PROJET AUTOBLOG


Shaarli - Les discussions de Shaarli

Archivé

Site original : Shaarli - Les discussions de Shaarli du 23/07/2013

⇐ retour index

What The Dev !!!

mercredi 4 septembre 2013 à 00:21
Colibri, le 03/09/2013 à 15:15
Le meilleur du pire du code... préparez les sacs en papier.

N'engage que les personnes qui suggèrent les lamentables échecs. Pas leurs sociétés

Du lourd, du très lourd !
(Permalink)

Oros, le 03/09/2013 à 16:15
Ooooh du code .... moche.

via http://colibri-libre.org/liens/?_UlhTw
(Permalink)

Sebsauvage, le 04/09/2013 à 00:21
Tiens, une sorte de DailyWTF, avec de vrais bouts de code (horribles !) dedans. (via http://colibri-libre.org/liens/?_UlhTw)
(Permalink)

Variables d’environnement utilisées par Python | Sam & Max: Python, Django, Git et du cul

mercredi 4 septembre 2013 à 00:18
Famille Michon, le 03/09/2013 à 16:21
PYTHONSTARTUP: un module à exécuter au démarrage de Python.
PYTHONPATH : une liste de dossiers séparés par ‘:’ qui va être ajouté à sys.path
PYTHONHOME : choisir un autre dossier dans lequel chercher l’interpréteur Python.
PYTHONCASEOK : ingorer la casse dans le nom des modules sous Windows
PYTHONIOENCODING : forcer un encoding par défaut pour stdin/stdout/stderr
PYTHONHASHSEED : changer la seed hash() (renforce la sécurité de la VM)
(Permalink)

Sebsauvage, le 04/09/2013 à 00:18
Je me met ça de côté.
(Permalink)

▶ Le déserteur #pastiche #internet #hadopi #csa - YouTube

mardi 3 septembre 2013 à 20:56
ex0artefact, le 03/09/2013 à 20:56
La météo en Bretagne, sujet risqué. ^^
(Permalink)

Quand Wikipedia chante, le html bulle ! | Graphisme & interactivité blog par Geoffrey Dorne

mardi 3 septembre 2013 à 20:42
ex0artefact, le 03/09/2013 à 20:42
C'est zoli.
Le site => http://listen.hatnote.com/#fr
(Permalink)

Windows 10 pourrait-il être un "OS dans le cloud" ?

mardi 3 septembre 2013 à 20:32
hoa, le 02/09/2013 à 16:44
Si c'était le cas, je crois que ça se passe de commentaire... Cf : l'immense succès de ChromeOS.
(Permalink)

ex0artefact, le 03/09/2013 à 20:32
Yolooooooooo !
Via http://lehollandaisvolant.net/index.php?mode=links&id=20130902161405
(Permalink)

So why would this make me a murder ?

mardi 3 septembre 2013 à 20:30
ex0artefact, le 03/09/2013 à 20:30
Un excellent argument. ^^
Via http://lehollandaisvolant.net/index.php?mode=links&id=20130902095257
(Permalink)

Bilan des bombardements américains : 1 million de morts en moins d'un siècle ! - AgoraVox le média citoyen

mardi 3 septembre 2013 à 20:25
Open News, le 02/09/2013 à 11:38

(Permalink)

pierreghz, le 02/09/2013 à 22:27
Environ 2,62×10⁸ morts à cause de l’étatisme au XXe siècle : http://www.hawaii.edu/powerkills/20TH.HTM
(Permalink)

ex0artefact, le 03/09/2013 à 20:25
Et bien sûr, pas de condamnation.
Via https://pierreghz.legtux.org/links/?wYwoHw
(Permalink)

Le nouveau navire de Sea Shepherd, don des "Simpson" - Sciences et Avenir

mardi 3 septembre 2013 à 19:58
ex0artefact, le 03/09/2013 à 19:58
Si ça c'est pas la classe.
(Permalink)

Titegoutte - Wikipédia

mardi 3 septembre 2013 à 18:59
orangina-rouge, le 03/09/2013 à 18:59
Et dire que je n'en connaissais que 3 :
Anne Titegoutte
Corinne Titegoutte
Germaine Titegoutte

Wikipedia en ressence déjà 32...
(Permalink)

Tomahawk – Un player un peu particulier pour les fans de musique en ligne et les autres… | La vache libre

mardi 3 septembre 2013 à 17:52
la vache libre, le 03/09/2013 à 17:52
Un bon compromis entre musique en ligne, musique local et le partage de l'ensemble sur vos réseaux sociaux :)
(Permalink)

