101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

486
active users

#pbkdf2

0 posts0 participants0 posts today
🅴🆁🆄🅰 🇷🇺Про #<a class="" href="https://hub.hubzilla.de/search?tag=GRUB" rel="nofollow noopener" target="_blank">GRUB</a> можно позабыть уже несколько лет как — явно находится под чьим-то влиянием и до сих пор отказывается реализовать поддержку #<a class="" href="https://hub.hubzilla.de/search?tag=LUKS" rel="nofollow noopener" target="_blank">LUKS</a> 2-й версии, в части использования #<a class="" href="https://hub.hubzilla.de/search?tag=Argon2" rel="nofollow noopener" target="_blank">Argon2</a> / #<a class="" href="https://hub.hubzilla.de/search?tag=Argon2id" rel="nofollow noopener" target="_blank">Argon2id</a>.<br><br>Важно это потому, что в мире полно ферм для майнинга криптовалют, так или иначе арестованных органами общественного правопорядка. Это изначально специализированные #<a class="" href="https://hub.hubzilla.de/search?tag=ASIC" rel="nofollow noopener" target="_blank">ASIC</a> для перебора значений hash-функций. В результате, стало возможным взламывать грубой силой почти все варианты дискового шифрования, если для хранения пароля используются обычные #<a class="" href="https://hub.hubzilla.de/search?tag=PBKDF2" rel="nofollow noopener" target="_blank">PBKDF2</a> / #<a class="" href="https://hub.hubzilla.de/search?tag=PBKDF" rel="nofollow noopener" target="_blank">PBKDF</a>, не адаптированные под противодействие крипто-майнинговым фермам. Примером, нормальной современной #<a class="" href="https://hub.hubzilla.de/search?tag=PBKDF" rel="nofollow noopener" target="_blank">PBKDF</a> является тот же #<a class="" href="https://hub.hubzilla.de/search?tag=Argon2" rel="nofollow noopener" target="_blank">Argon2</a> и его вариации.<br><br>Альтернатива в том, что позволяет тот же #<a class="" href="https://hub.hubzilla.de/search?tag=systemd-boot" rel="nofollow noopener" target="_blank">systemd-boot</a>. Например, для полнодискового шифрование через LUKS берётся SSD/NVMe разбитый через #<a class="" href="https://hub.hubzilla.de/search?tag=GPT" rel="nofollow noopener" target="_blank">GPT</a> с выделением раздела EFI System Partition, на котором размещаются образы #<a class="" href="https://hub.hubzilla.de/search?tag=initrd" rel="nofollow noopener" target="_blank">initrd</a> / #<a class="" href="https://hub.hubzilla.de/search?tag=initramfs" rel="nofollow noopener" target="_blank">initramfs</a> и бинарники загрузчика systemd-boot являющиеся EFI-приложением.<br><br>Всё содержимое EFI System Partition может проверяться Secure Boot'ом — быть заверены своим собственным сертификатом в дереве. Не только бинарники, но и текстовые *.conf файлы в /boot/loader/entries/ описывающие каждый вариант загрузки. Поскольку они содержат такие вещи как:<br><pre><code>title&nbsp;&nbsp;&nbsp;&nbsp;... — как зовётся в меню загрузочном<br>linux&nbsp;&nbsp;&nbsp;&nbsp;/vmlinuz-6.6-x86_64 — какое ядро ОС использовать<br>initrd&nbsp;&nbsp;&nbsp;&nbsp;/intel-ucode.img — какой микрокод процессора грузить<br>initrd&nbsp;&nbsp;&nbsp;&nbsp;/initramfs-6.6-x86_64.img — сам загрузочный образ<br>...<br>options quiet — могут быть и в одну строчку все сразу<br>options splash<br>options rd.udev.log_level=3<br>options systemd.show_status=auto<br>options sysrq_always_enabled=1<br>options intel_iommu=on<br>options iommu=pt<br>...</code></pre><br>Т.е. файлы *.conf могут содержать всякие опции/параметры ядра, отвечающие за безопасность работы системы. Например, раздачей <a href="https://habr.com/ru/news/712476/" rel="nofollow noopener" target="_blank">таких рекомендаций</a> недавно развлекался #<a class="" href="https://hub.hubzilla.de/search?tag=%D0%A4%D0%A1%D0%A2%D0%AD%D0%9A" rel="nofollow noopener" target="_blank">ФСТЭК</a> (вот оригинал официальной <a href="https://fstec.ru/normotvorcheskaya/informatsionnye-i-analiticheskie-materialy/2590-informatsionnoe-soobshchenie-fstek-rossii-ot-30-dekabrya-2022-g-n-240-22-6933" rel="nofollow noopener" target="_blank">публикации</a>).<br><br>#<a class="" href="https://hub.hubzilla.de/search?tag=linux" rel="nofollow noopener" target="_blank">linux</a> #<a class="" href="https://hub.hubzilla.de/search?tag=crypto" rel="nofollow noopener" target="_blank">crypto</a> #<a class="" href="https://hub.hubzilla.de/search?tag=lang_ru" rel="nofollow noopener" target="_blank">lang_ru</a>
