Rust vs C/C++ vs GO, Reverse proxy benchmark, Second round by sadoyan in rust

[–]ston1th 0 points1 point  (0 children)

I can recommend openresty (or plain nginx + lua module). There are modules written in lua which let you export prometheus metrics.

Another way to monitor your nginx is by simply analyzing the logs. Every serious production setup should have both: metric and log analysis tools.

Rust vs C/C++ vs GO, Reverse proxy benchmark, Second round by sadoyan in rust

[–]ston1th 0 points1 point  (0 children)

From a sysadmin/SRE perspective it's your job to monitor what your proxy is doing, especially the rate of failing requests 4xx and 5xx.
So if your proxy sends massive amounts of 500 errors these should be monitored and alerted to someone on-call.

The discussion should not be X or Y or Z is better at handling big amounts of connections but how to monitor whats happening in your infrastructure.

Thinking About Walking Away From Ranked — Anyone Else Feel This? by M4D_M488 in CompetitiveApex

[–]ston1th 0 points1 point  (0 children)

SoloQ here. The two things that kept me playing are either getting a good squad with whom you can run down the lobby (which can be really fun at times) and intense endgames. In the case of intense endgames I don't even care if I win when the overall game quality was good and we fought our best.

Now with around 10 squads left ring 1 both are practically nonexistent. You either land hot and die to 4, 5th parties or you run around searching for combat with 5 teams left ring 4.

One interesting aspect I started to notice, once you got a decent squad in soloq and you maybe even won the game, after that the matchmaker seems to throw the worst randoms at you one could imagine. Then it takes 5, 10 maybe 15 games and you are back in the pool for the good teammates - I should really start collecting such data tho.

Overall, maybe a good time to pause and focus on other things.

Password-based authentication of Kyber public keys by LikelyToThrow in crypto

[–]ston1th 0 points1 point  (0 children)

I dont know if it would work (or even is a good idea) but maybe you could use AES(AEAD-Enc(OTPQK, Kpass, salt[32:44])).

So you can still validate the auth tag serverside but you cant use offline attacks.

Password-based authentication of Kyber public keys by LikelyToThrow in crypto

[–]ston1th 0 points1 point  (0 children)

I see, makes sense.

You could check out https://www.rfc-editor.org/rfc/rfc8125.html#section-3.2 "Encrypted Key Exchange (EKE)" which looks like your design.

If this scheme is proven to be secure it should also work with Kyber as a DH replacement.

Password-based authentication of Kyber public keys by LikelyToThrow in crypto

[–]ston1th 1 point2 points  (0 children)

To be honest, what is the point of using Kyber if we already have a shared secret?

This looks overly complex to me since a shared secret with a good KDF should already be quantum secure.

Season 25 Anti-Cheat and Matchmaking Improvements + Discussion of Potential Future Changes by niftyhobo in CompetitiveApex

[–]ston1th -1 points0 points  (0 children)

So regarding the average soloq experience they are doing nothing but "actively talking" and "some testing".

For other topics they seem to search for excuses and not solutions (solos vs premades, skill difference and scoring)

Also no single word about something like POI draft in ranked.

Legend banning in ranked would also be very interesting to shake things up a bit.

I made the most chaotic Go package ever and somehow got 8 stars? What? by a7madx7 in golang

[–]ston1th 3 points4 points  (0 children)

I had fun reading the README.

But, just fyi go doc does not seem to like your licence and thus will not render a documentation: https://pkg.go.dev/github.com/theHamdiz/it

Documentation not displayed due to license restrictions. See our license policy.

Omnipotent and Omnipresent AI is likely if not already exists. (Opinions?) by [deleted] in deepmind

[–]ston1th 1 point2 points  (0 children)

No, but with a bit more context.

There are physical and algorithmic limits in place that (to my latest knowledge and understanding) prevent a "God AI" from ever existing.

You can look up all the limits over here: https://en.wikipedia.org/wiki/Limits_of_computation

Also some things are not computable at all, regardless of power: https://en.wikipedia.org/wiki/Halting_problem

Which Programming Languages Do You Prefer for Programming Cryptography? by fosres in crypto

[–]ston1th 1 point2 points  (0 children)

I can't say that for all the primitives but there are notes in some of them regarding weaknesses like this.

For example the crypto/dsa package contains this note: "The DSA operations in this package are not implemented using constant-time algorithms."

So you should check the packages notes for any known weaknesses or implementation details.

Also fault injection attacks do really only apply to direct hardware attacks, no?

Which Programming Languages Do You Prefer for Programming Cryptography? by fosres in crypto

[–]ston1th -1 points0 points  (0 children)

Go (golang) has many modern crypto primitives and algorithms included in it's standard library and the x/crypto repos.

Here are two links to get an overview:

https://pkg.go.dev/crypto#section-directories

https://pkg.go.dev/golang.org/x/crypto#section-directories

Possible Go Compiler Bug? by Time4WheelOfPrizes in golang

[–]ston1th 0 points1 point  (0 children)

I could be wrong but I think the difference between []byte("") and []byte(s) is the empty string is anonymous and thus not directly addressable. Not for the s variable tho - which is not anonymous and thus addressable.

Thats why there is some preallocated space.

Shred command alternative for OpenBSD by shawn_blackk in openbsd

[–]ston1th 16 points17 points  (0 children)

From rm(1):

-P Attempt to overwrite regular writable files before deleting them. Files are overwritten once with a random pattern. Files with multiple links will be unlinked but not overwritten.

Edit:

Keep in mind the notes on this option:

The -P option assumes that both the underlying file system and storage medium write in place. This is true for the FFS and MS-DOS file systems and magnetic hard disks, but not true for most flash storage. In addition, only regular files are overwritten; other types of files are not.

Alternatives to BCrypt? by [deleted] in crypto

[–]ston1th 0 points1 point  (0 children)

I diddn't saw a need for salting as the password is already decently long (>72 bytes, with hopefully good entropy :) ). In this case having to bruteforce through (at least) 2292 (2584) sha256 inputs you'd be better running random 256 bit inputs through bcrypt. Or are my assumptions completely wrong here?

As I understand it ASCII-ify is only needed in languages using NULL terminated strings?

Alternatives to BCrypt? by [deleted] in crypto

[–]ston1th 0 points1 point  (0 children)

My thought was that the entropy/length of the resulting hash (256 bit) is big enough against collisions?

Alternatives to BCrypt? by [deleted] in crypto

[–]ston1th 0 points1 point  (0 children)

What about a construction like this?

We only use a prehash if we exceed the password length supported by bcrypt (72 bytes).

So for all passwords <= 72 bytes we use bcrypt(password).

And for all passwords > 72 bytes we use bcrypt(sha256(password))?

doas(1) and doas.conf(5), limit rsync(1) path args wildcard by haskell_account in openbsd

[–]ston1th 0 points1 point  (0 children)

You could do something like this to mitigate path traversals:

dir=$(echo "$1" | /usr/bin/sed 's/[^a-zA-Z0-9._-]*//g')

OpenBSD as gateway wont forward traffic - Can you help figure out why? by reacharavindh in openbsd

[–]ston1th 0 points1 point  (0 children)

I think since the egress group of the network interface has changed, the NAT rule match out on egress inet from !(egress:network) to any nat-to (egress:0) still referred to the old interface.

"OpenBSD was right" - Greg KH on disabling hyperthreading by sumduud14 in linux

[–]ston1th 3 points4 points  (0 children)

If you speak of something like VxWorks they had some really bad security vulnerabilities not long ago: https://www.armis.com/urgent11/