九维我操你爹
又下一回班,但只是暂时的。
kitty 的这个 ssh wrap 吧……exciting!
发现服务器语言设置变成日语的时候心脏都停跳了。稍微了解了下这个 wrap 的实现细节,感觉应该不会影响到其他人,这才放下心来
刚刚像这样去隐藏评论的时候不小心按错了,按成了添加到推特 circle。结果看弹出来的通知好像添加成功了……
如果推特所谓的下线 circle 功能就是把它隐藏起来的话,那我现在也终于成为了 circle 用户,而且我的 circle 圈子里只有一个垃圾黄推账号🙃
由于致远服务器 (mirrors.sjtug.sjtu.edu.cn) 存储盘满,其上所有仓库于 2 天前同步中断。我们正在释放存储空间,受影响的仓库预计会在 12 小时内恢复同步。

另,由于 julia 仓库占用空间极大 (6TB),用户量较低,我们正在考虑将其同步方式转换为反向代理+缓存。在转换期间,所有指向 julia 镜像的流量将会被重定向至北京大学开源镜像站 (https://mirrors.pku.edu.cn/)。在此感谢北京大学开源镜像站的协助!
换工作电脑的第二天,被电了
啊,谢谢提醒,原来我用的是睾贵的苹果电脑啊
https://terrapin-attack.com/

Who is vulnerable?
Almost everyone. The Terrapin attack exploits weaknesses in the SSH transport layer protocol in combination with newer cryptographic algorithms and encryption modes introduced by OpenSSH over 10 years ago. Since then, these have been adopted by a wide range of SSH implementations, therefore affecting a majority of current implementations.

In practice, our attack can be applied against any connection using either ChaCha20-Poly1305 or any CBC-mode cipher in combination with the Encrypt-then-MAC paradigm. Theoretically, CTR-mode ciphers in combination with the Encrypt-then-MAC paradigm are vulnerable as well, although this weakness cannot be exploited in a real-world scenario.
Back to Top