Bits Up!: SSL Everywhere for HTTP/2 - A New Hope

mardi 3 septembre 2013 à 17:05
CAFAI, le 03/09/2013 à 17:05
Recently the IETF working group on HTTP met in Berlin, Germany and discussed the concept of mandatory to offer TLS for HTTP/2, offered by Mark Nottingham.  The current approach to transport security means only 1/5 of web transactions are given the protections of TLS.  Currently all of the choices are made by the content owner via the scheme of the url in the markup.
(Permalink)

Retour sur l'édition 2013 de la journée du Conseil scientifique de l'Afnic

mardi 3 septembre 2013 à 17:04
CAFAI, le 03/09/2013 à 17:04
Le 9 juillet dernier, pour la troisième année consécutive, l’Afnic organisait la journée du Conseil scientifique. Retour en images sur cet événement.

Vidéos et slides
(Permalink)

ZoneCheck

mardi 3 septembre 2013 à 17:03
CAFAI, le 03/09/2013 à 17:03
The DNS is a critical resource for every network application, quite important to ensure that a zone or domain name is correctly configured in the DNS.

ZoneCheck is intended to help solving misconfigurations or inconsistencies usually revealed by an increase in the latency of the application, up to the output of unexpected/inconsistant results.
(Permalink)

duraconf - A collection of hardened configuration files for SSL/TLS services

mardi 3 septembre 2013 à 17:02
CAFAI, le 03/09/2013 à 17:02
duraconf - A collection of hardened configuration files for SSL/TLS services

Hopefully this will help you make a more informed choice about what cipher list
should be used for different applications. What you find here are recommended
configurations, you should seriously consider using these, but you have to make
some choices. When you pick a cipher list, you have a couple different options
of how you go about it:

1. make a very specific declaration of what is acceptable. This has the
  advantage of being able to define very closely of what you want, but the
  disadvantage of having to stay on top of the latest crypto advancements, with
  every crypto library upgrade.

2. make a general declaration of which cipher list to use. this has the
  advantage of allowing you to rely on your crypto libraries to make
  (hopefully) informed choices for you (and to deactivate known
  bad/weak/recently broken) ciphers while you don't have the burden of ensuring
  that they are always resulting in a good cipher suite. The disadvantage is
  that you cannot fine tune what exactly you get in return.

3. A mixture of being specific and letting your crypto library decide from
  general statements. This can be useful if, for example, you find out that
  some particular crypto has become too weak, for example you might use a
  generic list but then exclude MD5, because your crypto libraries haven't
  removed that yet.

4. Decide on a threat model for possible attacks that may expose an important
  private key. Ciphers are often offered in a mode that provides Perfect
  Forward Secrecy. While there are performance considerations, if you run a
  high security operation where traffic disclosure would be a serious problem,
  it is an important property to consider.

Generally it seems safer to have the crypto library take the bulk of the
decision since it should be for the most part fire-and-forget, while the other
options require that you always stay up to date on things and tweak as needed.

For practical use, and for people who can afford to follow crypto news, a
mixture of both is surely a good idea. So start with the general cipher list and
when you become aware that something is bad then just add this specific part to
your otherwise general cipher list until the crypto library defaults get updated
to fix that.

Unfortunately, its not possible to come up with one cipher configuration that is
going to work for all configurations. There are many different programs that
implement different versions of libraries that have different ciphers
available. In fact, a different versions of the same program may be linked
against different libraries which have different ciphers available.

An important configuration issue for service operators and users is
understanding Perfect Forward Secrecy. Generally, PFS sessions are
computationally more expensive than connections without PFS properties.

It is extremely important to remember that using SSL and/or TLS does not ensure
that your traffic is encrypted for all time. Generally, SSL/TLS services offer
two general modes of operation - one mode is ephemerally keyed and the other is not.

A TLS server that only offers AES256-SHA is strong against an attacker who will
never recovery the secret key used by the server and who cannot break AES256.
However, if an attacker is able to recover the server's key, the attacker will be able
to retroactively decrypt all traffic that has been recorded when the AES256-SHA
cipher is in use. If that same server uses an ephemeral cipher such as
DHE-RSA-AES256-SHA, the attacker cannot recover previous encrypted sesssions
without breaking RSA and/or AES256 for *each* session.

In both cases, when the attacker has the private key, all future communications
with the server are unsafe. Clients generally deal with this by looking up a
revokation list or by using something like the OCSP. Realistically, they're in
a lot of trouble and that kind of trouble is out of scope. If you're in doubt
it's probably a reasonable thing to use DHE or EDH modes unless you have load
issues.

