Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

Even bytes get lonely for a little bit.


computers / alt.privacy.anon-server / Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory

SubjectAuthor
* Possible QSL Security Vulnerability: OpenSSL Security AdvisoryNomen Nescio
+* Re: Possible QSL Security Vulnerability: OpenSSL Security Advisorybitster
|+* Re: Possible QSL Security Vulnerability: OpenSSL Security AdvisoryAnonymous
||`- Re: Possible QSL Security Vulnerability: OpenSSL Security Advisoryanonymous
|`* Re: Possible QSL Security Vulnerability: OpenSSL Security Advisoryinvisible
| +* Re: Possible QSL Security Vulnerability: OpenSSL Security Advisoryanon
| |`* Re: Possible QSL Security Vulnerability: OpenSSL Security Advisorygeo
| | `- Re: Possible QSL Security Vulnerability: OpenSSL Security AdvisoryYamn Remailer
| `* Re: Possible QSL Security Vulnerability: OpenSSL Security Advisoryelvis-85792
|  `- Re: Possible QSL Security Vulnerability: OpenSSL Security Advisoryquiet feet
`- Re: Possible QSL Security Vulnerability: OpenSSL Security Advisoryelvis-85792

1
Possible QSL Security Vulnerability: OpenSSL Security Advisory

<4fa228e72e9bb6eee1694805c8321b11@dizum.com>

  copy mid

https://news.novabbs.com/computers/article-flat.php?id=13583&group=alt.privacy.anon-server#13583

  copy link   Newsgroups: alt.privacy.anon-server
From: nob...@dizum.com (Nomen Nescio)
Subject: Possible QSL Security Vulnerability: OpenSSL Security Advisory
Message-ID: <4fa228e72e9bb6eee1694805c8321b11@dizum.com>
Date: Thu, 9 Feb 2023 16:39:59 +0100 (CET)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Nomen Nescio - Thu, 9 Feb 2023 15:39 UTC

Dated February 7, 2023

https://www.openssl.org/news/secadv/20230207.txt

Is QSL vulnerable?

Would the libraries need to be updated?

Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory

<619e8cc9f36c8bfa87b786bcb3890c9b@dizum.com>

  copy mid

https://news.novabbs.com/computers/article-flat.php?id=13584&group=alt.privacy.anon-server#13584

  copy link   Newsgroups: alt.privacy.anon-server
From: non...@anon.com (bitster)
References: <4fa228e72e9bb6eee1694805c8321b11@dizum.com>
Subject: Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory
Message-ID: <619e8cc9f36c8bfa87b786bcb3890c9b@dizum.com>
Date: Thu, 9 Feb 2023 19:35:16 +0100 (CET)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: bitster - Thu, 9 Feb 2023 18:35 UTC

On 09 Feb 2023, Nomen Nescio <nobody@dizum.com> posted some
news:4fa228e72e9bb6eee1694805c8321b11@dizum.com:

> Dated February 7, 2023
>
> https://www.openssl.org/news/secadv/20230207.txt
>
> Is QSL vulnerable?

Probably. Does it apply?
> Would the libraries need to be updated?

Think about it. Applying Occam's razor, the origin and destination are
essentially confined in interactive scope. Meaning if QSL is vulnerable,
so is the entire remailer network.

Ask yourself this question, "Does my QSL client send anything in an
unencrypted X.400 format during interaction with a mixmaster remailer
server"?

Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory

<6aeeb96cb7b7ee7d7caf49e0fe174aa6@remailer.paranoici.org>

  copy mid

https://news.novabbs.com/computers/article-flat.php?id=13585&group=alt.privacy.anon-server#13585

  copy link   Newsgroups: alt.privacy.anon-server
From: nob...@remailer.paranoici.org (Anonymous)
References: <619e8cc9f36c8bfa87b786bcb3890c9b@dizum.com>
Subject: Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory
Message-ID: <6aeeb96cb7b7ee7d7caf49e0fe174aa6@remailer.paranoici.org>
Date: Thu, 9 Feb 2023 19:12:41 +0000 (UTC)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!news.neodome.net!news.uzoreto.com!alphared!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Anonymous - Thu, 9 Feb 2023 19:12 UTC

