Discussion:
How are the remailers protecting their remailer servers?
(too old to reply)
Nomen Nescio
2018-03-11 21:51:12 UTC
Permalink
In article
Most are probably using RSA. Since the NSA and other intels were in on the RSA diluting so that it could be more easily broken, it would seem wise that all remailers switch to Curve25519 (ECC) keys to access their servers. This is not difficult to do.
And what makes you so sure that NSA promoted Curve#$%^& is more secure
than well understood and implemented RSA?
speaking for myself, i helped break rsa. use anything but.
Nomen Nescio
2018-03-11 23:04:15 UTC
Permalink
Most are probably using RSA. Since the NSA and other intels were in on the RSA diluting so that it could be more easily broken, it would seem wise that all remailers switch to Curve25519 (ECC) keys to access their servers. This is not difficult to do.
Use PUTTYGEN.EXE that comes in the Putty folder.
1. Check the EC25519 button at the bottom.
2. Click Generate.
3. Save public key. Save private key.
5. Add the newly generated public key into the /root/.ssh/authorized_keys file on the server.
5. Login
Already done here. I would suggest that you backup the server first and then duplicate your Putty AES login session and then modify the new session with the new key. Then you can fall back on your AES login if the 25519 doesn't work for some reason. After the 25519 login is working, you need to delete the AES pub key from the authorized_keys file or an AES attack can still be performed.
attack my aes-256 all you want. you and i will both be dead for
a century before anyone ever sees any results - even with
quantum computing.
Nomen Nescio
2018-03-14 23:37:26 UTC
Permalink
Post by Nomen Nescio
In article
Most are probably using RSA. Since the NSA and other intels were in on the RSA diluting so that it could be more easily broken, it would seem wise that all remailers switch to Curve25519 (ECC) keys to access their servers. This is not difficult to do.
And what makes you so sure that NSA promoted Curve#$%^& is more secure
than well understood and implemented RSA?
speaking for myself, i helped break rsa. use anything but.
So how long does it take the NSA to break a 4096-bit RSA key?

Loading...