<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en" xmlns="http://www.w3.org/2005/Atom"><title>Recent posts to news</title><link href="https://sourceforge.net/p/epoint/news/" rel="alternate"/><link href="https://sourceforge.net/p/epoint/news/feed.atom" rel="self"/><id>https://sourceforge.net/p/epoint/news/</id><updated>2008-03-11T22:53:36Z</updated><subtitle>Recent posts to news</subtitle><entry><title>Development moved!</title><link href="https://sourceforge.net/p/epoint/news/2008/03/development-moved/" rel="alternate"/><published>2008-03-11T22:53:36Z</published><updated>2008-03-11T22:53:36Z</updated><author><name>Daniel A Nagy</name><uri>https://sourceforge.net/u/nagydani/</uri></author><id>https://sourceforge.net2a3fadb7e4e917397f791e7f3569bcb8f5393225</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;The development of ePoint System is no longer done via SourceForge. We have moved everything to our own server:&lt;br /&gt;
&lt;a href="https://www.epointsystem.org/trac" rel="nofollow"&gt;https://www.epointsystem.org/trac&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>ePoint issuer server &amp;quot;redcent&amp;quot;: initial release</title><link href="https://sourceforge.net/p/epoint/news/2005/08/epoint-issuer-server-quotredcentquot-initial-release/" rel="alternate"/><published>2005-08-02T21:01:26Z</published><updated>2005-08-02T21:01:26Z</updated><author><name>Daniel A Nagy</name><uri>https://sourceforge.net/u/nagydani/</uri></author><id>https://sourceforge.neta60e1a42e8478e5bf047c5be0185d8b51a6eedcd</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;A simple FastCGI server for issuing ePoints that has been alpha-tested for ten months is now deemed to be ready for general beta-release.&lt;br /&gt;
It's been written in C and tested with Apache 1.3 mod_fastcgi.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>ePointPGP java package v0.8 released</title><link href="https://sourceforge.net/p/epoint/news/2005/04/epointpgp-java-package-v08-released/" rel="alternate"/><published>2005-04-08T23:03:20Z</published><updated>2005-04-08T23:03:20Z</updated><author><name>Daniel A Nagy</name><uri>https://sourceforge.net/u/nagydani/</uri></author><id>https://sourceforge.netca531c502b1dde8caedab86e8e1e50e4f6fdbe58</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;This is a feature-freeze release before 1.0&lt;br /&gt;
Code cleanup, Bug fixing, Keyserver bug workaround,&lt;br /&gt;
String-to-keypair, Modification Detection Code&lt;br /&gt;
Enjoy!&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Comments on OpenPGP encryption vulnerability</title><link href="https://sourceforge.net/p/epoint/news/2005/02/comments-on-openpgp-encryption-vulnerability/" rel="alternate"/><published>2005-02-24T02:30:27Z</published><updated>2005-02-24T02:30:27Z</updated><author><name>Daniel A Nagy</name><uri>https://sourceforge.net/u/nagydani/</uri></author><id>https://sourceforge.netf3e02d3a21b244cc9d538d084af427d616fd323d</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;The quick check for symmetric key integrity constitutes a serious vulnerability under certain circumstances, when using ePointPGP in server applications.&lt;/p&gt;
&lt;p&gt;In short, by repeated attempts at decrypting a number of carefully chosen fake ciphertext messages purporting to have been encrypted with the same symmetric key as the attacked message, the attacker can gain enough information from the fact whether or not it has passed the quick check to decrypt the first two bytes in the next block (and then those in all subsequent blocks).&lt;/p&gt;
&lt;p&gt;For a detailed analysis and explaination, please read&lt;br /&gt;
&lt;a href="http://eprint.iacr.org/2005/033.pdf" rel="nofollow"&gt;http://eprint.iacr.org/2005/033.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Please note that ePointPGP is intended primarily for client-side applications (applets) and we do not recommend it for any server application. On the client side, the quick check is still useful, and cannot be in practice exploited in the above described way.&lt;/p&gt;
&lt;p&gt;The affected method is net.sourceforge.epoint.pgp.ENCRYPTEDPacket.getCipher(Key k)&lt;/p&gt;
&lt;p&gt;The comment has been added to its documentation at&lt;br /&gt;
&lt;a href="http://epoint.sf.net/java/doc"&gt;http://epoint.sf.net/java/doc&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>ePointPGP java package v0.7 released</title><link href="https://sourceforge.net/p/epoint/news/2005/02/epointpgp-java-package-v07-released/" rel="alternate"/><published>2005-02-04T09:20:33Z</published><updated>2005-02-04T09:20:33Z</updated><author><name>Daniel A Nagy</name><uri>https://sourceforge.net/u/nagydani/</uri></author><id>https://sourceforge.net98dea2925f6591714943ad2113968092063275f6</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Major bugfix and code/API cleanup&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>ePointPGP java package v0.6 released</title><link href="https://sourceforge.net/p/epoint/news/2004/11/epointpgp-java-package-v06-released/" rel="alternate"/><published>2004-11-13T21:33:19Z</published><updated>2004-11-13T21:33:19Z</updated><author><name>Daniel A Nagy</name><uri>https://sourceforge.net/u/nagydani/</uri></author><id>https://sourceforge.netce372d1f6775ade489b933c91a7642eaf3575568</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Major bugfix release, experimental key generation code&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>mod_payment Apache micropayment module v0.1 (beta) released</title><link href="https://sourceforge.net/p/epoint/news/2004/09/modpayment-apache-micropayment-module-v01-beta-released/" rel="alternate"/><published>2004-09-15T02:59:16Z</published><updated>2004-09-15T02:59:16Z</updated><author><name>Daniel A Nagy</name><uri>https://sourceforge.net/u/nagydani/</uri></author><id>https://sourceforge.netce0cd48eb6d139a3a383332ad0c0d6c00a08f466</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;mod_payment + Apache is an easy micropayment solution for web-based services. While it has been developed in conjunction with the ePoint project, mod_payment can be used independently. This apache module is NOT suitable for the administration of on-line purchases of physical objects.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>ePointPGP java package v0.5 released</title><link href="https://sourceforge.net/p/epoint/news/2004/08/epointpgp-java-package-v05-released/" rel="alternate"/><published>2004-08-28T11:28:28Z</published><updated>2004-08-28T11:28:28Z</updated><author><name>Daniel A Nagy</name><uri>https://sourceforge.net/u/nagydani/</uri></author><id>https://sourceforge.netcf5ef9c40094d1352a66465d8241ba4af295892d</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Minor enhacements over v0.4. No features added.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>ePointPGP java package v0.4 (beta) released</title><link href="https://sourceforge.net/p/epoint/news/2004/03/epointpgp-java-package-v04-beta-released/" rel="alternate"/><published>2004-03-07T12:07:02Z</published><updated>2004-03-07T12:07:02Z</updated><author><name>Daniel A Nagy</name><uri>https://sourceforge.net/u/nagydani/</uri></author><id>https://sourceforge.netb3398f75028fc01d7e3f98c57531d7facd69fc3b</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Beta release; everything is supposed to work. Features: electronic signature verification and password-based encryption-decryption&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>ePointPGP java package v0.3 released (pre-beta)</title><link href="https://sourceforge.net/p/epoint/news/2004/03/epointpgp-java-package-v03-released-pre-beta/" rel="alternate"/><published>2004-03-05T19:27:17Z</published><updated>2004-03-05T19:27:17Z</updated><author><name>Daniel A Nagy</name><uri>https://sourceforge.net/u/nagydani/</uri></author><id>https://sourceforge.netd49880ddc52c40892f68acee6d769f0944c36025</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Cleanup, bugfixes and compressed stream support&lt;/p&gt;&lt;/div&gt;</summary></entry></feed>