Category Archives: cryptography

Some work on a VyOS image with Let’s Encrypt certs

I put some packages together this weekend. It’s been a while since I’ve debuilt anything officially. libffi-platypus-perl libalien-base-perl libalien-ffi-perl libffi-checklib-perl libshell-config-generate-perl libshell-guess-perl The plan is to build a binding to the libgnutls.so.30 API. The certtool CSR (REQ) generation interface does … Continue reading

Posted in 2016, colliertech, cryptography, debian, Free Software, git, gnutls, gpl, irc, kvm, libvirt, linux, Networking, perl, proliant, qemu, security, sid, Software, virtualization, vyos, washington | Leave a comment

LLC-Technologies-Collier/Demo-SCCC-Byte-AngularJS

Hello dear readers and attendees, This is the post that I will be/ will have been referencing during my presentation to the Seattle Central Community College’s Byte club on Thursday, December 10th at 1500-1630. I will begin with a bit … Continue reading

Posted in 2015, ajax, C.J. Insider, colliertech, cryptography, css, Databases, debian, Free Software, freenode, git, Hardware, html, irc, javascript, jessie, linux, mail, microsoft, mysql, Networking, open source, perl, security, Software, Telephony, ubuntu, VBox, virtualization, washington, wiki, winter, x509 | 3 Comments

Some statistics from the router at the cabin

sip0 is a GRE tunnel between the router and the colo box in Seattle, the payload of which is encapsulated as ipsec traffic before being transmitted over the Ubiquity equipment to the switch that the CenturyLink DSL modem attaches to. … Continue reading

Posted in 2015, cisco, colliertech, cryptography, debian, Free Software, gpl, Hardware, ipsec, jessie, linux, Networking, performance, production, rate limiting, security, SELinux, Software, Telephony, tls, washington, wireless, work, x509 | Leave a comment

False Positive

Since a bit before my birthday this year, I have been uncertain where I left my notary seal. I have been trying to stay positive about the situation, but I must admit that I spent an unhealthy amount of time … Continue reading

Posted in C.J. Insider, Cascadia Sovereign Nation, cryptography, family, friends, government, Hardware, LD40, Networking, pgp, photos, politics, security, wanderers, washington | 2 Comments

Trip Report: UW signing-party

Dear Debian Users, I met last night with a friend from many years ago and a number of students of cryptography. I was disappointed to see the prevalence of black hat, anti-government hackers at the event. I was hoping that … Continue reading

Posted in 19.34 RCW, amateur, cryptography, debian, Free Software, freenode, government, gpl, irc, LD43, linux, microsoft, military, Networking, NIST, nsa, open source, OSX, pgp, politics, PRCCDC, production, security, SELinux, Software, tls, ubuntu, washington, Washington State Ubuntu LoCo, Windows, x509 | 17 Comments

Bitcoin WoT using PGP/SKS

There was recently a post to the sks list prompting discussion regarding the use of PGP and SKS as a distributed web of trust for an alternative currency system called “Bitcoin.” This reminds me of a project I worked on … Continue reading

Posted in 2003, C.J. Insider, cryptography, finance, Free Software, pgp, politics, security, washington | Tagged | Leave a comment

Filing to become a licensed CA

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

All Operative Personnel employed by Collier Technologies LLC, known
here as the Certification Authority or CA, must also be licensed as
notaries public by the local government where they reside during any
act performed on behalf of the CA.

In addition to passing the Washington State Operative Personnel Exam,
all OPs employed by the CA will demonstrate their proficiency by
a) creating a request for issuance as described in 19.34.210§1
RCW, known here as a Certificate Signing Request or CSR; and
b) signing CSR from (a) with a private key issued by the
Certification Authority; and
c) publishing the public key corresponding to the CSR signed in
(b) in a recognized repository as defined by 19.34.400 RCW

While holding the position of Operative Personnel for the CA, the OP
will
a) utilize the private key corresponding to the CSR presented
during the demonstration of proficiency exclusively
b) not use the private key referenced in (a) for purposes other
than those performed on behalf of the CA.

All private key data controlled by the CA and all Operative Personnel
must be
a) stored on a solid-state device; and
b) kept within a locked safe except while in use by OP acting on
behalf of the CA.

All solid-state devices containing private key data controlled by the
CA and all Operative Personnel may only be used
a) on a Trustworthy system, as defined in 19.34.020§43 RCW; and
b) with a system which remains always disconnected from any
computer network
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkwmPOMACgkQXKBS0hdr6UYPTwCglr89VbTlw/wPuLqihaduw8Cw
z1gAnjwiDx47FTInVHBo9bo9VsVn/IDl
=9oar
—–END PGP SIGNATURE—–
Continue reading

Posted in colliertech, cryptography, debian, Free Software, government, investment, linux, pgp, security, tls, work, x509 | Leave a comment

PCRE support has hit quagga

—–BEGIN PGP SIGNED MESSAGE—– Hash: SHA1 http://bugzilla.quagga.net/show_bug.cgi?id=483 Paul Jakma changed: What |Removed |Added – —————————————————————————- Status|UNCONFIRMED |RESOLVED CC| |paul dishone st Resolution| |FIXED – — Comment #2 from Paul Jakma 2009-06-19 15:09:42 — I’ve pulled in the patch from Jeremy … Continue reading

Posted in autotools, cryptography, Free Software, Networking, open source, perl, pgp, pkg-config, Software | Leave a comment