[ / / / / / / / / / / / / / ] [ dir / 8teen / asmr / aus / cafechan / fur / ita / kpop / tijuana ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Name
Email
Subject
Comment *
File
Select/drop/paste files here
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

File (hide): 1e6efead614668a⋯.png (93.83 KB, 1366x768, 683:384, Captura de pantalla (594).png) (h) (u)

[–]

 No.833739>>833903 >>833949 >>834022 [Watch Thread][Show All Posts]

Why companies continue to use MD5. It so difficult use sha256

 No.833770>>833988

Because you don't check the sums anyway


 No.833829>>833972 >>833988 >>834004

You'd better ask why developers don't add PGP signatures to distributed binaries.


 No.833847>>833988

(((Oracle)))

found your problem


 No.833848

Because it works and you're stupid.


 No.833869>>833871 >>834099

speed. if i want to just check that a file downloaded or transferred correctly and the site or it's just a disk to disk transfer and I know it's already good and i don't want to waste the additional 0.5s that better hashing algo's will take.


 No.833871>>833886 >>833888

>>833869

b-but the NSA is watching muh HTTP request to gayfaggot.com with billions of servers just waiting to collide the hash!!!


 No.833886>>833910

>>833871

Yes, they really are fucking waiting to do that if you are a target of interest.


 No.833888>>833988

>>833871

Don't be silly, that will only happen if you use (((https)))


 No.833890>>833913 >>833988

Because companies host their stuff on their own website.

If the sha256 hash and the content associated come from the same source (same server), the hash is only good for error checking.


 No.833903>>833909

>>833739 (OP)

Do you think the NSA can really patch in a backdoor and add enough filler to dupe the MD5 code and keep the file size small enough so that you won't notice?


 No.833909

>>833903

If it's something many people access and do so often, then yes. Like say for example, the linux kernel source code tarballs. Or certain gentoo or arch packages of importance. Use your imagination.


 No.833910>>833920

>>833886

>implying they do not already have all recent unique content seen on HTTP already cached and cracking


 No.833913>>833920

>>833890

Well fucking duh. You're supposed to verify with other sources that the hash is correct.


 No.833920>>833940

>>833913

If everyone else got the faked file, how do you ever know it is correct?

>>833910

>implying they don't already have all content, http or https, cached and being cracked

they don't, it is a crack on demand thing. Not needed for http obviously.


 No.833940

>>833920

>how do you ever know it is correct?

Because theoretically they'd find out at some point if the file is bad. If someone's reported hash from 6 months ago matches yours, you're probably fine.


 No.833949>>834018

>>833739 (OP)

why do companies still have XSS vulns?

why do companies still have SQLi?

why do companies still have RCE?

why do companies still use web?

why do companies be SJW?

why do companies recall 500 products a year?

why do companies run outdated software and software with bad reputations?

why do companies make IoT?

wait if you got a file from a site there's literally no point in it providing a hash unless you have some piece of shit HDD. it either uses HTTP, in which case MiTM can just replace the hash, or HTTPS, in which case the file integrity is already "assured" by HTTPS, and having the hash there provides no extra protection. you should be using something proper like OpenPGP anyway


 No.833972

>>833829

This

You can use MD5 if it's PGP signed there's nothing to worry about.


 No.833988

>>833770

but I do

>>833829

this is a bit more work to check

>>833847

they have sha256 sums for VirtualBox and Java, though

>>833888

lolwat?

are you implying that (((https))) is less safe than (((http)))?

>>833890

if the hash is served over https and the content over http, then it's more than regular error checking.


 No.834004>>834021

>>833829

For a firmware updater I wrote, I get hashes over https then download the firmware unencrypted (it's fairly large, about 160MiB). GnuPG would be a bad idea as it's a lot of bloat to have to install on a system, there's a lot of additional complexity in handling all that and maintaining trust, it requires a different set of credentials than everything else, and it requires clock synchronization for proper trust which isn't practical as many networks block NTP (yes I know they shouldn't).


 No.834018

>>833949

> proper like OpenPGP anyway

... which is used to sign the checksums.


 No.834021>>834102

>>834004

>many networks block NTP

WAT

any proofs on that?


 No.834022>>834621

>>833739 (OP)

>reeee don't use MD5 anymore

Triggered much? MD5 works fine for checking file integrity. No need to use SHA256 for that. You seem to have the newer == better mentality. You're not right friend.


 No.834099

>>833869

>what is blake2

I'll tell you what it is: superior to MD5 in literally every way


 No.834102>>834465

>>834021

I am proofs. I've been building networking devices for two decades and I'm telling you what I run into.


 No.834465>>834472

>>834102

Which ports are commonly open besides 443 and 80?


 No.834472>>834579

>>834465

The issue isn't inbound blocking, it's outbound/session blocking. Even when traffic originates inside the network, the replies are thrown out. NTP is the first that caused me trouble as more retards started tinkering with firewalling, but now major websites are often blocking ICMP unreach replies /to their own traffic/. Zendesk does this, for example.


 No.834579>>834589

>>834472

So in this case which ports are safer to use for traffic that must go in both directions and besides 443 and 80?


 No.834589>>834606 >>834608

>>834579

I really don't understand what you mean. Safer in what way? What is it that you're trying to do?


 No.834606>>834626

>>834589

safer = less likely to be blocked in a random oppressive network.


 No.834608

>>834589

and I'm trying to do somewhat censor proof tunnel, but it must not use 443 or 80 ports because (reasons)


 No.834621

File (hide): caf110e4aebe1fe⋯.jpg (327.25 KB, 1280x905, 256:181, hash1.jpg) (h) (u)

File (hide): 91e34644af1e6c3⋯.jpg (327.25 KB, 1280x985, 256:197, hash2.jpg) (h) (u)

>>834022

For checking integrity against random bitrot, sure. For verifying whether the package has been tampered with in transit, not so much.


 No.834626

>>834606

Oh, what you want is to have a rendezvous outside of the network. Like a STUN server or whatnot - you can reuse whatever anti-NAT tech you prefer. Then establish the connection out and listen on the remote for connections so you don't have to deal with firewalls/IDS blocking incoming.

The VPN service I built for my company uses EC2 boxes for this (I have them connect their branch offices via cellular which are a shitshow for incoming), but be aware that IPs on cloud services are heavily abused and you'll have to deal with being blocked by many websites.




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
32 replies | 1 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / 8teen / asmr / aus / cafechan / fur / ita / kpop / tijuana ][ watchlist ]