| 00:05:12 | | qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins |
| 00:46:48 | | TheTechRobo quits [Remote host closed the connection] |
| 00:47:27 | | TheTechRobo (TheTechRobo) joins |
| 01:56:27 | | Larsenv (Larsenv) joins |
| 01:58:49 | | TheTechRobo quits [Remote host closed the connection] |
| 01:59:29 | | TheTechRobo (TheTechRobo) joins |
| 02:02:50 | | TheTechRobo quits [Remote host closed the connection] |
| 02:03:23 | | TheTechRobo (TheTechRobo) joins |
| 03:08:18 | | TheTechRobo quits [Remote host closed the connection] |
| 03:08:52 | | TheTechRobo (TheTechRobo) joins |
| 03:57:24 | <@JAA> | Today, #imgone made me look at how the 'random order brute' code works, and it appears to simply bruteforce random codes, using MD5 to generate random numbers from the sequence number: https://github.com/ArchiveTeam/terroroftinytown/blob/80ffc526a8b3fd188e6f73fab7b425af61f45d28/terroroftinytown/services/rand.py |
| 03:57:53 | <@JAA> | This means repeated codes and no guarantee of complete coverage, unless I completely misunderstand something here. :-| |
| 04:39:40 | <klg> | I think this is the https://github.com/ArchiveTeam/terroroftinytown/issues/10; the code you linked at least uses md5 in 'counter mode' which is better than iterated md5 mentioned in #10 |
| 04:41:30 | <@JAA> | Ah, indeed. |
| 04:41:55 | | qwertyasdfuiopghjkl quits [Client Quit] |
| 04:43:24 | | qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins |
| 04:48:18 | <klg> | I think the major problem here is that all the off-the-shelf pseudorandom permutations are designed for powers of two while power of something like 26 or 36 is needed; but here in rand.py, it looks like simply 8 bytes of output are used, so it should be easy to replace md5 with something like 64-bit block cipher with fixed key to make it prp |
| 04:52:32 | <@JAA> | I'm not entirely sure I'd go down the encryption route. That would only work correctly if we want to scan the entire keyspace of one block (or multiple blocks), I think. |
| 04:53:00 | <@JAA> | Since encrypting a single block should be a guaranteed 1-to-1 mapping. |
| 04:56:47 | <klg> | yes, one block only |
| 05:00:07 | <@JAA> | So all we need is a weird block cipher that operates on 6 base36-characters etc. :-P |
| 05:00:47 | <@JAA> | A bit of base conversion and bit shuffling should do the trick. |
| 05:00:49 | <klg> | but transform_sequence_num simply uses md5 as mapping from 64-bit integers and 64-bit integers so there's already assumption you want whole 64-bit space; replacgin md5 with a cipher would simply remove repetitions and make it eaasy to track coverage |
| 05:01:47 | <@JAA> | Yeah, true, it'd be better than the current code for sure. |
| 05:02:21 | <@JAA> | And it truncates the value further after the base conversion. |
| 05:08:04 | | qwertyasdfuiopghjkl quits [Client Quit] |
| 05:21:10 | <klg> | related concept is that of format-preserving encryption ftr, but implementing any of those would probably be an overkill |
| 05:22:27 | | qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins |
| 05:29:38 | | qw3rty_ quits [Ping timeout: 252 seconds] |
| 05:54:46 | | Somebody2 quits [Ping timeout: 252 seconds] |
| 05:55:09 | | Somebody2 joins |
| 05:58:27 | | qwertyasdfuiopghjkl quits [Client Quit] |
| 06:02:22 | | qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins |
| 06:04:40 | | Somebody2 quits [Ping timeout: 252 seconds] |
| 06:08:07 | | Somebody2 joins |
| 06:16:23 | | Somebody2 quits [Ping timeout: 252 seconds] |
| 06:20:03 | | Somebody2 joins |
| 06:39:30 | | Somebody2 quits [Ping timeout: 252 seconds] |
| 06:42:57 | | Somebody2 joins |
| 06:55:28 | | Icyelut|2 quits [Quit: bye] |
| 07:02:53 | | Icyelut (Icyelut) joins |
| 07:02:54 | | qw3rty joins |
| 08:06:15 | | qwertyasdfuiopghjkl quits [Remote host closed the connection] |
| 08:08:18 | | benjinsm joins |
| 08:09:08 | | Nickwasused joins |
| 08:09:48 | | benjins2_ joins |
| 08:11:32 | | benjins2 quits [Ping timeout: 252 seconds] |
| 08:11:32 | | benjins quits [Ping timeout: 252 seconds] |
| 08:16:40 | | @rewby quits [Ping timeout: 252 seconds] |
| 09:01:49 | | rewby (rewby) joins |
| 09:01:49 | | @ChanServ sets mode: +o rewby |
| 09:26:58 | | Nickwasused quits [Client Quit] |
| 09:28:00 | | Nickwasused joins |
| 09:33:24 | | Nickwasused is now authenticated as Nickwasused |
| 09:40:41 | | Nickwasused quits [Client Quit] |
| 10:10:44 | | tbc1887 quits [Read error: Connection reset by peer] |
| 14:11:29 | | BearFortress quits [Quit: https://quassel-irc.org - Chat comfortably. Anywhere.] |
| 15:11:48 | | TheTechRobo quits [Remote host closed the connection] |
| 15:12:28 | | TheTechRobo (TheTechRobo) joins |
| 15:20:53 | | TheTechRobo quits [Ping timeout: 252 seconds] |
| 17:04:10 | | benharri leaves [ping me anyways i guess] |
| 17:32:53 | | qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins |
| 17:43:10 | | T31M quits [Quit: ZNC - https://znc.in] |
| 17:43:30 | | T31M joins |
| 17:54:46 | | T31M is now authenticated as T31M |
| 18:06:15 | | qwertyasdfuiopghjkl60 (qwertyasdfuiopghjkl) joins |
| 18:06:42 | | qwertyasdfuiopghjkl60 is now known as qwertyasdfuiopghjkl_ |
| 18:08:04 | | tech234a quits [Quit: Connection closed for inactivity] |
| 18:08:36 | | qwertyasdfuiopghjkl quits [Ping timeout: 265 seconds] |
| 18:13:37 | | qwertyasdfuiopghjkl_ is now known as qwertyasdfuiopghjkl |
| 18:21:21 | | tech234a (tech234a) joins |
| 18:27:20 | | qwertyasdfuiopghjkl quits [Client Quit] |
| 18:29:41 | | qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins |
| 18:41:38 | | Icyelut quits [Ping timeout: 252 seconds] |
| 18:59:17 | | qwertyasdfuiopghjkl quits [Client Quit] |
| 19:01:06 | | qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins |
| 19:14:21 | | qwertyasdfuiopghjkl quits [Client Quit] |
| 19:15:49 | | qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins |
| 20:22:30 | | michaelblob quits [Read error: Connection reset by peer] |
| 20:22:31 | | TheTechRobo (TheTechRobo) joins |
| 20:37:49 | <TheTechRobo> | I thought this project increases a number and converts it to base whatever? |
| 20:40:00 | <@JAA> | It does for sequential scanning. This is about the random order ones. |
| 20:42:14 | <TheTechRobo> | JAA: Ah |
| 21:39:35 | | BearFortress joins |
| 22:19:17 | | threedeeitguy quits [Quit: The Lounge - https://thelounge.chat] |
| 22:32:57 | | threedeeitguy joins |