lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 3 Apr 2007 20:50:15 +0400
From: 3APA3A <3APA3A@...URITY.NNOV.RU>
To: gaetan.leurent@....fr (Gaëtan LEURENT )
Cc: bugtraq@...urityfocus.com
Subject: Re[2]: APOP vulnerability

Dear Gaëtan LEURENT,

--Tuesday, April 3, 2007, 8:18:04 PM, you wrote to 3APA3A@...urity.nnov.ru:


GL> I meant practical in the sense that it does work in practice (it's not
GL> an attack needing 2^80 computations or something like that), but I don't
GL> know what are the practical implications of the attack :-)
GL> (to begin with, I don't know if many people are using APOP).

A  number  of  POP3  servers support APOP, but most of them require some
special configuration. And it seems like Mozilla attempts to use APOP if
APOP  banner  is  present  in  server  reply  and  no secure protocol is
configured.  So  yes,  it's  used,  but  mostly  as  an  alternative  to
cleartext.  Based  on  last  115000  sessions  statistics for ISP's mail
server with CRAM-MD5, APOP and NTLM support, ~7000 mailboxes:

  Cleartext: 96,3%
  APOP:      2,1%
  CRAM-MD5:  1%
  NTLM:      0.6%



-- 
~/ZARAZA http://securityvulns.com/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