{"id":430,"date":"2017-04-19T13:55:14","date_gmt":"2017-04-19T10:55:14","guid":{"rendered":"http:\/\/www1.ngtech.co.il\/wpe\/?p=430"},"modified":"2017-04-19T23:41:58","modified_gmt":"2017-04-19T20:41:58","slug":"encryption-how-far-will-you-go-squid-3-5-25-4-0-19-released","status":"publish","type":"post","link":"https:\/\/www1.ngtech.co.il\/wpe\/2017\/04\/19\/encryption-how-far-will-you-go-squid-3-5-25-4-0-19-released\/","title":{"rendered":"Encryption, how far will you go? \u2013 SQUID 3.5.25 + 4.0.19 RELEASED"},"content":{"rendered":"<h1 style=\"text-align: center;\">Encryption, how far will you go?<br \/>\nSQUID 3.5.25 + 4.0.19 RELEASED<\/h1>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-431 aligncenter\" src=\"http:\/\/www1.ngtech.co.il\/wpe\/wp-content\/uploads\/2017\/04\/under_lock_and_key_by_fading_sunlight-d1y6wog-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/www1.ngtech.co.il\/wpe\/wp-content\/uploads\/2017\/04\/under_lock_and_key_by_fading_sunlight-d1y6wog-300x200.jpg 300w, https:\/\/www1.ngtech.co.il\/wpe\/wp-content\/uploads\/2017\/04\/under_lock_and_key_by_fading_sunlight-d1y6wog-768x512.jpg 768w, https:\/\/www1.ngtech.co.il\/wpe\/wp-content\/uploads\/2017\/04\/under_lock_and_key_by_fading_sunlight-d1y6wog-1024x683.jpg 1024w, https:\/\/www1.ngtech.co.il\/wpe\/wp-content\/uploads\/2017\/04\/under_lock_and_key_by_fading_sunlight-d1y6wog.jpg 1095w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<hr \/>\n<p style=\"text-align: justify;\">Choosing the right path with encryption is a crucial manner in the modern Computers World but I want to take you far behind this era into 2 or 3 hundred years ago.<\/p>\n<p style=\"text-align: justify;\">Back in the 17 centaury there weren&#8217;t as many options to encrypt a message, if you wanted to implement a 512 bits based encryption you would first need to invest a lot of money on traveling and security of the first public key exchanging leaving\u00a0aside the trust you need to have for the key exchange location.<br \/>\nYes it was a complex and an expensive task that only some had the luxury to have, but today we hear &#8220;Let&#8217;s encrypt&#8221;\u00a0on a daily basis.<br \/>\nSo I took couple minutes to try and understand how would a single mind be affected if it would be required to encrypt a conversation.<\/p>\n<p style=\"text-align: justify;\">It&#8217;s not a normal thing to glance at, two persons sitting in a room and talking in an encrypted language. But the only thing they want to say to each other is &#8220;This is not a secure place, we need to go elsewhere&#8221;.<\/p>\n<p style=\"text-align: justify;\">For this single phrase they had a full 2 hours session!<br \/>\nThe first time I have seen such a thing I was stunned but then I started to delve into the depth of &#8220;The Encryption Hell&#8221;. It&#8217;s a place that is reserved for these who would like to talk\u00a0using encryption on anything.<\/p>\n<p style=\"text-align: justify;\">You must first understand that there is a lot of noise surrounding the plain text so you would need to have some way to handle the noise and also to handle the encryption and only then handle the actual conversation. This is the place of uncertainty! In such a world you cannot have some rest for your mind. The brain is always working and thinking about the possibilities. &#8220;Does\u00a0this word means that I need to leave the room this second?&#8221; it&#8217;s really a place that is reserved for these who live in a deception on every move they do.<\/p>\n<p style=\"text-align: justify;\">Here comes in handy the arguments about using open-source or closed-source based encryption systems. When you have an open-souce system you can share with others the methods the concepts and the ideas. Then you may have a chance to get into a better place then to stay in a &#8220;Stand Alone Complex&#8221;. But the closed source has to offer a lot!!<\/p>\n<p style=\"text-align: justify;\">It is possible to have a closed source and still have the benefits of the open-source world just by being connected to the right\u00a0sponsor. The myth that the closed source world cannot offer alternatives or advantages was proven long ago to be a false positive. There is no need to present an argument because the world works this way,\u00a0you can have both security and secrecy!<\/p>\n<p style=\"text-align: justify;\">An example for that is one of the projects I helped long ago to handle as a starter proxy servers admin. I was asked to give help with intercepted traffic analysis. Indeed I could write the proxy but there was some hash embedded into each message that resulted in the team trying to crack it clueless to what behind it.<br \/>\nThe target was to falsify a 128 bit transmission that is being sent over a tcp socket from the client to the passive server. The hacks were required to hack only 128 bits. The end result was that after about couple days they said that the encryption is impenetrable!<\/p>\n<p style=\"text-align: justify;\">What was the blocker, the lack of CPU? it was a team of more then the most talented hackers.<br \/>\nWas it the money? They got a lot of money only for the trial.<br \/>\nWas it RAM? they had a full fledged servers\u00a0flat available only for their use.<br \/>\nSo what was missing?<br \/>\nTwo keys: The main private and the Diffie Helman one.<br \/>\nThis technique has been in use in the world for hundreds of years but not many used it. Not many knew how to use it and not many where able to operate such a cipher system. This is one thing that took empires up and down: Encryption.<\/p>\n<p style=\"text-align: justify;\">For us this &#8220;function&#8221; was off-loaded from the human mind into assisting disposable devices such as a SmartPhone while many do not even know or understand what&#8217;s under the hood. We can walk with an encryption device in our pocket without using any of our brain &#8220;CPU&#8221; and without touching our pocket.