'm new to OpenSSH and have been tasked to write a 'sftp' Client for a home-grown application that runs on a Windows platform. The answers to my questions is probably on the List Archives but I'm not able to find it even after a few search attempts. So here goes... 1. Is it possible to even write a custom 'sftp' client for
2018 Apr 02
2
What is the universal (world wide) understanding behind degaussing harddisks?
...ootable Live CD/DVD/flash media could do it. (2) 3-pass U.S. Government/Department of Defense (DoD) standard (DoD 5220.22-M) Certified commercial software required (3) 7-pass U.S. Government/Department of Defense (DoD) standard (DoD 5220.22-M) Certified commercial software required (4) 35-pass Gutmann method, slowest Certified commercial software required All these was last Friday. In the midst of our argument over the cellular network "just now", my sales manager Edward Snowden tried to cover up himself by suddenly and unexpectedly making an excuse that he had told me last Friday I...
2015 Apr 07
2
OpenSSH 6.6.x sends invalid SSH_MSG_USERAUTH_INFO_REQUEST
Darren Tucker <dtucker at zip.com.au> writes: >That's a vendor-modified version of OpenSSH. Assuming it corresponds to >what's in FreeBSD head, there's about a thousand lines of changes. Ugh. >Can you reproduce the problem with an unmodified version from openssh.com? >Failing that, can you get the server-side debug output from a failing >connection (ie
2020 Feb 09
2
[RFC PATCH] Add SHA1 support
...gt;h4 = INIT_DATA_h4; + return 1; +} + +#define K_00_19 0x5a827999UL +#define K_20_39 0x6ed9eba1UL +#define K_40_59 0x8f1bbcdcUL +#define K_60_79 0xca62c1d6UL + +/* + * As pointed out by Wei Dai, F() below can be simplified to the code in + * F_00_19. Wei attributes these optimizations to Peter Gutmann's SHS code, + * and he attributes it to Rich Schroeppel. + * #define F(x,y,z) (((x) & (y)) | ((~(x)) & (z))) + * I've just become aware of another tweak to be made, again from Wei Dai, + * in F_40_59, (x&a)|(y&a) -> (x|y)&a + */ +#define F_00_19(b,c,d) ((((c) ^...
2008 Aug 28
3
potential wiki on encryption
Hello all, I posted the whole disk encryption instructions in the forum that has been briefly discussed on the list. I joined the list per Ned's post on the thread. http://www.centos.org/modules/newbb/viewtopic.php?viewmode=flat&topic_id=15923&forum=42 I have a couple of questions about the process of creating a wiki. 1. How does the peer-review process work? 2. Is there a place