Ephemeral Tread’s balance implications

The feat ephemeral tread paired with the spell dream travel, seems to let you travel to the dimension of dreams, and perform impossible actions. This seems to let you at a low level, cast wish upon yourself to gain permanent bonuses. Or to create an artifact, then astral project yourself onto the material plane with new artifacts? Is this actually possible uses or is there something that prevents the use of such powerful methods?

Using astral projection would be difficult as you would have to work around the duration of dream travel and the 1/day impossible action. However I’m sure there exist methods to prolong or regain your use while on the dimension of dream.

Putting together an air-gap ephemeral linux OS to run off RAM

Idea: Have an operating system boot from a bootable medium completely into RAM. There is no storage attached to this system, so once it boots up and we eject the bootable medium, this system is completely running off RAM & its not capable of leaving a trace anywhere except RAM, contents of which are hard to recover without physical access to the system.

Premises: There is no physical access to this system, which makes a whole set of attacks possible, but lets compile a list of attacks like Cold boot attacks etc, that possess a threat to this setup, and we can assess the severity of each one of them.

Use-case: Using as a vault for cryptocurrency storage & signing transactions.

Stack:

  • Hardware: Raspberry Pi / Old Computer (which may or may not have wifi/bluetooth hardware available, latter preferred obviously)
  • Custom Linux OS (Functional Display + Touchscreen drivers + Camera drivers + Absence of WiFi / Bluetooth drivers + Modern Browser + On-screen keyboard)
  • Binary (Golang program running a local server & UI accessed via browser)

Things that may or may not matter:

  • CPU architecture: x86 / ARM
  • Bootable media: USB drive / SD card

Communication medium with air-gap system: QR codes

Since this only requires little information to be passed to & fro, using QR codes to encode/decode JSON payload seems ideal.

Explanation: Boot up the computer & eject bootable medium. Run the program and access UI in a browser by going to localhost:3000. Generate the keys (Sensitive information) or import if you already have those keys generated in a previous run. Scan QR code to receive the unsigned transaction, show confirmation, sign it and then encode signed transaction as QR code and display it.

The bootable media that’s in use, will never be plugged back into a system connected to the internet as an additional security measure, but with the ability to eject bootable medium after boot up, makes this unnecessary.

Building Custom Linux OS: This is where I want to crowd source knowledge:

  • What OS to choose to build upon + what packages to use + what packages to remove?
  • What would be a simpler approach to building this OS?
  • How to build a lean & minimal distro which can run on a system as low as 512 MB RAM (the less the better), provided the OS footprint is around 100-20 MB of RAM, leaving the rest for the program to use.
  • Expose attack vectors in this approach.

End Goal: Present the source-code + instructions and host the distro for download to use as a cryptocurrency vault along with the wallet app that will be open-sourced with the option of choosing a hosted service for that as well. Considering the architecture, people can simply use it without even requiring to trust/verify the system, as long as they can maintain the air-gap of the vault.

What happens when an Ephemeral takes Bashing damage equal to their Corpus?

The Chronicles of Darkness manual states:

Physical attacks on a Manifested entity that would normally cause lethal damage only cause bashing damage unless the attack utilizes the entity’s bane. Despite appearing to the naked eye and being solid, a Manifested spirit, ghost, or angel doesn’t have any internal organs to injure.

I’m imagining a situation where an angel is taking multiple Lethal attacks each round, which cause only Bashing damage. What happens when the angel’s Corpus track fills up with Bashing damage?

  • Do they have to make a reflexive roll to stay conscious?
  • Do the subsequent Lethal attacks then act as Lethal?
  • If that track gets filled again, do they take Aggravated damage?

I am trying to determine if any attack that does not involve their Bane can stop (even temporarily) an Ephemeral.

What happens when an Ephemeral takes Bashing damage equal to their Corpus?

The Chronicles of Darkness manual states:

Physical attacks on a Manifested entity that would normally cause lethal damage only cause bashing damage unless the attack utilizes the entity’s bane. Despite appearing to the naked eye and being solid, a Manifested spirit, ghost, or angel doesn’t have any internal organs to injure.

I’m imagining a situation where an angel is taking multiple Lethal attacks each round, which cause only Bashing damage. What happens when the angel’s Corpus track fills up with Bashing damage?

  • Do they have to make a reflexive roll to stay conscious?
  • Do the subsequent Lethal attacks then act as Lethal?
  • If that track gets filled again, do they take Aggravated damage?

I am trying to determine if any attack that does not involve their Bane can stop (even temporarily) an Ephemeral.

What happens when an Ephemeral takes Bashing damage equal to their Corpus?

The Chronicles of Darkness manual states:

Physical attacks on a Manifested entity that would normally cause lethal damage only cause bashing damage unless the attack utilizes the entity’s bane. Despite appearing to the naked eye and being solid, a Manifested spirit, ghost, or angel doesn’t have any internal organs to injure.

I’m imagining a situation where an angel is taking multiple Lethal attacks each round, which cause only Bashing damage. What happens when the angel’s Corpus track fills up with Bashing damage?

  • Do they have to make a reflexive roll to stay conscious?
  • Do the subsequent Lethal attacks then act as Lethal?
  • If that track gets filled again, do they take Aggravated damage?