On 2/9/2023 10:35 AM, bitster wrote:

> On 09 Feb 2023, Nomen Nescio <nobody@dizum.com> posted some
> news:4fa228e72e9bb6eee1694805c8321b11@dizum.com:
>
>> Dated February 7, 2023
>>
>> https://www.openssl.org/news/secadv/20230207.txt
>>
>> Is QSL vulnerable?
>
> Probably. Does it apply?
>
>> Would the libraries need to be updated?
>
> Think about it. Applying Occam's razor, the origin and destination are
> essentially confined in interactive scope. Meaning if QSL is vulnerable,
> so is the entire remailer network.
>
> Ask yourself this question, "Does my QSL client send anything in an
> unencrypted X.400 format during interaction with a mixmaster remailer
> server"?
>

Absolutely. You're right.

I wasn't trying to inject FUD here.

I do specifically recall some years back, in response
to the SSL Heartbleed vulnerability, Richard updated
the SSL libraries and issued an update to the QSL program.

My concern is, Richard is no longer around to do an update
if it was required.

Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory

<e0676702866abfadf0ad433f1e49b19f@dizum.com>

  copy mid

https://news.novabbs.com/computers/article-flat.php?id=13586&group=alt.privacy.anon-server#13586

  copy link   Newsgroups: alt.privacy.anon-server
From: anonym...@example.org (anonymous)
References: <619e8cc9f36c8bfa87b786bcb3890c9b@dizum.com>
<6aeeb96cb7b7ee7d7caf49e0fe174aa6@remailer.paranoici.org>
Subject: Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory
Message-ID: <e0676702866abfadf0ad433f1e49b19f@dizum.com>
Date: Fri, 10 Feb 2023 00:35:54 +0100 (CET)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: anonymous - Thu, 9 Feb 2023 23:35 UTC

On 09 Feb 2023, Anonymous <nobody@remailer.paranoici.org> posted some
news:6aeeb96cb7b7ee7d7caf49e0fe174aa6@remailer.paranoici.org:

>
> On 2/9/2023 10:35 AM, bitster wrote:
>
>> On 09 Feb 2023, Nomen Nescio <nobody@dizum.com> posted some
>> news:4fa228e72e9bb6eee1694805c8321b11@dizum.com:
>>
>>> Dated February 7, 2023
>>>
>>> https://www.openssl.org/news/secadv/20230207.txt
>>>
>>> Is QSL vulnerable?
>>
>> Probably. Does it apply?
>>
>>> Would the libraries need to be updated?
>>
>> Think about it. Applying Occam's razor, the origin and destination
>> are essentially confined in interactive scope. Meaning if QSL is
>> vulnerable, so is the entire remailer network.
>>
>> Ask yourself this question, "Does my QSL client send anything in an
>> unencrypted X.400 format during interaction with a mixmaster remailer
>> server"?
>>
>
>
> Absolutely. You're right.
>
> I wasn't trying to inject FUD here.
>
> I do specifically recall some years back, in response
> to the SSL Heartbleed vulnerability, Richard updated
> the SSL libraries and issued an update to the QSL program.
>
> My concern is, Richard is no longer around to do an update
> if it was required.

This?

2014-11-20 v1.0.8
1) UPDATED MIXMASTER TO 3.0.3a
2) Updated openssl to 1.0.1i
3) Added mixmaster version to the QSL About Box.
4) Fix bug in selecting final remailer from remailer
group.
5) Fixed a bug in allpingers selection. The list of stats
sources was not being cleared before the new sources
are added. Fixed.
6) Set QSL's SSL component to use TLS only. No SSLv2 and
no SSlv3.

Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory

<slrntub71v.5td.elvis-85792@notatla.org.uk>

  copy mid

https://news.novabbs.com/computers/article-flat.php?id=13587&group=alt.privacy.anon-server#13587

  copy link   Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx16.iad.POSTED!not-for-mail
Newsgroups: alt.privacy.anon-server
From: elvis-85...@notatla.org.uk
Subject: Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory
References: <4fa228e72e9bb6eee1694805c8321b11@dizum.com>
X-noarchive: yes
X-no-archive: yes
User-Agent: slrn/1.0.3 (Linux)
Message-ID: <slrntub71v.5td.elvis-85792@notatla.org.uk>
Lines: 16
X-Complaints-To: abuse@blocknews.net
NNTP-Posting-Date: Fri, 10 Feb 2023 01:22:09 UTC
Organization: blocknews - www.blocknews.net
Date: Fri, 10 Feb 2023 01:22:09 GMT
X-Received-Bytes: 1017
 by: elvis-85...@notatla.org.uk - Fri, 10 Feb 2023 01:22 UTC

On 2023-02-09, Nomen Nescio <nobody@dizum.com> wrote:
> Dated February 7, 2023
>
> https://www.openssl.org/news/secadv/20230207.txt
>
> Is QSL vulnerable?
>
> Would the libraries need to be updated?

Most OpenSSL bugs involve checking of chains
of certificates and do not concern us here.

The advisory says "When CRL checking is enabled".
CRL = Certificate Revocation List

So it shouldn't affect programs only using crypto features.

Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory

<ts4am1$1bv5f$1@paganini.bofh.team>

  copy mid

https://news.novabbs.com/computers/article-flat.php?id=13588&group=alt.privacy.anon-server#13588

  copy link   Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!paganini.bofh.team!not-for-mail
From: invisi...@none.com (invisible)
Newsgroups: alt.privacy.anon-server
Subject: Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory
Date: Fri, 10 Feb 2023 02:37:54 -0000 (UTC)
Organization: To protect and to server
Message-ID: <ts4am1$1bv5f$1@paganini.bofh.team>
References: <4fa228e72e9bb6eee1694805c8321b11@dizum.com> <619e8cc9f36c8bfa87b786bcb3890c9b@dizum.com>
Injection-Date: Fri, 10 Feb 2023 02:37:54 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="1440943"; posting-host="n7CFmy7YQ5Gh8s3mGpH7gQ.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: Xnews/2006.08.24
Cancel-Lock: sha256:OdLIwlIsAD3KICC5O3V87vCKHX6EOzRpVi0IphtoQiw=
X-Notice: Filtered by postfilter v. 0.9.3
 by: invisible - Fri, 10 Feb 2023 02:37 UTC

On 09 Feb 2023, bitster <none@anon.com> posted some
news:619e8cc9f36c8bfa87b786bcb3890c9b@dizum.com:

> On 09 Feb 2023, Nomen Nescio <nobody@dizum.com> posted some
> news:4fa228e72e9bb6eee1694805c8321b11@dizum.com:
>
>> Dated February 7, 2023
>>
>> https://www.openssl.org/news/secadv/20230207.txt
>>
>> Is QSL vulnerable?
>
> Probably. Does it apply?
>
>> Would the libraries need to be updated?
>
> Think about it. Applying Occam's razor, the origin and destination
> are essentially confined in interactive scope. Meaning if QSL is
> vulnerable, so is the entire remailer network.
>
> Ask yourself this question, "Does my QSL client send anything in an
> unencrypted X.400 format during interaction with a mixmaster remailer
> server"?

novell...????

Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory

<bc96006cb1e1474f8de3f0d3c9a91255@dizum.com>

  copy mid

https://news.novabbs.com/computers/article-flat.php?id=13592&group=alt.privacy.anon-server#13592

  copy link   Newsgroups: alt.privacy.anon-server
From: ano...@anon.not (anon)
References: <4fa228e72e9bb6eee1694805c8321b11@dizum.com>
<619e8cc9f36c8bfa87b786bcb3890c9b@dizum.com>
<ts4am1$1bv5f$1@paganini.bofh.team>
Subject: Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory
Message-ID: <bc96006cb1e1474f8de3f0d3c9a91255@dizum.com>
Date: Fri, 10 Feb 2023 11:02:27 +0100 (CET)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: anon - Fri, 10 Feb 2023 10:02 UTC

On 09 Feb 2023, invisible <invisible@none.com> posted some
news:ts4am1$1bv5f$1@paganini.bofh.team:

