shincert | 8 years ago | on: Ask HN: How have you successfully simplified your life?
shincert's comments
shincert | 8 years ago | on: Ask HN: How have you successfully simplified your life?
shincert | 8 years ago | on: Ask HN: Secure DNS resolution in a system
That was very enlightening, thank you for your help.
I can see it won't improve my trust on the OCSP responses or CRLs, but would it not be desirable to encrypt as much traffic (i.e. DNS queries) as I can in an effort to prohibit a potential attacker from employing traffic analysis techniques with the goal to learn something? This hypothetical scenario doesn't seem so farfetched to me.
Eventually, my encrypted DNS query will be forwarded to a DNS resolver that doesn't employ encryption and it will be in the clear, but how would the attacker know where to look next? If the original DNS query is encrypted, an attacker sniffing the network will not be able to know which DNS resolver the query was forwarded to, right? If so then he can't follow up on that and I've successfully disabled it from learning what the DNS query was about.
In short, I am not trying to increase my trust in the exchanges, but rather hide them as much as possible for the sake of obscurity. Is this reasonable?
shincert | 8 years ago | on: Ask HN: Secure DNS resolution in a system
I will make sure that's the case. What I didn't explain yet is that I am doing this for a university project and I am fishing for extra points. So I was trying to justify running my own DNS server. Is it reasonable?
> I don't think there's much more you can really do (as the DNS queries/responses will travel over the Internet "in the clear" -- and, thus, subject to tampering/modification).
I really should have done more research on this, but I imagined I could encrypt the DNS queries themselves and forward them to a public recursive DNS server. Could I not use DNSCRYPT or DNS-over-TLS for this purpose?
> Also, an attacker could block your HTTP requests (for CRL downloads/OCSP queries). How does your application react when it doesn't get a response? "Fail open" or "fail closed"?
Assuming the server has at least downloaded an initial CRL, I could always fallback to that. I haven't played much with this yet, but I think that's the big advantage of a CRL versus an OCSP query, no?
I guess I should "fail closed" to cover all holes but then I'm basically letting the attacker DoS the server. What is best?
shincert | 8 years ago | on: Predict the future with Machine Learning
shincert | 8 years ago | on: Shoelace.css – A back to the basics CSS starter kit
shincert | 8 years ago | on: Shoelace.css – A back to the basics CSS starter kit
shincert | 8 years ago | on: Shoelace.css – A back to the basics CSS starter kit
shincert | 8 years ago | on: Shoelace.css – A back to the basics CSS starter kit
This PR will reduce the size down to 18KB.
shincert | 8 years ago | on: Ask HN: Where should I keep my recovery codes (Google account for exemple)?
shincert | 8 years ago | on: Ask HN: What are the best books on modern computer graphics?
shincert | 8 years ago | on: Ask HN: What are some small scripts you use daily?
shincert | 8 years ago | on: Ask HN: What are some small scripts you use daily?
shincert | 8 years ago | on: Ask HN: What are some small scripts you use daily?
shincert | 9 years ago | on: How to write a simple operating system
shincert | 9 years ago | on: Ask HN: What are your favorite browser extensions?
Privacy Badger
The Great Suspender
No History
HTTPS Everywhere
Refined Wikipedia
shincert | 9 years ago | on: Takeover.sh – Wipe and reinstall a running Linux system via SSH without reboot
shincert | 9 years ago | on: KeepassXC – A cross-platform community fork of KeepassX
shincert | 9 years ago | on: Register-based VMs have a higher performance than stack-based VMs
shincert | 9 years ago | on: The cryptopals crypto challenges