<\/p>\n<p style=\"text-align: justify;\">So 128 bits aren&#8217;t that much but if you use them right they would be sufficient and you won&#8217;t be required to recalculate every second the escape route from you current position to a safe state\u00a0or place.<\/p>\n<hr \/>\n<p style=\"text-align: justify;\">One of the most used concepts is\u00a0blending into big crowd\u00a0to loose tracers. It&#8217;s not the most efficient way to do so but if you begin a session in a very noisy place there is a chance you would be able to exchange keys without anyone knowing. So today we have the option\u00a0to\u00a0get some level of secrecy without paying too much like in the old days.<\/p>\n<p style=\"text-align: justify;\">Indeed for a money transfer you would need a big and well shielded truck but with a group of assassins or a well trained ex-army experts you would need couple tiny cars , lot&#8217;s of cash\\gold\\goods and a route. It is possible to secure a transfer without using the &#8220;Heavy Gear&#8221; but with the &#8220;Right Team&#8221;!<\/p>\n<p style=\"text-align: justify;\">It&#8217;s a known way to run\u00a0security and\u00a0my way of things is to help others with it.<\/p>\n<p style=\"text-align: justify;\">I asked myself couple times in the past: Should I start an encrypted session? And then I noticed that it&#8217;s not required to invent keys, I already have them. My ancestors left me with many keys and many ways to encrypt even in the harshest conditions.<\/p>\n<p style=\"text-align: justify;\">I have a library which I use as a delta and reference daily to analyse and decrypt the most hardened and complex minds in the world.\u00a0I can say that I have secrets but I daily lock them and throw the key. After each time I am throwing the key I am chanting a secret spell that was passed in my family for ages and I remeber that we are all in the same boat and in the moment I will try to dig a hole in our unified boat we will all sink together.<\/p>\n<p style=\"text-align: justify;\">So how far will you go deep into hell to throw your keys? will you use\u00a0your Cerberus to defend this ship? will you throw your\u00a0given keys to hell ie the most secured place in the entire universe?<\/p>\n<p style=\"text-align: justify;\">Diffie Helman is one of the most proven method for forward secrecy of encryption and I am using it daily long before it was introduced to the public SSL world.\u00a0I took couple trips to hell because of it but eventually even the most notorious psychiatrists and therapists declared that I am a proof of a truely hardened human.<\/p>\n<hr \/>\n<p style=\"text-align: justify;\">In my line of work as a Linux SysAdmin you must be Hardened! and you must\u00a0know what the Linux &#8220;Talisman&#8221; is made of. You cannot blindly use it as is!!!<\/p>\n<hr \/>\n<p style=\"text-align: justify;\">Long ago after the Squid-Cache RPM was downloaded more then 10k times I stopped counting. This is \u00a0since there is a hidden secret inside each and every one of these downloads &#8220;I trust you Eliezer Croitoru to provide me a true\\good binary of Squid-Cache&#8221;.<\/p>\n<p style=\"text-align: justify;\">Squid-Cache is a production ready product but it requires a very Hardened character to use it<\/p>\n<p style=\"text-align: justify;\">Encryption is a challenge, if you are up to it jump into SSL-BUMP and see how and if you manage to make it work.<br \/>\nThrow your fear from a Server Crash!!! the Squid-Cache team is working hard so you would be able to test their ability to make you happy enough to see the magic that they can do. Indeed it&#8217;s not the perfect product but it&#8217;s worth just trying to see and understadnd what it might lacks.<\/p>\n<p style=\"text-align: justify;\">All The Bests,<br \/>\nEliezer Croitoru<\/p>\n<p style=\"text-align: justify;\">References:<\/p>\n<ul>\n<li><a href=\"http:\/\/wiki.squid-cache.org\/KnowledgeBase\/CentOS#Squid-3.5\" target=\"_blank\">Squid-Cache CentOS repository details<\/a><\/li>\n<li><a href=\"http:\/\/fading-sunlight.deviantart.com\/art\/Under-lock-and-key-117895408\">Under the lock at\u00a0DeviantArt<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Encryption, how far will you go? SQUID 3.5.25 + 4.0.19 RELEASED Choosing the right path with encryption is a crucial manner in the modern Computers World but I want to take you far behind this era into 2 or 3 hundred years ago. Back in the 17 centaury there weren&#8217;t as many options to encrypt &hellip; <a href=\"https:\/\/www1.ngtech.co.il\/wpe\/2017\/04\/19\/encryption-how-far-will-you-go-squid-3-5-25-4-0-19-released\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Encryption, how far will you go? \u2013 SQUID 3.5.25 + 4.0.19 RELEASED<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,12,10],"tags":[],"class_list":["post-430","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-squid-3-5","category-squid-4-0","category-squid-release"],"_links":{"self":[{"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/posts\/430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/comments?post=430"}],"version-history":[{"count":13,"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/posts\/430\/revisions"}],"predecessor-version":[{"id":444,"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/posts\/430\/revisions\/444"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/media\/431"}],"wp:attachment":[{"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/media?parent=430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/categories?post=430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/tags?post=430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}