The cipher lists you will find here actually vary depending on which version of
the crypto library that you have. For example, if you were to find this list
recommended:

HIGH:MEDIUM:!aNULL:!SSLv2:!MD5:@STRENGTH

In one version of openssl this will mean the following list of ciphers:

$ openssl ciphers -v 'HIGH:MEDIUM:!aNULL:!SSLv2:!MD5:@STRENGTH'

DHE-RSA-AES256-SHA      SSLv3 Kx=DH       Au=RSA  Enc=AES(256)  Mac=SHA1
DHE-DSS-AES256-SHA      SSLv3 Kx=DH       Au=DSS  Enc=AES(256)  Mac=SHA1
AES256-SHA              SSLv3 Kx=RSA      Au=RSA  Enc=AES(256)  Mac=SHA1
EDH-RSA-DES-CBC3-SHA    SSLv3 Kx=DH       Au=RSA  Enc=3DES(168) Mac=SHA1
EDH-DSS-DES-CBC3-SHA    SSLv3 Kx=DH       Au=DSS  Enc=3DES(168) Mac=SHA1
DES-CBC3-SHA            SSLv3 Kx=RSA      Au=RSA  Enc=3DES(168) Mac=SHA1
DHE-RSA-AES128-SHA      SSLv3 Kx=DH       Au=RSA  Enc=AES(128)  Mac=SHA1
DHE-DSS-AES128-SHA      SSLv3 Kx=DH       Au=DSS  Enc=AES(128)  Mac=SHA1
AES128-SHA              SSLv3 Kx=RSA      Au=RSA  Enc=AES(128)  Mac=SHA1
RC4-SHA                 SSLv3 Kx=RSA      Au=RSA  Enc=RC4(128)  Mac=SHA1

In a newer openssl, this list of ciphers will be different:

$ openssl ciphers -v 'HIGH:MEDIUM:!aNULL:!SSLv2:!MD5:@STRENGTH'

ECDH-RSA-AES128-SHA     SSLv3 Kx=ECDH/RSA   Au=ECDH   Enc=AES(128)      Mac=SHA1
ECDH-ECDSA-AES128-SHA   SSLv3 Kx=ECDH/ECDSA Au=ECDH   Enc=AES(128)      Mac=SHA1
AES128-SHA              SSLv3 Kx=RSA        Au=RSA    Enc=AES(128)      Mac=SHA1
CAMELLIA128-SHA         SSLv3 Kx=RSA        Au=RSA    Enc=Camellia(128) Mac=SHA1
PSK-AES128-CBC-SHA      SSLv3 Kx=PSK        Au=PSK    Enc=AES(128)      Mac=SHA1


It is also worth noting that this is setting a policy, and your site may have
different policies, depending on your intended audience. There are many
questions to consider in determining a policy. For example, in the worst case,
when a client doesn't support the higher strength ciphers my server supports, do
I want to keep up the image that medium strength ciphers are secure enough in my
specific use case, environment and opponents? Or should I not allow anything but
the highest strength ciphers, and those clients that do not support them are
just denied?  Its likely that in many cases there is no possibility of making it
clear to the user that their setup does not allow for secure use of your
services, and what their options are.  I _think_, at least with apache, it
should be possible to redirect users whose setup doesn't provide a compatible
cipher suite, to an informational web page which explains further steps they can
and should take (i have no idea how)..

Unfortunately, in most cases, users will not get any message at all and they
will have no clue why they are shut out. This could result in unhappy users with
no idea of where to turn, and potentially a higher support burden.

Notes on format of cipher designations
--------------------------------------

Format of cipher designations differ, but in general they follow the format
described in ciphers(5). A few notes:

The order specified is the preference order, and the list is separated by
colons. The list can be specific ciphers (eg. RC4-SHA), a list of suites
containing a certain algorith (SHA1), or a cipher suite of a certain type
(TLSv1). There are also cipher strings which are a grouping of different ciphers
into a specific category (eg. HIGH).

When removing ciphers that you do not want, you have a choice between indicating
! or -, the difference is subtle but important. It's good practice to use ! if
you really do not want this class to ever get used, and to use - when you want
to allow them to be still used if you later added something to your existing
cipher list.

Finally, there is also the @STRENGTH parameter, which sorts the cipher list in
order of encryption algorithm key length.