> On 09 Feb 2023, bitster <none@anon.com> posted some
> news:619e8cc9f36c8bfa87b786bcb3890c9b@dizum.com:
>
>> On 09 Feb 2023, Nomen Nescio <nobody@dizum.com> posted some
>> news:4fa228e72e9bb6eee1694805c8321b11@dizum.com:
>>
>>> Dated February 7, 2023
>>>
>>> https://www.openssl.org/news/secadv/20230207.txt
>>>
>>> Is QSL vulnerable?
>>
>> Probably. Does it apply?
>>
>>> Would the libraries need to be updated?
>>
>> Think about it. Applying Occam's razor, the origin and destination
>> are essentially confined in interactive scope. Meaning if QSL is
>> vulnerable, so is the entire remailer network.
>>
>> Ask yourself this question, "Does my QSL client send anything in an
>> unencrypted X.400 format during interaction with a mixmaster remailer
>> server"?
>
> novell...????

Certainly! All remailer servers run off a specially modified Novell
Netware X.400 NDS using hybrid IPX/SPX bridging and Gropewise Massaging.

Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory

<guvcuh9ls8f3bas1qrp3jrhpvuv96pqae0@4ax.com>

  copy mid

https://news.novabbs.com/computers/article-flat.php?id=13594&group=alt.privacy.anon-server#13594

  copy link   Newsgroups: alt.privacy.anon-server
From: geo...@wxyz.com
Newsgroups: alt.privacy.anon-server
Subject: Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory
Date: Fri, 10 Feb 2023 11:33:46 -0600
Message-Id: <guvcuh9ls8f3bas1qrp3jrhpvuv96pqae0@4ax.com>
References: <4fa228e72e9bb6eee1694805c8321b11@dizum.com> <619e8cc9f36c8bfa87b786bcb3890c9b@dizum.com> <ts4am1$1bv5f$1@paganini.bofh.team> <bc96006cb1e1474f8de3f0d3c9a91255@dizum.com>
X-Newsreader: Forte Agent 1.93/32.576 English (American)
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Lines: 18
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!feeder.usenetexpress.com!tr2.iad1.usenetexpress.com!news.newsgroupdirect.com!not-for-mail
Nntp-Posting-Date: Fri, 10 Feb 2023 17:33:48 +0000
Organization: NewsgroupDirect
X-Complaints-To: abuse@newsgroupdirect.com
X-Received-Bytes: 1450
 by: geo...@wxyz.com - Fri, 10 Feb 2023 17:33 UTC

On Fri, 10 Feb 2023 11:02:27 +0100 (CET), anon <anon@anon.not> wrote:

>On 09 Feb 2023, invisible <invisible@none.com> posted some
>news:ts4am1$1bv5f$1@paganini.bofh.team:
>
>> On 09 Feb 2023, bitster <none@anon.com> posted some

>>>
>>> Ask yourself this question, "Does my QSL client send anything in an
>>> unencrypted X.400 format during interaction with a mixmaster remailer
>>> server"?
>>
>> novell...????
>
>Certainly! All remailer servers run off a specially modified Novell
>Netware X.400 NDS using hybrid IPX/SPX bridging and Gropewise Massaging.

Finally someone gets it right!

Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory

<20230210.185638.8cb4be16@mixmin.net>

  copy mid

https://news.novabbs.com/computers/article-flat.php?id=13596&group=alt.privacy.anon-server#13596

  copy link   Newsgroups: alt.privacy.anon-server
Date: Fri, 10 Feb 2023 18:56:38 +0000
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Subject: Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory
References: <guvcuh9ls8f3bas1qrp3jrhpvuv96pqae0@4ax.com>
Message-Id: <20230210.185638.8cb4be16@mixmin.net>
From: nore...@mixmin.net (Yamn Remailer)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Yamn Remailer - Fri, 10 Feb 2023 18:56 UTC

On 2/10/2023 9:33 AM, geo@wxyz.com wrote:

> On Fri, 10 Feb 2023 11:02:27 +0100 (CET), anon <anon@anon.not> wrote:
>
>> On 09 Feb 2023, invisible <invisible@none.com> posted some
>> news:ts4am1$1bv5f$1@paganini.bofh.team:
>>
>>> On 09 Feb 2023, bitster <none@anon.com> posted some
>
>>>>
>>>> Ask yourself this question, "Does my QSL client send anything in an
>>>> unencrypted X.400 format during interaction with a mixmaster
remailer
>>>> server"?
>>>
>>> novell...????
>>
>> Certainly! All remailer servers run off a specially modified Novell
>> Netware X.400 NDS using hybrid IPX/SPX bridging and Gropewise
Massaging.
>
> Finally someone gets it right!

