<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: yp_master</title><link>https://news.ycombinator.com/user?id=yp_master</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 30 Apr 2026 20:33:02 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=yp_master" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by yp_master in "Tarsnap: No heartbleed here"]]></title><description><![CDATA[
<p>Indeed, that has been my solution.<p>But I'm seeing more and more authentication information being incorporated ("baked in", pre-installed, whatever) into browsers, whether it is lists of "valid" TLD's, certificates for "approved" CA's, or chosen individual website certificates.<p>Personally, I think this information should be cleanly separated from the software that may use it rather than pre-installed and "hidden from the user".</p>
]]></description><pubDate>Fri, 11 Apr 2014 02:03:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=7570868</link><dc:creator>yp_master</dc:creator><comments>https://news.ycombinator.com/item?id=7570868</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7570868</guid></item><item><title><![CDATA[New comment by yp_master in "Tarsnap: No heartbleed here"]]></title><description><![CDATA[
<p>I prefer SSL termination on the <i>client-side</i> (my computer, my data only).<p>I like to have the ability to view my SSL traffic in plain text.<p>Should the user be able to see what her computer is sending out?  I think she should.  And encrypted traffic should not be some special exception.<p>Installing someone else's "MITM" software to decrypt SSL seems unnecessary.<p>It is much simpler to generate and install your own "fake" certificates that you control.<p>stunnel is one option.<p>There are others.  socat, Pound, etc.<p>It should be the user who has the final decision over which certificates to trust.  Users are the real "Certificate Authorities".  They should have full control over encryption and decryption should they want to exercise it.<p>Is it wise to irrevocably delegate the decision to trust/not trust to website owners and browser authors?  Perhaps those promoting solutions like "TACK" should give this more thought.</p>
]]></description><pubDate>Thu, 10 Apr 2014 13:36:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=7565897</link><dc:creator>yp_master</dc:creator><comments>https://news.ycombinator.com/item?id=7565897</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7565897</guid></item><item><title><![CDATA[New comment by yp_master in "Heartbleed"]]></title><description><![CDATA[
<p><p><pre><code>                             Schneier.com Has Moved

   As of March 3rd, Schneier.com has moved to a new server. If you've used a
   hosts file to map www.schneier.com to a fixed IP address, you'll need to
   either update the IP to 204.11.247.93, or remove the line. Otherwise,
   either your software or your name server is hanging on to old DNS
   information much longer than it should.
</code></pre>
Ok, how should I "authenticate" that the site at the new address is the "real" one?<p>I know, I'll use OpenSSL and HTTPS!</p>
]]></description><pubDate>Wed, 09 Apr 2014 13:27:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=7559093</link><dc:creator>yp_master</dc:creator><comments>https://news.ycombinator.com/item?id=7559093</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7559093</guid></item><item><title><![CDATA[New comment by yp_master in "My Heart Bleeds for OpenSSL"]]></title><description><![CDATA[
<p>It sounds like you are describing an "implementation problem" (i.e., OpenSSL's code sucks).<p>But then you suggest this could be a reason to throw out the notion of "ciphersuite flexibility".<p>Aren't these two separate things?<p>Perhaps the flexibility is good.<p>Maybe the problem is one of complexity and quality control.<p>Too many ciphers, and incoporating ones of dubious quality.<p>I still haven't seen anyone mention the other SSL libraries, e.g.,
axssl,
polarssl,
matrixssl,
etc.<p>As for CA "infrastructure", what if the user uses OpenSSL's ca function?<p>She creates her own CA certificate and key and installs it on her device.<p>Then she downloads a website's certificate, signs it and installs it on her device.<p>Regardless of whether a wesbite has a paid-for certificate from a commercial "CA authority", she needs to make the final decision whether or not to trust it.<p>The user is the ultimate arbiter of which website certificates she wants to sign and install.  (Not browser authors.)<p>Websites just need a central repository to publish their certificates.<p>They already do this for their "domain names" by having them published in a publicly accessible zone file (ideally, the user can download the zone file, as well as query it piecemeal over a network).<p>We as users trust that these zone files are accurate: specifically, we assume the IP addresses for the website's nameservers are correct.</p>
]]></description><pubDate>Wed, 09 Apr 2014 03:12:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=7557484</link><dc:creator>yp_master</dc:creator><comments>https://news.ycombinator.com/item?id=7557484</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7557484</guid></item><item><title><![CDATA[New comment by yp_master in "OpenSSL is written by monkeys (2009)"]]></title><description><![CDATA[
<p>Have you ever tried axssl or polarssl?<p>I am just curious; I make no endorsement of either.</p>
]]></description><pubDate>Wed, 09 Apr 2014 02:43:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=7557418</link><dc:creator>yp_master</dc:creator><comments>https://news.ycombinator.com/item?id=7557418</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7557418</guid></item><item><title><![CDATA[New comment by yp_master in "The Heartbleed Bug"]]></title><description><![CDATA[