Suggested reading
-----------------

https://www.eff.org/pages/how-deploy-https-correctly
(Permalink)

Neutralité du net : "Neelie Kroes se fiche du monde"

mardi 3 septembre 2013 à 17:00
CAFAI, le 03/09/2013 à 17:00
Vendredi, la Quadrature du Net a révélé la dernière version du projet de révision du Paquet Télécom, que la Commission Européenne doit soumettre au Parlement Européen. "C'est un texte technique absolument fondamental pour l'avenir d'Internet, qui mérite que l'on s'y intéresse", explique Félix Tréguer, co-fondateur de la Quadrature du Net, dans une interview accordée à Numerama. Il estime que la vice-présidente de la Commission, Neelie Kroes, "se fiche du monde" en prétendant défendre la neutralité du net tout en organisant la marchandisation d'une priorisation de certains flux.

Le texte du projet de révision du paquet télécom, qui devrait être rendu public dans les prochains jours, est visible ici (.pdf). https://www.laquadrature.net/files/2013_New_Draft_Telecom_Regulation.pdf
(Permalink)

Meshnet activists rebuilding the internet from scratch - tech - 08 August 2013 - New Scientist

mardi 3 septembre 2013 à 16:59
CAFAI, le 03/09/2013 à 16:59
THE internet is neither neutral nor private, in case you were in any doubt. The US National Security Agency can reportedly collect nearly everything a user does on the net, while internet service providers (ISPs) move traffic according to business agreements, rather than what is best for its customers. So some people have decided to take matters into their own hands, and are building their own net from scratch.

Across the US, from Maryland to Seattle, work is underway to construct user-owned wireless networks that will permit secure communication without surveillance or any centralised organisation. They are known as meshnets and ultimately, if their designers get their way, they will span the country.
(Permalink)

Vie Privée en 2013 : Pourquoi. Quand. Comment. - par Werner Koch. | April

mardi 3 septembre 2013 à 16:58
CAFAI, le 03/09/2013 à 16:58
Transcription de la traduction faite par le groupe Transcriptions aidé par le groupe TraductionGNU.


Sommaire

   Pourquoi
       Des raisons de faire attention à votre vie privée
       Pourquoi nous avons ce problème
       Internet comme terrain de jeu pour les techos
       Internet et la bulle de l'an 2000
       La meilleure des divulgations consenties
       Marketing ciblé
       La surveillance d'État, 30 ans après
   Quand. Atteintes à la vie privée dans le monde réel
       Vos interactions
       Interaction: courriel
       Interaction: faire des recherches
       Interaction: messagerie instantanée
       Interaction: réseaux sociaux
       Ceux qui vous disent où ils veulent en venir
       Ceux qui ne vous le disent pas...
   Comment. Méthodes pour reconquérir notre vie privée
       Avant tout chose
       Anonymat
       Messagerie instantanée
       Faire des recherches
       Garantir l'accès aux données
       Informatique en nuage
       Courriel
       Logiciels en général
   Conclusion
       Ce qu'il faut changer
       Ce que vous pouvez faire
       Et pour finir
   Questions/réponses
       Première question - alternatives au webmail
       Deuxième question - niveau de sécurité de Tor
       Troisième question - sécurité du poste utilisateur
       Quatrième question - dans un cybercafé
       Cinquième question - communications téléphoniques
       Sixième question - STARTTLS
   Notes
(Permalink)

[1307.3696] Where in the Internet is congestion?

mardi 3 septembre 2013 à 16:58
CAFAI, le 03/09/2013 à 16:58
Understanding the distribution of congestion in the Internet is a long-standing problem. Using data from the SamKnows US broadband access network measurement study, commissioned by the FCC, we explore patterns of congestion distribution in DSL and cable Internet service provider (ISP) networks. Using correlation-based analysis we estimate prevalence of congestion in the periphery versus the core of ISP networks. We show that there are significant differences in congestion levels and its distribution between DSL and cable ISP networks and identify bottleneck sections in each type of network.

via : S.Bortzmeyer http://seenthis.net/messages/171258
(Permalink)

Index of /pub/debian-meetings/2013/debconf13/webm-high

mardi 3 septembre 2013 à 16:57
CAFAI, le 03/09/2013 à 16:57
Archives vidéos conférences debian meeting 2013
(Permalink)

www.lyonne.fr - Auxerrois - MIGENNES (89400) - Ils veulent un accès à internet à bas prix pour tous et sans zones blanches

mardi 3 septembre 2013 à 16:56
CAFAI, le 03/09/2013 à 16:56
Les fournisseurs d’accès à internet associatifs se sont réunis en assemblée générale à Migennes. L’association icaunaise, PC Light, basée à Cheny, a organisé cette réunion nationale.
Précision apportée à l'article:
Basée à Cheny, l’association PC Light, chargée d’aider les particuliers des zones blanches à se raccorder à internet, recense plus de 400 adhérents en cumulé, depuis sa création en 1998. Treize personnes l’ont rejointe lors des six derniers mois.
(Permalink)