Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Darkly)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. Uncategorized
  3. Me: We all know PGP is bad because it forces you to support legacy bullshit like 1024-bit RSA keys, but I'm specifically going to write a blog post about email encryption as not just a technical challenge.

Me: We all know PGP is bad because it forces you to support legacy bullshit like 1024-bit RSA keys, but I'm specifically going to write a blog post about email encryption as not just a technical challenge.

Scheduled Pinned Locked Moved Uncategorized
4 Posts 3 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Soatok DreamseekerS This user is from outside of this forum
    Soatok DreamseekerS This user is from outside of this forum
    Soatok Dreamseeker
    wrote last edited by
    #1

    Me: We all know PGP is bad because it forces you to support legacy bullshit like 1024-bit RSA keys, but I'm specifically going to write a blog post about email encryption as not just a technical challenge.

    @delta: subtoots my blog post

    Their source code: Disables TLS security to support legacy 1024-bit RSA.

    https://github.com/chatmail/core/blob/9d7db202256ee334260c7ebccc3ab6403ee59a6c/src/net/tls.rs#L27-L40

    Delta ChatD 1 Reply Last reply
    0
    • Soatok DreamseekerS Soatok Dreamseeker

      Me: We all know PGP is bad because it forces you to support legacy bullshit like 1024-bit RSA keys, but I'm specifically going to write a blog post about email encryption as not just a technical challenge.

      @delta: subtoots my blog post

      Their source code: Disables TLS security to support legacy 1024-bit RSA.

      https://github.com/chatmail/core/blob/9d7db202256ee334260c7ebccc3ab6403ee59a6c/src/net/tls.rs#L27-L40

      Delta ChatD This user is from outside of this forum
      Delta ChatD This user is from outside of this forum
      Delta Chat
      wrote last edited by
      #2

      @soatok please read more carefully the source code. You are in the "else" branch of "if strict_tls" and strict_tls is True by default.

      It's pretty deep down in advanced menus to opt out of the default strict tls handling (with RustTLS btw). Opt out is needed for some users who would otherwise have no TLS at all in their national environment, and where they often use public WIFIs, so eavesdropping cleartext from people around is trivial but cracking RSA1024 is not.

      Soatok DreamseekerS 1 Reply Last reply
      0
      • Delta ChatD Delta Chat

        @soatok please read more carefully the source code. You are in the "else" branch of "if strict_tls" and strict_tls is True by default.

        It's pretty deep down in advanced menus to opt out of the default strict tls handling (with RustTLS btw). Opt out is needed for some users who would otherwise have no TLS at all in their national environment, and where they often use public WIFIs, so eavesdropping cleartext from people around is trivial but cracking RSA1024 is not.

        Soatok DreamseekerS This user is from outside of this forum
        Soatok DreamseekerS This user is from outside of this forum
        Soatok Dreamseeker
        wrote last edited by
        #3

        @delta No, I understood the context. I just think it's hilarious that you think you're the exception when your code has a very clear example of the kind of shitty hacks needed for backwards compatibility.

        mkjM 1 Reply Last reply
        0
        • Soatok DreamseekerS Soatok Dreamseeker

          @delta No, I understood the context. I just think it's hilarious that you think you're the exception when your code has a very clear example of the kind of shitty hacks needed for backwards compatibility.

          mkjM This user is from outside of this forum
          mkjM This user is from outside of this forum
          mkj
          wrote last edited by
          #4

          @soatok Meanwhile, Signal having no fallback to plaintext. And I would genuinely be *extremely* surprised if it has a fallback that allows using 1024-bit RSA in a mode where invalid certificates and incorrect certificate hostnames are accepted…

          Almost makes me curious if there is any way whatsoever to trick a user into having not strict_tls there. Not curious enough to go digging through the code, though.

          1 Reply Last reply
          1
          0
          • R AodeRelay shared this topic
          Reply
          • Reply as topic
          Log in to reply
          • Oldest to Newest
          • Newest to Oldest
          • Most Votes


          • Login

          • Don't have an account? Register

          • Login or register to search.
          Powered by NodeBB Contributors
          • First post
            Last post
          0
          • Categories
          • Recent
          • Tags
          • Popular
          • World
          • Users
          • Groups