366 Followers
113 Following
3.5K Posts

hobbyist sysadmin and tech support person, still occasionally seen on IRC

interests: windows 98, macos 9/8, plan9, systemd, athena, x.25, all kinds of 80s-00s "retro" computing & networking

✨︎ no, I really don't have a good profile picture ✨︎

Locationhttps://nullroute.lt
LocationLithuania
@CursedSilicon reminds me of EVGA shutting down their GPU products after nVidia started selling directly...
successfully implemented ARC signing, hopefully it'll mitigate that
*sigh* apparently mail.ru has decided to cover List-Id (and other List-*) headers in their DKIM signatures
@domi another implementation with more features https://hachyderm.io/@simontatham/116294781888932267
Simon Tatham (@[email protected])

… I forgot to provide a link, didn't I? See, that's why I prefer to avoid relying on my own memory. 'xafter' is available from my miscellaneous utilities page (also including 'after' and lots of other unrelated things): https://www.chiark.greenend.org.uk/~sgtatham/utils/

Hachyderm.io
"oh shit, the door is locked, how am I going to get my stuff now", I thought, while literally holding the door key in my hand and being the one who locked the door in the first place
@tppetkov honestly it's pretty ok. I like how barebones and integrated into the native UI it is.
(which is pretty much why it reminds me of Netmeeting)

Discord keeps dying mid-raid so we're trying out the built-in voice chat in WoW and it feels like we're dusting off a feature nobody has used in decades

I mean it works quite well (aside from the UI being five kinds of glitchy) but kinda has the vibe of going back to Win98 NetMeeting

@famfo sometimes I catch myself being defensively verbose (when posting on SO/StackExch. in particular), like "this is an important thing I want to drive home and if you just skim the post and miss the first time it was mentioned maybe the second time will work"

(I don't like overusing bold or <h2> like a bunch of others tend to)

@jpmens I don't really think it needs to be mutually exclusive with a Yubikey... e.g. I have a TPM key for SSH on one system *and* a Yubikey as a portable carrier *and* an eToken 5110 inside another system – and the rest of my security is still "yolo" level, really, but there are some things that the portable Yubikey isn't authorized to directly access while the laptop's key is, for example.

The `ssh` taking 1 second longer might be a hardware difference. On my ThinkPad it's 0.5s in total when using a TPM-backed RSA2048 key (it's not EC for silly reasons but I can't imagine EC being much slower).

Might also be a difference in which parent TPM key that SSH key was created under. Tradition carried over from TPM1 era is to generate a persistent root key (SRK) and store it in the TPM, so my test key is stored using the rough equivalent of "ssh-tpm-agent --parent-handle 0x81000001" (which is the agreed default handle for a SRK). At some point systemd-cryptsetup used a transient ECDSA SRK that it would generate deterministically each and every time. I'm not sure what ssh-tpm-agent does exactly, but I wonder if it might be using a transient parent key or something, which adds to the time needed to load the child key?...