🅴🆁🆄🅰 🇷🇺Пока #<a class="" href="https://hub.hubzilla.de/search?tag=KDE" rel="nofollow noopener" target="_blank">KDE</a> создаёт свой дистрибутив #<a class="" href="https://hub.hubzilla.de/search?tag=linux" rel="nofollow noopener" target="_blank">linux</a>, что делают гаврики из #<a class="" href="https://hub.hubzilla.de/search?tag=GNOME" rel="nofollow noopener" target="_blank">GNOME</a> ? Прожигают подушку безопасности верстая бюджет с дефицитом! :)<br>И отказываются всего лишь от таких вещей как пара директоров и затраты на транспортировку представителей своего сообщества, управляющего совета и персонала GNOME Foundation на всякие мероприятия. Однако, оставляют расходы на программы оплачиваемых стажировок Outreachy ориентированной на такие социальные группы, которые оказывается слабо представлены в сфере разработки open source (free'шного ПО).<br><br>А в #<a class="" href="https://hub.hubzilla.de/search?tag=KDE" rel="nofollow noopener" target="_blank">KDE</a> просто задолбались с тем, что присутствуют в подавляющем числе дистрибутивов #<a class="" href="https://hub.hubzilla.de/search?tag=linux" rel="nofollow noopener" target="_blank">linux</a> лишь в сильно пропатченом и потому кривом виде (из-за убогости ментейнеров этих дистрибов).<br>Потому KDE и решили делать свой дистриб, на базе #<a class="" href="https://hub.hubzilla.de/search?tag=ArchLinux" rel="nofollow noopener" target="_blank">ArchLinux</a>, в котором #<a class="" href="https://hub.hubzilla.de/search?tag=KDE" rel="nofollow noopener" target="_blank">KDE</a> давным давно присутствует прямо в нативном, неизменённом виде.<br>Причём в KDE весьма разумно подходят к вопросу: <ul><li> обновления системы на базе снапшотов #<a class="" href="https://hub.hubzilla.de/search?tag=btrfs" rel="nofollow noopener" target="_blank">btrfs</a></li><li> с полнодисковым шифрованием диска через #<a class="" href="https://hub.hubzilla.de/search?tag=LUKS" rel="nofollow noopener" target="_blank">LUKS</a></li><li> загрузкой через #<a class="" href="https://hub.hubzilla.de/search?tag=systemd-boot" rel="nofollow noopener" target="_blank">systemd-boot</a> (поскольку #<a class="" href="https://hub.hubzilla.de/search?tag=GRUB" rel="nofollow noopener" target="_blank">GRUB</a> плохо поддерживает LUKS)</li></ul><br>У самого несколько лет именно так и есть — обновления с автоматическими через #<a class="" href="https://hub.hubzilla.de/search?tag=TimeShift" rel="nofollow noopener" target="_blank">TimeShift</a> снапшотами файловой системы (средствами btrfs) при накатывании обновлений или установке софта.<br><br>Полнодисковое шифрование LUKS, возможности которого нормально поддерживает лишь #<a class="" href="https://hub.hubzilla.de/search?tag=systemd-boot" rel="nofollow noopener" target="_blank">systemd-boot</a>, т.е. когда SSD/NVMe разбит через #<a class="" href="https://hub.hubzilla.de/search?tag=GPT" rel="nofollow noopener" target="_blank">GPT</a> и есть раздел EFI System Partition, на котором образы #<a class="" href="https://hub.hubzilla.de/search?tag=initrd" rel="nofollow noopener" target="_blank">initrd</a> / #<a class="" href="https://hub.hubzilla.de/search?tag=initramfs" rel="nofollow noopener" target="_blank">initramfs</a> и бинарники загрузчика могут проверяться Secure Boot'ом.<br><br>А про GRUB можно позабыть уже очень давно, т.к. явно находится под чьим-то влиянием и до сих пор отказывается реализовать поддержку #<a class="" href="https://hub.hubzilla.de/search?tag=LUKS" rel="nofollow noopener" target="_blank">LUKS</a> 2-й версии, в части использования #<a class="" href="https://hub.hubzilla.de/search?tag=Argon2" rel="nofollow noopener" target="_blank">Argon2</a> / #<a class="" href="https://hub.hubzilla.de/search?tag=Argon2id" rel="nofollow noopener" target="_blank">Argon2id</a>.