[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2d6724810701081247g62ab8100xabdc6afae89c36eb@mail.gmail.com>
Date: Mon, 8 Jan 2007 15:47:51 -0500
From: "T Biehn" <tbiehn@...il.com>
To: Full-Disclosure@...ts.grok.org.uk
Subject: Fwd: Flog 1.1.2 Remote Admin Password Disclosure
---------- Forwarded message ----------
From: T Biehn <tbiehn@...il.com>
Date: Jan 8, 2007 3:06 PM
Subject: Re: [Full-disclosure] Flog 1.1.2 Remote Admin Password Disclosure
To: endrazine <endrazine@...il.com>
How are you guys still arguing about this?
It wasn't even a troll.
It's called a one-way-hash for a reason.
Oh and if someone comes out with quantum computers tomorrow we could factor
RSA, so we better start putting out SSL advisories.
Slippery slope indeed.
On 1/8/07, endrazine <endrazine@...il.com> wrote:
>
> typos :
>
> endrazine a écrit :
> > Here again, I agree. Now, if one needs to exhaustively try every
> > possible 32b hashes with the largest possible charset (or even bigger
> hashes
> > with a smaller - like those alphanumerical keys you just mentionned), to
>
> > break a password hash, the it's not a "*BIG*" security issue like
> > mentionned earlier imho.
> >
> s/hashes/passwords/ indeed
>
> Cheers,
>
> endrazine-
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists