What is the relation between "signature_algorithms" handshake extension and TLS ciphersuite

I am learning TLS handshake and find client/serve will negotiate a cihpersuite during client/server hello.
Usually, the last part of a ciphersuite is a hash algorithm, like SHA256 in ECDHE-ECDSA-AES128-SHA256. The second part of a ciphersu… Continue reading What is the relation between "signature_algorithms" handshake extension and TLS ciphersuite

How to verify integrity of software when the download provider doesn’t publish hashes?

I noticed that certain software does not provide hash anymore nowadays.
E.g.

Zoom

https://zoom.us/download
wolf@linux:~$ ls -lh zoom_amd64.deb
-rw-rw-r– 1 wolf wolf 44M Jan 1 00:00 zoom_amd64.deb
wolf@linux:~$

I’ve googled both md5… Continue reading How to verify integrity of software when the download provider doesn’t publish hashes?

Which config files in a linux install contain passwords or other secrets?

I’m trying to build a list of configuration files that store secrets in Linux. By secrets I mean files that contains passwords, database string connection, hashes etc. The most notable example is, of course, /etc/shadow. /etc/pki/* is also… Continue reading Which config files in a linux install contain passwords or other secrets?

Why there is nothing that automatically checks signatures of files downloaded in browsers? [duplicate]

When downloading files (mainly software/installers) from pages in browsers, sometimes it comes also with a cryptographic hash or a signature to verify the authenticity of a file against data manipulation (example below).

Why there isn’t … Continue reading Why there is nothing that automatically checks signatures of files downloaded in browsers? [duplicate]