<br><br>Важно это потому, что в мире полно ферм для майнинга криптовалют, так или иначе арестованных органами общественного правопорядка. Это изначально специализированные #<a class="" href="https://hub.hubzilla.de/search?tag=ASIC" rel="nofollow noopener" target="_blank">ASIC</a> для перебора значений hash-функций. В результате, стало возможным взламывать грубой силой почти все варианты дискового шифрования, если для хранения пароля используются обычные #<a class="" href="https://hub.hubzilla.de/search?tag=PBKDF2" rel="nofollow noopener" target="_blank">PBKDF2</a> / #<a class="" href="https://hub.hubzilla.de/search?tag=PBKDF" rel="nofollow noopener" target="_blank">PBKDF</a>, не адаптированные под противодействие крипто-майнинговым фермам. Примером, нормальной современной #<a class="" href="https://hub.hubzilla.de/search?tag=PBKDF" rel="nofollow noopener" target="_blank">PBKDF</a> является тот же #<a class="" href="https://hub.hubzilla.de/search?tag=Argon2" rel="nofollow noopener" target="_blank">Argon2</a> и его вариации.<br><br>Т.е. пока #<a class="" href="https://hub.hubzilla.de/search?tag=GNOME" rel="nofollow noopener" target="_blank">GNOME</a> прожирает средства на всякую откровенную херню, в то же самое время #<a class="" href="https://hub.hubzilla.de/search?tag=KDE" rel="nofollow noopener" target="_blank">KDE</a> заняты весьма годными делами. И лепят вполне современный дистрибутив, закладывая в него более чем разумные практики и вообще, и в том числе, ещё и с дистрибьюцией софта через #<a class="" href="https://hub.hubzilla.de/search?tag=flatpak" rel="nofollow noopener" target="_blank">flatpak</a>.<br><br>#<a class="" href="https://hub.hubzilla.de/search?tag=crypto" rel="nofollow noopener" target="_blank">crypto</a> #<a class="" href="https://hub.hubzilla.de/search?tag=lang_ru" rel="nofollow noopener" target="_blank">lang_ru</a>
LisPi<p><span class="h-card"><a href="https://mk.absturztau.be/@niconiconi" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>niconiconi</span></a></span> <span class="h-card"><a href="https://shitposter.club/users/Moon" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Moon</span></a></span> <span class="h-card"><a href="https://comfy.social/@PeterCxy" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>PeterCxy</span></a></span> <span class="h-card"><a href="https://suya.place/users/a1ba" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>a1ba</span></a></span> Doesn'it still lack support for a bunch of LUKS settings &amp; modes that have been around for a while?</p><p>Or is this warning (<a href="https://wiki.archlinux.org/title/GRUB#Encrypted_/boot" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">wiki.archlinux.org/title/GRUB#</span><span class="invisible">Encrypted_/boot</span></a>) finally obsolete and wrong somewhere?</p><p>At least going by (info "(grub) cryptomount") (<a href="https://www.gnu.org/software/grub/manual/grub/html_node/cryptomount.html" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">gnu.org/software/grub/manual/g</span><span class="invisible">rub/html_node/cryptomount.html</span></a>) on Debian argon2id still isn't supported despite PBKDF2 being recommended against nowadays.</p><p><a href="https://mastodon.top/tags/GRUB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GRUB</span></a> <a href="https://mastodon.top/tags/LUKS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LUKS</span></a> <a href="https://mastodon.top/tags/PBKDF2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PBKDF2</span></a> <a href="https://mastodon.top/tags/PBKDF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PBKDF</span></a> <a href="https://mastodon.top/tags/Argon2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Argon2</span></a> <a href="https://mastodon.top/tags/EncryptedBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EncryptedBoot</span></a></p>
Keywan Tonekaboni<p>LUKS: Alte verschlüsselte Container unsicher? Ein Ratgeber für Updates</p><p>Angeblich konnte die französische Polizei einen LUKS-Container knacken. Kein Grund zur Panik, aber ein Anlass, Passwörter und LUKS-Parameter zu hinterfragen.</p><p><a href="https://www.heise.de/news/Alte-LUKS-Container-unsicher-Ein-kleiner-Update-Ratgeber-8981054.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Alte-LUKS-Contai</span><span class="invisible">ner-unsicher-Ein-kleiner-Update-Ratgeber-8981054.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege</span></a> </p><p><a href="https://social.heise.de/tags/Argon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Argon</span></a> <a href="https://social.heise.de/tags/LUKS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LUKS</span></a> <a href="https://social.heise.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://social.heise.de/tags/PBKDF2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PBKDF2</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/cryptsetup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptsetup</span></a></p>
𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕<p>PSA: upgrade your LUKS key derivation function!</p><p>🔐 <a href="https://mjg59.dreamwidth.org/66429.html" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mjg59.dreamwidth.org/66429.htm</span><span class="invisible">l</span></a></p><p>--<br><a href="https://chaos.social/tags/luks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>luks</span></a> <a href="https://chaos.social/tags/argon2id" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>argon2id</span></a> <a href="https://chaos.social/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> <a href="https://chaos.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://chaos.social/tags/anarchy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anarchy</span></a> <a href="https://chaos.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://chaos.social/tags/pbkdf2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pbkdf2</span></a> <a href="https://chaos.social/tags/anarchist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anarchist</span></a> <a href="https://chaos.social/tags/upgrade" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>upgrade</span></a> <a href="https://chaos.social/tags/psa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>psa</span></a> <a href="https://chaos.social/tags/key" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>key</span></a> <a href="https://chaos.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://chaos.social/tags/datasecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datasecurity</span></a> <a href="https://chaos.social/tags/data" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>data</span></a></p>
Wednesday Links<p>Wednesday Links - Edition 2023-01-11<br><a href="https://dev.to/0xkkocel/wednesday-links-edition-2023-01-11-50e6" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dev.to/0xkkocel/wednesday-link</span><span class="invisible">s-edition-2023-01-11-50e6</span></a><br><a href="https://foojay.social/tags/java" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>java</span></a> <a href="https://foojay.social/tags/jvm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jvm</span></a> <a href="https://foojay.social/tags/jpa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jpa</span></a> <a href="https://foojay.social/tags/springdata" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>springdata</span></a> <a href="https://foojay.social/tags/graalvm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>graalvm</span></a> <a href="https://foojay.social/tags/PBKDF2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PBKDF2</span></a></p>
Jeremi M Gosney :verified:<p>Many of you have been asking for my thoughts on the <a href="https://infosec.exchange/tags/LastPass" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LastPass</span></a> breach, and I apologize that I'm a couple days late delivering. </p><p>Apart from all of the other commentary out there, here's what you need to know from a <a href="https://infosec.exchange/tags/password" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>password</span></a> cracker's perspective!</p><p>Your vault is encrypted with <a href="https://infosec.exchange/tags/AES256" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AES256</span></a> using a key that is derived from your master password, which is hashed using a minimum of 100,100 rounds of PBKDF2-HMAC-SHA256 (can be configured to use more rounds, but most people don't). <a href="https://infosec.exchange/tags/PBKDF2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PBKDF2</span></a> is the minimum acceptable standard in key derivation functions (KDFs); it is compute-hard only and fits entirely within registers, so it is highly amenable to acceleration. However, it is the only <a href="https://infosec.exchange/tags/KDF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KDF</span></a> that is FIPS/NIST approved, so it's the best (or only) KDF available to many applications. So while there are LOTS of things wrong with LastPass, key derivation isn't necessarily one of them.