The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,854 other subscribers

Archive for the ‘Security’ Category

Heittps enabled – a hardest part of https-ing a suite of sites is getting rid of “Mixed Content”

Posted by jpluimers on 2016/09/26

“Heittps enabled.” and working for most parts: Verschlüsselung: heise online und Heise-Onlinedienste per HTTPS erreichbar heise.de [WayBack]

A hard part in getting there is fixing “Mixed Content” errors. Report them at https://www.heise.de/newsticker/meldung/Verschluesselung-heise-online-und-Heise-Onlinedienste-per-HTTPS-erreichbar-3331421.html

Earlier this Dutch tech site did the same: Tweakers stapt over op https – Waarom https? – Achtergrond – Tweakers [WayBack] and faced similar “Mixed Content” fixing challenges [WayBack].

–jeroen

Source: Na endlich. – Kristian Köhntopp – Google+

 

Posted in https, Security | Leave a Comment »

Cool: HTTPSWatch tracks the HTTPS support of prominent websites.

Posted by jpluimers on 2016/09/23

HTTPSWatch tracks the HTTPS support of prominent websites.

Source: HTTPSWatch | Global

Like on the right side.

https isn’t everywhere yet, but growing.

–jeroen

Posted in https, Power User, Security | Leave a Comment »

How to disable your security questions at “Personal Info – Yahoo Account Settings”

Posted by jpluimers on 2016/09/23

Steps to disable the security questions in Yahoo:

  1. Logon at https://login.yahoo.com
  2. At the top right, click on your name, hover over your name and click “Account Info” to get to Personal Info – Yahoo Account Settings – https://login.yahoo.com/account/personalinfo
  3. On the left menu, click on “Account Security”.
  4. Click “Disable security questions”.

    Disable security questions - yahoo thinks they're a bad idea anyway

    Disable security questions – yahoo thinks they’re a bad idea anyway

  5. In the dialog, click “Yes, secure my account”
  6. In the next dialog, click “Close”
  7. Then verify your other security options (like phone/email recovery and two-factor logon) to enhance your security even more.

–jeroen

Posted in Power User, Security | Leave a Comment »

certificate – What is a Pem file and how does it differ from other OpenSSL Generated Key File Formats? – Server Fault

Posted by jpluimers on 2016/08/29

The canonical answer on extensions and formats like csr, pem, key, pkcs12, pfx, p12, der, cet, cer, crt, p7b, crl, PEM, PKCS7, PKCS12, PKCS10, DER, text, binary, ASN1: certificate – What is a Pem file and how does it differ from other OpenSSL Generated Key File Formats? – Server Fault.

Oh and it contains some openssl conversion tips as well, though this link has more: DER vs. CRT vs. CER vs. PEM Certificates and How To Convert Them.

–jeroen

Posted in Encryption, OpenSSL, Power User, Security | Leave a Comment »

Webserver cipher hardening links

Posted by jpluimers on 2016/08/26

There are quite a few pages on Webserver Cypher Hardening. This is yet another one born because I didn’t know how to compare these lists and why they were so different.

Apparently, OpenSSL has various ways of naming (groups of) cyphers. OpenSSL also disregards any cyphers it doesn’t have.

Basically there are two far ends for cypher lists:

  1. Fully name all cyphers and their order: long list fine grained control
  2. Name groups including group order and let OpenSSL expand the groups: short list but coarse grained control.

A way to compere them using openssl ciphers -V is answered at ssl – Hardening web server cyphers: which cypher list to choose, or how to map between Mozilla and Hynek – Server Fault.

Some of the cypher lists I found:

There are two great SSL tests I found out. The first one is online, the second one from the shell.

  1. SSL Labs:
  2. shell based SSL/TLS tester: testssl.sh.

–jeroen

Posted in *nix, OpenSSL, Power User, Security | Leave a Comment »

Builds ChaCha20 version of openssl on Mac OS X static without dylib for use with testssl.sh

Posted by jpluimers on 2016/08/17

A while ago, testssl.sh [WayBack] needed Darwin binaries (for OS X): Supply Darwin binaries + install documentation · Issue #127 · drwetter/testssl.sh [WayBack]

So I created the small Bourne shell (sh) script below to deliver them.

