Hacker Newsnew | past | comments | ask | show | jobs | submit | akerl_'s commentslogin

Is this really that much of a euphemism? It's the same idea as electric fences for dogs, except the range involved is obviously quite different.

It's staged shocking also - cows first hear beeping / buzzing, followed by mild shocking - less than a regular electric fence, then a greater shock.

It also reduces physical fencing costs and adds the ability to herd by "moving" the virtual boundaries so that cows can be moved from pasture to pasture.

There's more on this on Landline

* https://www.thetvdb.com/series/landline/episodes/11325308

* https://www.abc.net.au/news/rural/programs/landline/2025-09-...

The RSPCA (Royal Society for the Prevention of Cruelty to Animals, Australia) is still reserving judgement on this, so far in seems that in "normal operation" animals recieve less shocking than with trad roll out electric fence lines (which are mostly a visual bright white tape cue that often are unpowered once animals "learn") .. BUT there's also a question of "how bad can this get in fail conditions".


> It's staged shocking also - cows first hear beeping / buzzing, followed by mild shocking - less than a regular electric fence, then a greater shock

Yea, that’s basically exactly how the electric fences people have used for dogs for decades work.


Sure - save for the "live updates of boundaries" part -

the worst case fail situation here is likely a boundary being broadcast that was on the opposite side of the planet ("a simple error of plus/minus sign") and the entire herd is constantly(?) being buzzed and shocked.


Is your pitch that the reports are slop? Or that they’re so dangerous it’s morally indefensible to share the research?

A good chunk of the reports are false positives (slop) per the researcher's own admission in his talk. I have no issue sharing the bug reports either; the bugs are better fixed.

What I take issue with is that they have basically released the weapon first without thinking about the consequences. And again, if you watch the talk, you'll see how he literally calls others to action to fix the problem. They made a problem and are asking you to fix it, and it will also cost you money, which conveniently goes to them. Any industry with even a semblance of regulation would find this very disturbing.


The “weapon” here is identifying vulnerabilities that were already present and exploitable by malicious actors?

A very shallow dismissal of my point. Is there no room for depth in your logical analysis?

First of all, we don't know whether this particular bug was already being exploited in the wild. We do know that there is a community of experts looking at the Linux kernel and reporting bugs. Yet this bug had never been reported until now. So either nobody ever looked there (unlikely), or they did and didn't find it. Conversely, the LLM found it with a prompt that even a 5-year old can type. That significantly lowers the effort for the attacker, so much that it changes the game. It is, to use a crude analogy, like deploying firearms in a field traditionally fought with sword and shield. So yes, that's the weapon, and these guys released the stuff to the public with no oversight. That should get some people thinking.


> So either nobody ever looked there (unlikely), or they did and didn't find it.

Those aren't the only two options.


> Also, I've never had a security issue due to TOFU, have you?

This is a bit like suggesting you've never been in a car crash, so seat belts must not be worth considering.

Do you feel that beyond the obvious and documented work in setting them up, there are disadvantages to using SSH certificates?


Certificates provide extra features, like revocation.

However, if you do not need the extra features provided by certificates, using SSH-generated keys is strictly equivalent with using certificates and it requires less work.

TOFU is neither necessary nor recommended, it is just a convenience feature, to be used when security may be lax.

The secure way to use SSH is to never use TOFU but to pair the user and the server by copying the public keys between the 2 computers through a secure channel, e.g. either by using a USB memory or by sending the public keys through already existing authenticated encrypted links that pass through other computers. (Such a link may be a HTTPS download link.)

When using certificates, a completely identical procedure must be used. After certificates are generated, like also after SSH keys are generated, the certificates must be copied to the client computer and the server computer through secure channels.


> secure channel, e.g. either by using a USB memory

Aside: We need a "safely dumb" storage plug standard. Right now the flexibility of USB is a double-edged sword, any USB device could potentially be malicious, waiting for the right moment to send keystrokes as a keyboard etc.

Or use the same plug for everything, but support a "passive storage only" that can be enforced by a special adapter or cable.


Assuming you’re not just soliciting random thumb drives from strangers… this doesn’t feel like an actual risk.

When you’re getting things from strangers, use any of the myriad ways to send files over a network, where HTTP / your browser are the safe dumb plug.


The place you buy the thumb drive is also a stranger that can't be trusted.

This kind of paranoia isn't productive.

It was productive enough for the NSA and FBI when they were intercepting equipment deliveries and installing backdoors in them.

A USB stick that can secretly remember any file that looks like a key file or certificate would be very easy.


> TOFU is neither necessary nor recommended

Just to make it clear: this does not mean that it is fine to blindly accept the message on first use.

The "secure way" implies copying the server's public key as well, which people generally don't do, right? Which is equivalent to verifying the fingerprint shown with the TOFU message, correct?


Like I have said the secure way requires the secure copying of both keys before the first connection attempt

The server public key must be copied into "known_hosts" on the client, while the client public key must be copied into "authorized_keys" on the server.

When this is the procedure that is always followed, any message shown by SSH about an unknown host means that the connection must be aborted, because the identity of the server is unknown.

You cannot truly verify the "fingerprint" displayed by SSH, unless you simultaneously have access to another computer, where you have a copy of the fingerprint. What is usually meant by "verifying" is that you remember a few digits of the fingerprint, and those match.

You could have copied the fingerprint from the server, to be able to truly verify it, but that does not make sense, because in that case you should have copied the entire key, not just the fingerprint, and you should have installed it in the client.

When you use only authentication with digital signatures, it does not make sense to use any other procedure, because you must make at least one of the two copies anyway, so when copying the client key to the server you can take the server key, to carry it back to the client.

