Skip to content

Instantly share code, notes, and snippets.

View darconeous's full-sized avatar
🦀

Robert Quattlebaum darconeous

🦀
View GitHub Profile
@jordigg
jordigg / pi-dashboards.md
Last active August 29, 2023 12:54
Setup dasboards using raspberryPi, chromium and VNC server for remote support
@darconeous
darconeous / engenius-eap600-enable-ssh.md
Last active March 24, 2023 20:02
Enabling SSH on Engenius EAP600

Enabling SSH on Engenius EAP600 (and maybe other models)

This tutorial will walk you through the steps needed to get root SSH access on an Engenius EAP600 dual-band WiFi access point. SSH doesn't come enabled out of the box on these things, so if you want to SSH into the device (which is running an old version of OpenWRT), keep reading.

@darconeous
darconeous / ham-arngll.txt.md
Last active November 2, 2021 18:38
Amateur Radio Next Generation Link Layer (ARNGLL)
@darconeous
darconeous / small-merkle.md
Created August 3, 2015 21:54
More Efficient Merkle Signatures

More Efficient Merkle Signatures

Author: Robert Quattlebaum [email protected]
Date: 2015-08-03

This document describes a mechanism for achieving a significant improvement in the efficiency of merle signatures, allowing public keys that are 5% smaller and signatures that are 37% smaller.

@cthornton
cthornton / pkcs7_degenerate.rb
Last active September 12, 2017 21:53
Ruby PKCS#7 Certificate Only Degenerate (application/x-x509-ca-ra-cert)
# Creates a degenerate PKCS#7 certificate only in ruby (SCEP application/x-x509-ca-ra-cert)
# Inspiration: https://github.com/AppBlade/TestHub/blob/master/app/controllers/scep_controller.rb#L92-L112
#
# Tested Ruby 2.2.0 OSX 10.10, OpenSSL 1.0.1l
require 'openssl'
cert = OpenSSL::X509::Certificate.new File.read('some_cert.crt')
# Fails ruby 2.2, OpenSSL 1.0.1l!!
p7certs = OpenSSL::PKCS7.new
@darconeous
darconeous / id_rsa.pub
Last active January 7, 2020 01:46
SSH Public Keys #Security #openpgp #gpg #ssh #yubikey
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
# Hardware-backed Personal Keys
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4Y/rpKbKEQcBm0dCCHt90s6G945AtEtgG++EQ6v1+fgoQJkVTI2ajg8WDeXVFKxtuOO9QbW0LBHKOX650+9kjgRshF1Z/ystO0h2FSP8ic4PaP79W14qrszIS102vP168IxSLBsTA/X5yivwuLGbxzMEWA4IrAm1s2GRE0ZGWUmIhp7wps9cOhbVsfGXIMLcHAU6mXutfsVtzOjC6tS8NpitcmaMBAsJ2Hy8cyVDApm5vuNLUsPXtTwVNfxRX3d/O0xJ4YRFngTGKVUKb1acX7t0PyXUH0EA/xKy5yfTUoDXvGttz9UTEXsy07qKpVwOT566iDxpl3ie4J+hUaCtB openpgp:3640FDF505046F79
# Hardware-backed Work Keys
ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBJemMyZM7uY7rkJ65xWOW+z7mgU5E5MAtz+4MppZf7folk1UqI0Koe9V3bY+GxBgMjg1K9IFVfQSuG3qyFahwJU= [email protected]
ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBL/SP/JuW8oZqNRvY1tQYYvDbGy35lJkLu+dt8sRx36zQ7yLZOFfVmh7qIQTxeF0oMZmYTCHtO2z58DmQ6CSWio= [email protected]
@darconeous
darconeous / ident.pgp.asc
Last active January 22, 2020 01:36
OpenPGP Key #Security #PGP
-----BEGIN PGP PUBLIC KEY BLOCK-----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@drewbug
drewbug / secdebug
Last active August 29, 2015 14:07
security framework debugging
# trace debug-log macro
sudo dtrace -qn 'security_debug*:::log { printf("[%s] %s\n", copyinstr(arg0), copyinstr(arg1)); }'
# restart securityd
sudo launchctl unload /System/Library/LaunchDaemons/com.apple.securityd.plist &&
sudo launchctl load /System/Library/LaunchDaemons/com.apple.securityd.plist
@anoved
anoved / star.scad
Created March 18, 2014 15:48
OpenSCAD pointed star module
// points = number of points (minimum 3)
// outer = radius to outer points
// inner = radius to inner points
module Star(points, outer, inner) {
// polar to cartesian: radius/angle to x/y
function x(r, a) = r * cos(a);
function y(r, a) = r * sin(a);
// angular width of each pie slice of the star
@karlgluck
karlgluck / Hash Ladders for Shorter Lamport Signatures.md
Last active May 10, 2025 01:59
I describe a method for making Lamport signatures take up less space. I haven't seen anyone use hash chains this way before, so I think it's pretty cool.

What's this all about?

Digital cryptography! This is a subject I've been interested in since taking a class with Prof. Fred Schneider back in college. Articles pop up on Hacker News fairly often that pique my interest and this technique is the result of one of them.

Specifically, this is about Lamport signatures. There are many signature algorithms (ECDSA and RSA are the most commonly used) but Lamport signatures are unique because they are formed using a hash function. Many cryptographers believe that this makes them resistant to attacks made possible by quantum computers.

How does a Lamport Signature work?