It allows me to update these gists:

The build script itself is in a gist as well: https://gist.github.com/f4de3937630b87753133.git [WayBack]

It helped me to contribute to these testssl.sh issues:

Not all of these binaries are in https://github.com/drwetter/testssl.sh/tree/master/bin [WayBack] as it makes the testssl.sh repository too bloated. Some (including non-OSX builds made by others) are here:

Eventually the script might get merged into https://github.com/drwetter/testssl.sh/blob/master/utils/make-openssl.sh [WayBack] as there is a Darwin switch in this commit: https://github.com/drwetter/testssl.sh/commit/6efc3e90f52e5926b0853d3b2fb221b631dcf452 [WayBack]

Read the rest of this entry »

Posted in Apple, Development, Mac, Mac OS X / OS X / MacOS, Mac OS X 10.4 Tiger, Mac OS X 10.5 Leopard, Mac OS X 10.6 Snow Leopard, Mac OS X 10.7 Lion, MacBook, MacBook Retina, MacBook-Air, MacBook-Pro, MacMini, OpenSSL, OS X 10.10 Yosemite, OS X 10.8 Mountain Lion, OS X 10.9 Mavericks, Power User, Security, Software Development, xCode/Mac/iPad/iPhone/iOS/cocoa | Leave a Comment »

Windows Flaw Reveals Microsoft Account Passwords, VPN Credentials

Posted by jpluimers on 2016/08/08

Attack from the ’90s resurfaces more deadly than before

Source: Windows Flaw Reveals Microsoft Account Passwords, VPN Credentials

TL;DR: block LAN->WAN port 445

Note this won’t affect web-dav shares like \live.sysinternals.com\DavWWWRoot as that uses ports 443 and 80.

–jeroen

via:

Posted in Communications Development, Development, https, Internet protocol suite, Microsoft Surface on Windows 7, NTLM, Power User, Security, SMB, TCP, WebDAV, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows 9, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows Vista, Windows XP | Leave a Comment »

testssl.sh on BashOnWindows (Ubuntu from Win10) – drwetter/testssl.sh

Posted by jpluimers on 2016/08/08

It works (but is sloooooow)

Source: BashonWindows (Ubuntu from Win10) not finding openssl · Issue #337 · drwetter/testssl.sh

Posted in Encryption, Hashing, https, OpenSSL, Power User, Security, testssl.sh | Leave a Comment »

Frequent password changes are the enemy of security, FTC technologist says – via Kristian Köhntopp – Google+

Posted by jpluimers on 2016/08/03

Frequent password changes are the enemy of security, FTC technologist says

Source: Kristian Köhntopp – Google+

Since the 1980s I’ve been advocating the above opinion and I’m glad some people now agree with me.

If you ever hire or employ me and force such a regular password change policy upon me without allowing me to use a password manager that can communicate securely with the cloud (which means you don’t play TLS man-in-the-middle) then I will either:

  • create a password-change script that invalidates the password history you keep and re-use my really secure password of choice.
  • if that fails: add an incrementing value to a reasonably secure base password.

–jeroen

Posted in Power User, Security | Leave a Comment »

tls – How can I verify that SSLv3 protocol is disabled? – Information Security Stack Exchange

Posted by jpluimers on 2016/07/25

Interesting:

just for completeness:

testssl.sh is a nice, console-based tool to check ssl-setups of any ssl/ts – enabled servers, in oposite to ssllabs

It helped me solving this:

Host: http://www.beginend.net

Reason: error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 alert handshake failure

Within the testssl.sh directory, you can use this to test with many cyphers:

OPENSSL=./openssl-bins/openssl-1.0.2-chacha.pm/openssl32-1.0.2pm-krb5.chacha+poly ./testssl.sh www.example.com

–jeroen

via

Posted in *nix, https, OpenSSL, Power User, Security | Leave a Comment »