The TOFU method is meant to be used together with password-based authentication, in less secure applications, where no physical access to the server is required for setting up SSH on the client.

By "less secure" I mean for example applications equivalent to HTTPS, where the client is not really authenticated, e.g. when providing a public password allowing read-only access to an SSH server through Internet.


> Like I have said

Sure, I just wanted to make sure that nobody would understand "TOFU is neither necessary nor recommended, just ignore that message and say "yes" when it appears".

Both ends need to be sure of who is on the other end, and there are different ways to achieve that. The way SSH works is that if you haven't copied the server public key locally, it will explicitly ask you to verify it the first time.

I am not sure that "SSH does TOFU". SSH asks you to verify. The human who YOLOs it and approves it without checking is the one doing TOFU, and this is not really secure.


> When using certificates, a completely identical procedure must be used. After certificates are generated, like also after SSH keys are generated, the certificates must be copied to the client computer and the server computer through secure channels.

That is not the case, and is a major advantage of certificates.


What you say is extremely wrong and this misconception is very dangerous.

When an authenticated connection between a client and a server (or any other 2 computers) is established, before the connection can be initiated both ends must already have a piece of information that has been copied to them through a secure channel, otherwise the authentication is impossible.

The 2 pieces of information may allow direct reciprocal authentication, i.e. the client may have the server certificate and the server may have the client certificate.

It is also possible to have indirect authentication, e.g. the server sends the server certificate to the client and the client sends the client certificate to the server during the initiation of the connection.

However, for indirect authentication, both the client and the server must had been previously paired with a server hosting the certification authority.

This means that the root certificate of the CA must have been transferred through secure channels to the client and to the server, and also that the client certificate and the server certificate must have been transferred through secure channels to the CA for signing and then back to the client and the server.

So setting up the computers for indirect authentication through certificates requires significantly more transfers through secure channels than setting them up for direct authentication.

The advantage of indirect authentication appears in an organization with a great number of computers, where indirect authentication reduces the number of secure pairings that must be done from N*(N-1)/2 to N.

However this has nothing to do with certificates. Indirect authentication can be done without certificates, like in Kerberos, or like in SSH if you have a management computer that you pair by copying the public_keys with every computer in the network. Later, whenever you want to enable some client to connect to a SSH server you use the management computer to copy securely the corresponding public_keys between the server and the client.

So no, there is no advantage of certificates related to reducing the number of transfers that must be done through secure side channels, like copying through a portable memory.

Certificates provide other features, like temporary validity and revocation, which can be useful in an enterprise context.


What misconception? You essentially admit that I'm right in this comment but surround it with a bunch of other unrelated words.

If you use SSH certificates, then you have to put the SSH CA cert on each server once, and you have to give signed certs back to each client once each time you sign a cert (which can be once per client or once per connection or anywhere in between).

You do not have to copy anything new to each server when you sign new client certs. Likewise if you sign host keys, you don't have to copy a new host key to your client when you add a new server.

Sure, you could get the same kind of trust relationships with other tools. But SSH certificates provide them and are an advantage of SSH certificates over traditional SSH public key auth.

It honestly feels like you're just dropping this thread into an LLM and asking it to write a disagreeing response.


Your ISP or telecom has to be compromised for TOFU to be relevant to anything. In practice that never happens.

Not just your ISP. If an attacker slipped a device onto your LAN and also you happened to be sshing to a new box for the first time then TOFU poses a problem. But that's an awfully limited attack surface. It's similar to the difference between leaking a fax while it's sent versus leaking years old emails that are just sitting there on an internet accessible server.

As for your ISP I think you should never rely on TOFU over the public internet. If you really don't want to do ssh certs it's easy enough to make the host key available securely via https.


Without even wading into trying to rank projects by track record, it's worth noting that "Everything has a poor security track record" and "All software doesn't have the same security track record" are not contradictory statements.

Well, except OpenBSD. They’ve only had two vulns in forever.

Only two remote code execution vulnerabilities in the default configuration. But that's not the only type of security bug.

As `tptacek caught on to, I was joking since OpenBSD's published claim is such a convenient comparison to the idea upthread that Linux specifically had a poor track record.

They're trolling me. :)

You mean "in the default install, in a heck of a long time". :)

If your read is that this is a vanity project, I guess that's a take.

It's more of a DEI/Jobs program

Both your examples are purchases. Musk had to raise actual capital to buy Twitter because the people getting the money were taking it and walking away.

Funding doesn't work like that. Investors are giving you money as part of a longer-term deal where they stick around.


Why?

I lived in an apartment building, and one of the upsides was that the building had a security system and a front desk that helped control who could be wandering down my hall.

Me too.

But we, owners, collectively choose that. We choose the security company, we pay then, we can vote them out. Most importantly: the construction company has zero say in this.

Also, no one actually check the IDs of my friends, and they don't have to pay the construction company when they first come.

I give the codes, they ring, I open. I hire a company to monitor the building but I can kick then out any day.

I own the place, you see?


Doesn't really seem like it fits the analogy. Even ignoring that, I doubt they were checking passports and collecting tolls from guests, right?

Do we think that maybe the 3,732 people who responded to a poll on Mastodon by an account centered around one side of this disagreement might potentially not be a representative sample of all Android users?

It's a bit hard to poll 4 billion devices, but out of all 4 billion devices I think it's safe to assume that the percentage of users who do care can be rounded up to maybe 1% at most.

Developers and enthusiasts are an extreme minority that's incredibly vocal. I think most people here disagree with Google's approach but too many people are pretending like their interests and use cases are significant on a "half the planet" scale.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: