lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: r.stiemer at imd-worldwide.tv (Ron Stiemer)
Subject: AW: Security Hole in HTTP (RFC1945) -Browser-Spoofing

Hi,

yes, this was a serious question...
but thanks for you answer :)

ja, stimmt h?tte ich selber drauf kommen k?nnen, aber man wei? ja nie was
heutzutage so alles im netz passiert...aber den begriff
browser-in-the-middle gibt es anscheinend tats?chlich...sagt zumindest
google...

Gru?,
-Ron

-----Urspr?ngliche Nachricht-----
Von: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com]Im Auftrag von Tobias
Weisserth
Gesendet: Donnerstag, 1. April 2004 02:11
An: full-disclosure@...ts.netsys.com
Betreff: Re: [Full-Disclosure] Security Hole in HTTP (RFC1945)
-Browser-Spoofing


Hi Ron,

Is this a serious question?!
 _     ___  _
| |   / _ \| |
| |  | | | | |
| |__| |_| | |___
|_____\___/|_____|

Am Do, den 01.04.2004 schrieb Ron Stiemer um 00:54:
> Hi List,
>
> can anybody confirm this, or is it just an april's fool joke ?

Just look at the link (-> in 10 Jahren...).

> http://www.heise.de/security/news/meldung/46175

I'll swallow my mouse (wireless) if this is not an April's fool joke.

> sorry, text is in german

No problem.

regards,
Tobias

--
***************************************************
   ____  _____
  |  _ \| ____| Tobias Weisserth
  | | | |  _|   tobias@...sserth.[de|com|net|org]
 _| |_| | |___  http://www.weisserth.org
(_)____/|_____|

Encrypted mail is welcome.
Key and fingerprint: http://imprint.weisserth.org

***************************************************


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