Cover photo
Simon L. B. Nielsen (Deprecated Account)


This profile is now deprecated. Use +Simon L. B. Nielsen instead.
"What we're doing is giving you a 100-percent success rate," Marlinspike told Ars. "It doesn't matter what password you choose. we demonstrate that [MS-CHAP] is never secure."

Cloud-based service requires an average of 12 hours to decrypt VPN traffic.
EuroBSDCon 2012 registration has started, with early bird price until September 2nd. The program is online too of course, 2 days of tutorials: and two days of talks: 

See you in Warsaw!
EuroBSDcon 2012 Registration. Terms & Conditions. Online registration starts on 29-07-2012. Early registration ends on 2 september 2012 23:59 CET, after that time, the normal fees apply. No refund...
I'm very happy to see that Colin Percival still handled issues with Tarsnap "The right way", though it does not surprise me.

The outage also shows some of the problems with redundancy - you have to have A LOT if you really want to minimize downtime, and even then it's certainly not easy.

I'm still a happy Tarsnap customer.
Tarsnap outage. At approximately 2012-06-30 03:02 UTC, the central Tarsnap server (hosted in Amazon's EC2 US-East region) went offline due to a power outage. According to Amazon's post-mortem of this ...

Vulnerability in Cyberoam DPI devices [30 Jun 2012] (CVE-2012-3372)

Cyberoam make a range of DPI devices (
which are capable of intercepting SSL connections.

In common with all such devices, in order to intercept these
connections without causing certificate warnings, the devices require
that a certificate must be issued for the intercepted site by a CA
browsers trust.

There are two ways to achieve this - one is to persaude an existing
trusted CA to issue a certificate for the site to be intecepted, or an
intermediate CA that can then be used to generate new certificates on
the fly. This latter behaviour recently got Trustwave in trouble.

The second method is to have each willing victim[1] install a new
trusted CA in their browser, and have that CA issue the fake
certificates. This is, of course, the only legitimate way to use these
devices and we are pleased to see that this is the approach Cyberoam
reveal to the public.

However, it is a little surprising that the Cyberoam devices appear to
all use exactly the same CA. This can be seen to be so by looking at
the support page describing how to avoid warnings: Examination of a
certificate chain generated by a Cyberoam device shows that this CA is
not used to sign an intermediate which is then used by the device, and
so therefore all such devices share the same CA certificate and hence
the same private key.

It is therefore possible to intercept traffic from any victim of a
Cyberoam device with any other Cyberoam device - or, indeed, to
extract the key from the device and import it into other DPI devices,
and use those for interception. Perhaps ones from more competent

[1] In the corporate setting, willing victims are often known as
"employees". Unwilling victims should not, of course, install the CA
certificate, nor should they click through certificate warnings.


Victims should uninstall the Cyberoam CA certificate from their
browsers and decline to complete any connection which gives a
certificate warning.


This issue was discovered and analysed by Runa A. Sandvik of the Tor
Project and Ben Laurie.
Michael Gmelin's profile photo
This is so wrong on many different levels...
Waiting for my flights to Ottawa via Philadelphia. Much looking forward to seeing everybody at +BSDCan.

PS. yes, classic boring pictures, but I was bored waiting for my flight.
This is a pretty cool use of Street View,
Street View imagery is going up, up & away, celebrating Kennedy Space Center's 50th bday w/ new imagery of the complex 
Per Hansen's profile photo
Det slår jo ikke helt Copenhagen Suborbitals :)
 ·  Translate
I will be migrating my Google+ profile from one account to another. It might create some odd things for my old posts etc. when it happens next week. We will see...
A while back we announced plans for a tool that would help you transfer your circles from one Google+ account to another and ensure that your followers are automatically directed to your new, preferred profile.  Today, anyone can visit Google Takeout and click “Transfer your Google+ connections to another account”:  For more information, check out this help center article.  Thanks again for being so patient!
To transfer your Google+ circles and other connections between accounts, click Google+ circles transfer tool at Google Takeout. This tool transfers your Google+ circles and connections from a “source”...
Simon L. B. Nielsen (Deprecated Account)'s profile photoDavid Malone's profile photo
I've had two thoughts on that, over the years. One is that all browsers should have a feature where you can open a new link/tab with the same context as the parent, copy-on-write from the parent, empty or from a saved context. That way it would be easy to support multiple identities in a browser and it would also be handy for testing web sites.

Second, it would be handy if Google allowed different authentication for different services they provide, so I could let someone access my G+ without giving access to my e-mail.
Interesting direct impact of software bug: 1MW of power.

I have a hosted server at and got this in a mail from them:

Subject: Please check the CPU load of your server!

During the night of 30.06.2012 to 01.07.2012 our internal 
monitoring systems registered an increase in the level of
IT power usage by approximately one megawatt.

The reason for this huge surge is the additional switched 
leap second which can lead to permanent CPU load on Linux 
Uli S's profile photoChris Larsen's profile photo
The fix in most cases does not require a reboot:

# date -s "`date`" and

Also as it seems the kernel-leap-second bug can incur a higher than normal context switches baseline for servers (not only indicating this problem through load statistics), and there the fix is the same. (context switches on linux $ vmstat -s|grep "CPU context switches")

"now if you move again i'ma gonna shoot ya" - [Troops]
Another great +BSDCan completed, meeting lots of people.

We got a fair amount of work and discussions done, especially for the FreeBSD cluster administration team.

Now there is just the fun of dealing with jetlag. I failed miserably this time and fell asleep too early during the day, so now I'm awake at 4 in the morning.

Thanks +Dan Langille for organizing yet another conference! Hopefully see you next year.

PS. very happy that +Google sponsors BSDCan.
Michael Gmelin's profile photoGreg A. Woods's profile photoTine Lildballe's profile photo
You can always wake up your beautifull son ;) bet he'd love some playtime with his daddy :) give him a hug from his auntie :)

"Someone, for some unknown reason, turned on a debug switch (DEBUGLOG) in the current released version of MacOS Lion 10.7.3 that causes the authorizationhost process's HomeDirMounter DIHLFVMount to log in PLAIN TEXT in a system wide logfile readible by anyone with root or admin access the login password of the user of an encrypted home directory tree ("legacy Filevault")."
5 May 2012. Apple Legacy Filevault Hole. Date: Fri, 4 May 2012 20:40:07 -0400. From: "David I. Emery" <die[at]> To: cryptography[at] Subject: [cryptograp...
Matthew Wilson's profile photoFlemming Jacobsen's profile photoEdwin Groothuis's profile photoMichael Gmelin's profile photo
Oops indeed
New state of the art 8-bit Google Maps.
Saturday, March 31, 2012 at 8:11 AM. We're constantly making improvements to Google Maps in order to take advantage of better hardware and web standards. For example, last October we launched Maps...
Linda Lildballe's profile photo
:-D Set d. 3.4. Var nu nok ikke "faldet i" d. 1.
 ·  Translate
Deprecated profile!
Deprecated account!

Please use my new account instead:
Other profiles