I am trying to determine if any attack that does not involve their Bane can stop (even temporarily) an Ephemeral.

What happens when an Ephemeral takes Bashing damage equal to their Corpus?

The Chronicles of Darkness manual states:

Physical attacks on a Manifested entity that would normally cause lethal damage only cause bashing damage unless the attack utilizes the entity’s bane. Despite appearing to the naked eye and being solid, a Manifested spirit, ghost, or angel doesn’t have any internal organs to injure.

I’m imagining a situation where an angel is taking multiple Lethal attacks each round, which cause only Bashing damage. What happens when the angel’s Corpus track fills up with Bashing damage?

  • Do they have to make a reflexive roll to stay conscious?
  • Do the subsequent Lethal attacks then act as Lethal?
  • If that track gets filled again, do they take Aggravated damage?

I am trying to determine if any attack that does not involve their Bane can stop (even temporarily) an Ephemeral.

are session key generated during RSA key exchange mode ephemeral

A cryptographic key is called ephemeral if it is generated for each execution of a key establishment process.

We don’t we say then that the pre-master secret used in RSA key exchange mode during an TLS handshake and the derived session key from it are ephemeral ? Of course it does not provide Forward Secrecy as it is using the same public key from servers certificate over and over again, but still the session key is generated on each session. What am I missing ?

Mass portscans on ephemeral ports… why?

I recently got a new account and took over management of their space, including the sonicwall.

First thing’s first, we updated the firmware as the prior admin hadn’t been keeping up… lovely 🙂

So, in the wave of reconfigure-the-sonicwall-to-actually-be-a-security-appliance, I turned on IDS and event alerts.

My box has exploded with scan alerts. Here are a few.

What’s strange is the alerts appear to have the following characteristics: Usually originating on a web port, 80 and 443 Targeting the public-facing IP This is a US based customer of mine with global clientele, but I’m who.is’ing the IPs and seeing stuff from Iceland to China.

Can someone provide some clarity as to a legitimate service that the IDS has mistook? Originally, IDS hosed all SIP traffic until I excluded the off-site PBX, so I wouldn’t be surprised if IDS is hosing more things and the users just don’t notice or report.

04/18/2019 19:25:05 - 82 - Security Services - Alert - 77.247.109.151, 7659, X2 - XXX.178, 19090, X2 - udp - UDP scanned port list, 8080, 9060, 9070, 9080, 17070 - Possible port scan detected  This email was generated by: SonicOS Enhanced 6.5.3.1-48n (18B1-6993-2800)    04/18/2019 17:54:06 - 82 - Security Services - Alert - 198.61.165.71, 443, X2 - XXX.180, 64982, X2 - tcp - TCP scanned port list, 41016, 18069, 26794, 56346, 14356 - Possible port scan detected  This email was generated by: SonicOS Enhanced 6.5.3.1-48n (18B1-6993-2800)    04/18/2019 17:13:58 - 83 - Security Services - Alert - 5.8.18.90, 65532, X2 - XXX.180, 3364, X2 - tcp - TCP scanned port list, 3363, 3362, 3357, 3365, 3358, 3359, 3360, 3355, 3361, 3364 - Probable port scan detected  This email was generated by: SonicOS Enhanced 6.5.3.1-48n (18B1-6993-2800)    04/18/2019 17:13:58 - 82 - Security Services - Alert - 5.8.18.90, 65532, X2 - XXX.180, 3359, X2 - tcp - TCP scanned port list, 3363, 3362, 3357, 3365, 3358 - Possible port scan detected  This email was generated by: SonicOS Enhanced 6.5.3.1-48n (18B1-6993-2800)    04/18/2019 15:55:46 - 82 - Security Services - Alert - 205.180.85.169, 443, X2 - XXX.180, 52468, X2 - tcp - TCP scanned port list, 19366, 65141, 17474, 5725, 57646 - Possible port scan detected  This email was generated by: SonicOS Enhanced 6.5.3.1-48n (18B1-6993-2800)    04/18/2019 14:52:53 - 82 - Security Services - Alert - 151.101.5.140, 443, X2 - XXX.180, 36862, X2 - tcp - TCP scanned port list, 18568, 29110, 40462, 10585, 26896 - Possible port scan detected  This email was generated by: SonicOS Enhanced 6.5.3.1-48n (18B1-6993-2800) 

Is ephemeral, authenticated, encrypted TLS-PSK ready to use commercially?

I have a secure way to get a pre-shared key between my server and all of the clients.

Is there a standard, easily available (e.g. in an OpenSSL release) way to use this to set up TLS-PSK with all of these nice features?

  • Confidential
  • Authenticated
  • Perfect forward secrecy

I see TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA in RFC 5489, which looks like it checks these boxes. Checking my installation of OpenSSL 1.1.1a (openssl ciphers -s -psk) I see ECDHE-PSK-AES-256-CBC-SHA.

Is that the right cipher suite to use? Does it actually provide the features I need? Ideally I want to configure OpenSSL on each end to allow just that one cipher suite, and then each end provides the same PSK, and then I have perfect forward secrecy and authentication.

I’ve only ever done “traditional” TLS with X509 certificates before so I’m a little out of my element.