<p>"The fact is that no programmer is good enough to write code whic is free from such vulnerabilities."<p>"...you are kidding yourself if you think you can handle this better than the OpenSSL team."<p>Well, I can think of at least one example that counters this supposition.  As someone points out elsewhere in this thread, BIND is like OpenSSL.  And others wrote better alternatives, one of which offered a cash reward for any security holes and has afaik never had a major security flaw.<p>What baffles me is that no matter how bad OpenSSL is shown to be, it will not shake some programmmers' faith in it.<p>I wonder if the commercial CA's will see a rise in the sale of certificates because of this.<p>Sloppy programmer blames language for his mistakes.  News at 11.</p>
]]></description><pubDate>Tue, 08 Apr 2014 13:40:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=7553298</link><dc:creator>yp_master</dc:creator><comments>https://news.ycombinator.com/item?id=7553298</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7553298</guid></item><item><title><![CDATA[New comment by yp_master in "Flickr: Invitations disclosure (resend feature)"]]></title><description><![CDATA[
<p>Anyone able to view this site without Javascript?</p>
]]></description><pubDate>Sun, 06 Apr 2014 15:34:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=7541269</link><dc:creator>yp_master</dc:creator><comments>https://news.ycombinator.com/item?id=7541269</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7541269</guid></item><item><title><![CDATA[New comment by yp_master in "The Power of Lua and Mixins"]]></title><description><![CDATA[
<p><p><pre><code>  1 notmagi.me:
  55 bytes, 1+1+0+1 records, response, authoritative, noerror
  query: 1 notmagi.me
  answer: notmagi.me 1800 A 207.97.227.245
  additional: . 32768 weird class
</code></pre>
Nice.</p>
]]></description><pubDate>Sun, 06 Apr 2014 15:14:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=7541199</link><dc:creator>yp_master</dc:creator><comments>https://news.ycombinator.com/item?id=7541199</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7541199</guid></item><item><title><![CDATA[New comment by yp_master in "Spiped – symmetric, encrypted, authenticated pipes between sockets"]]></title><description><![CDATA[
<p>It's such a simple and useful idea.<p>But being tied to what's in OpenSSL is scary.<p>I have been doing what spiped/spipe does using curvecpserver/curvecpclient.</p>
]]></description><pubDate>Sun, 06 Apr 2014 06:14:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=7540005</link><dc:creator>yp_master</dc:creator><comments>https://news.ycombinator.com/item?id=7540005</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7540005</guid></item><item><title><![CDATA[New comment by yp_master in "How I Hacked a Router"]]></title><description><![CDATA[
<p>How about using Soekris or Alix for a router instead of Netgear?</p>
]]></description><pubDate>Sun, 06 Apr 2014 04:34:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=7539761</link><dc:creator>yp_master</dc:creator><comments>https://news.ycombinator.com/item?id=7539761</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7539761</guid></item><item><title><![CDATA[New comment by yp_master in "Functional C (1997)"]]></title><description><![CDATA[
<p>"But the book doesn't mention either technique..."<p>As other commenters are pointing out, the book's aim is to 
teach imperative programming with C to students of SML.  It is not aimed at teaching functional programming in C.<p>The technique you describe -- using what UNIX offers, e.g., pipe and fork -- is used a lot by djb.<p>This book seems like a gentle intro to C.<p>And there's nothing wrong with keeping things simple in the beginning.<p>With respect to books and tutorials on C, I have seen much 
worse.<p>Master the basics of C, then go read djb's code for lessons 
on how to structure programs and smartly utilise what UNIX 
has to offer.  Keep K&R and Stevens nearby for reference.<p>A classic example is passing file descriptors instead of using a pipe function that opens a shell.  There is no book on C that teaches that, but it is elegant programming indeed.<p>Even when one strives to keep things simple, C (and UNIX) have many gotchas.<p>There's a lot to learn.<p>This book doesn't overwhelm the reader.<p>Personally, I like the approach.<p>Lots of short consistent examples.<p>Lucid writing style, too.</p>
]]></description><pubDate>Sun, 06 Apr 2014 03:41:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=7539593</link><dc:creator>yp_master</dc:creator><comments>https://news.ycombinator.com/item?id=7539593</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7539593</guid></item><item><title><![CDATA[New comment by yp_master in "In new case, Supreme Court revisits the question of software patents"]]></title><description><![CDATA[
<p>Here are the answers:<p><pre><code>  T
  F
  F
</code></pre>
FWIW, IAAAL.<p>I suspect not many readers understand the above facts.<p>If you purchase a US patent, this is what you get: a right to sue.<p>Nothing more and nothing less.<p>If you have any doubts that the above is true, ask your lawyer.<p>Knowing exactly what a patent is should make you think more carefully about what a patent may or may not "incentivize".</p>
]]></description><pubDate>Sun, 30 Mar 2014 16:14:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=7496609</link><dc:creator>yp_master</dc:creator><comments>https://news.ycombinator.com/item?id=7496609</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7496609</guid></item><item><title><![CDATA[New comment by yp_master in "In new case, Supreme Court revisits the question of software patents"]]></title><description><![CDATA[
<p>True or false?
A patent is a government-granted right to sue.
A patent grants a license to produce the invention.
A patent grants a "monopoly"; success is court when suing challengers is "guaranteed".</p>
]]></description><pubDate>Sun, 30 Mar 2014 07:25:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=7495505</link><dc:creator>yp_master</dc:creator><comments>https://news.ycombinator.com/item?id=7495505</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7495505</guid></item></channel></rss>