</p><p>Using <a href="https://infosec.exchange/tags/Hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hashcat</span></a> with the top-of-the-line RTX 4090, you can crack PBKDF2-HMAC-SHA256 with 100,100 rounds at about 88 KH/s. At this speed an attacker could test ~7.6 billion passwords per day, which may sound like a lot, but it really isn't. By comparison, the same GPU can test Windows NT hashes at a rate of 288.5 GH/s, or ~25 quadrillion passwords per day. So while LastPass's hashing is nearly two orders of magnitude faster than the &lt; 10 KH/s that I recommend, it's still more than 3 million times slower than cracking Windows/Active Directory passwords. In practice, it would take you about 3.25 hours to run through rockyou.txt + best64.rule, and a little under two months to exhaust rockyou.txt + rockyou-30000.rule. </p><p>Keep in mind these are the speeds for cracking a single vault; for an attacker to achieve this speed, they would have to single out your vault and dedicate their resources to cracking only your vault. If they're trying 1,000 vaults simultaneously, the speed would drop to just 88 H/s. With 1 million vaults, the speed drops to an abysmal 0.088 H/s, or 11.4 seconds to test just one password. Practically speaking, what this means is the attackers will target four groups of users:</p><p>1. users for which they have previously-compromised passwords (password reuse, credential stuffing)<br>2. users with laughably weak master passwords (think top20k)<br>3. users they can phish<br>4. high value targets (celebs, .gov, .mil, fortune 100)</p><p>If you are not in this list / you don't get phished, then it is highly unlikely your vault will be targeted. And due to the fairly expensive KDF, even passwords of moderate complexity should be safe.</p><p>I've seen several people recommend changing your master password as a mitigation for this breach. While changing your master password will help mitigate future breaches should you continue to use LastPass (you shouldn't), it does literally nothing to mitigate this current breach. The attacker has your vault, which was encrypted using a key derived from your master password. That's done, that's in the past. Changing your password will re-encrypt your vault with the new password, but of course it won't re-encrypt the copy of the vault the attacker has with your new password. That would be impossible unless you somehow had access to the attacker's copy of the vault, which if you do, please let me know? </p><p>A proper mitigation would be to migrate to <a href="https://infosec.exchange/tags/Bitwarden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bitwarden</span></a> or <a href="https://infosec.exchange/tags/1Password" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>1Password</span></a>, change the passwords for each of your accounts as you migrate over, and also review the MFA status of each of your accounts as well. The perfect way to spend your holiday vacation! Start the new year fresh with proper password hygiene.</p><p>For more password insights like this, give me a follow!</p>
Yellow Flag<p>I published an article on the <a href="https://infosec.exchange/tags/LastPassBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LastPassBreach</span></a>: <a href="https://palant.info/2022/12/23/lastpass-has-been-breached-what-now/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">palant.info/2022/12/23/lastpas</span><span class="invisible">s-has-been-breached-what-now/</span></a></p><p>This is very serious, no matter what <a href="https://infosec.exchange/tags/LastPass" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LastPass</span></a> says. From the article:</p><p>“This makes it sound like decrypting the passwords you stored with LastPass is impossible. It also prepares the ground for blaming you, should the passwords be decrypted after all: you clearly didn’t follow the recommendations. Fact is however: decrypting passwords is expensive but it is well within reach. And you need to be concerned.”</p><p>Another conclusion from this article: <a href="https://infosec.exchange/tags/PBKDF2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PBKDF2</span></a> is dead. Yes, you have that officially from me. If you still use it, feel free to go and fix that now.</p>