https://gist.github.com/ryancdotorg/21ac76c3c9087d109f5eb28c0705281d
Conversation
Notices
-
Embed this notice
Ryan Castellucci :nonbinary_flag: (ryanc@infosec.exchange)'s status on Wednesday, 06-Mar-2024 10:02:56 JST Ryan Castellucci :nonbinary_flag:
-
Embed this notice
Ryan Castellucci :nonbinary_flag: (ryanc@infosec.exchange)'s status on Wednesday, 06-Mar-2024 10:04:24 JST Ryan Castellucci :nonbinary_flag:
The fact that I have a tool sitting around that can produce such abominations is kinda cursed.
In conversation permalink -
Embed this notice
Ryan Castellucci :nonbinary_flag: (ryanc@infosec.exchange)'s status on Wednesday, 06-Mar-2024 10:08:47 JST Ryan Castellucci :nonbinary_flag:
That key should be well-formed, though if you want to use it with OpenSSL you'll have to patch out the limits on the maximum number of primes you can have...
In conversation permalink -
Embed this notice
Ryan Castellucci :nonbinary_flag: (ryanc@infosec.exchange)'s status on Wednesday, 06-Mar-2024 10:10:03 JST Ryan Castellucci :nonbinary_flag:
@xabean cackle
In conversation permalink -
Embed this notice
Ryan Castellucci :nonbinary_flag: (ryanc@infosec.exchange)'s status on Wednesday, 06-Mar-2024 10:14:15 JST Ryan Castellucci :nonbinary_flag:
@srslypascal The is absolutely nothing stopping me from embedding arbitrary nonsense into the base64 data 🤔
In conversation permalink -
Embed this notice
srslypascal (srslypascal@chaos.social)'s status on Wednesday, 06-Mar-2024 10:14:17 JST srslypascal
@ryanc Puts the "party" in "multiparty RSA" 🥳🎉
In conversation permalink -
Embed this notice
kajer (kajer@infosec.exchange)'s status on Wednesday, 06-Mar-2024 10:17:14 JST kajer
@ryanc nice
In conversation permalink Ryan Castellucci :nonbinary_flag: repeated this. -
Embed this notice
Ryan Castellucci :nonbinary_flag: (ryanc@infosec.exchange)'s status on Wednesday, 06-Mar-2024 10:24:54 JST Ryan Castellucci :nonbinary_flag:
https://gist.github.com/ryancdotorg/31c158b4bb5d72734a806636e44961ae
In conversation permalink Attachments
-
Embed this notice
srslypascal (srslypascal@chaos.social)'s status on Wednesday, 06-Mar-2024 10:27:09 JST srslypascal
@ryanc
"6.1.5 Key sizesFor RSA key pairs the CA SHALL:
• Ensure that the private key is composed of at least 2048 primes, and;
• Ensure that the number of primes is evenly divisible by 8"
In conversation permalink -
Embed this notice
Ryan Castellucci :nonbinary_flag: (ryanc@infosec.exchange)'s status on Wednesday, 06-Mar-2024 10:27:47 JST Ryan Castellucci :nonbinary_flag:
@srslypascal :chefkiss:
In conversation permalink -
Embed this notice
Ryan Castellucci :nonbinary_flag: (ryanc@infosec.exchange)'s status on Wednesday, 06-Mar-2024 10:41:28 JST Ryan Castellucci :nonbinary_flag:
In conversation permalink Attachments
-
Embed this notice
srslypascal (srslypascal@chaos.social)'s status on Wednesday, 06-Mar-2024 10:41:29 JST srslypascal
@ryanc
Up next: To prevent key collisions, create a public LDAP server where people can publish the primes they're using so nobody else uses them by accident.In conversation permalink -
Embed this notice
Ryan Castellucci :nonbinary_flag: (ryanc@infosec.exchange)'s status on Wednesday, 06-Mar-2024 10:42:52 JST Ryan Castellucci :nonbinary_flag:
@srslypascal also i publish my week-old primes in dns, lol
In conversation permalink
-
Embed this notice