+1 !!!

Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory

<slrntuhtc6.e3c.elvis-85792@notatla.org.uk>

  copy mid

https://news.novabbs.com/computers/article-flat.php?id=13610&group=alt.privacy.anon-server#13610

  copy link   Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!newsreader4.netcologne.de!news.netcologne.de!peer01.ams1!peer.ams1.xlned.com!news.xlned.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx16.iad.POSTED!not-for-mail
Newsgroups: alt.privacy.anon-server
From: elvis-85...@notatla.org.uk
Subject: Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory
References: <4fa228e72e9bb6eee1694805c8321b11@dizum.com>
<619e8cc9f36c8bfa87b786bcb3890c9b@dizum.com>
<ts4am1$1bv5f$1@paganini.bofh.team>
X-noarchive: yes
X-no-archive: yes
User-Agent: slrn/1.0.3 (Linux)
Message-ID: <slrntuhtc6.e3c.elvis-85792@notatla.org.uk>
Lines: 13
X-Complaints-To: abuse@blocknews.net
NNTP-Posting-Date: Sun, 12 Feb 2023 14:19:50 UTC
Organization: blocknews - www.blocknews.net
Date: Sun, 12 Feb 2023 14:19:50 GMT
X-Received-Bytes: 1188
 by: elvis-85...@notatla.org.uk - Sun, 12 Feb 2023 14:19 UTC

>>> https://www.openssl.org/news/secadv/20230207.txt
>>>
>>> Is QSL vulnerable?

Timing Oracle in RSA Decryption (CVE-2022-4304)

That bit possibly.

That kind of thing is why it's better for a crypto program
to receive traffic and write it to disk with no decryption yet.
Then decrypt it in a process that does no networking and
runs no other programs that do networking. Then send it in a
process that hasn't read any private key.

Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory

<6d485cc3a40ba75e5c48e1cf88fcb69b@dizum.com>

  copy mid

https://news.novabbs.com/computers/article-flat.php?id=13612&group=alt.privacy.anon-server#13612

  copy link   Newsgroups: alt.privacy.anon-server
From: non...@anon.us (quiet feet)
References: <4fa228e72e9bb6eee1694805c8321b11@dizum.com>
<619e8cc9f36c8bfa87b786bcb3890c9b@dizum.com>
<ts4am1$1bv5f$1@paganini.bofh.team>
<slrntuhtc6.e3c.elvis-85792@notatla.org.uk>
Subject: Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory
X-No-Archive: Yes
Message-ID: <6d485cc3a40ba75e5c48e1cf88fcb69b@dizum.com>
Date: Sun, 12 Feb 2023 22:50:28 +0100 (CET)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: quiet feet - Sun, 12 Feb 2023 21:50 UTC

On 12 Feb 2023, elvis-85792@notatla.org.uk posted some
news:slrntuhtc6.e3c.elvis-85792@notatla.org.uk:

>>>> https://www.openssl.org/news/secadv/20230207.txt
>>>>
>>>> Is QSL vulnerable?
>
> Timing Oracle in RSA Decryption (CVE-2022-4304)
>
> That bit possibly.
>
> That kind of thing is why it's better for a crypto program
> to receive traffic and write it to disk with no decryption yet.
> Then decrypt it in a process that does no networking and
> runs no other programs that do networking. Then send it in a
> process that hasn't read any private key.

QSL has the occasional TLS interaction which I believe might be
exploitable if you wanted to put the time and effort into it. That is not
a dig at Richard. He was wrestling with universally flawed
implementations of SSL at the time and took what he felt was the safest
route. Time proved him correct.

Everything has vulnerabilities, some less concerning than others. As you
noted, it depends when certain elements of processing occur. Others
become apparent over time, in some cases mind-numbing development or
manufacturing mistakes that nobody considers looking for. Dell's defunct
DSS product line comes to mind.


computers / alt.privacy.anon-server / Re: Possible QSL Security Vulnerability: OpenSSL Security Advisory

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor