lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <37556.1230683261@turing-police.cc.vt.edu>
Date: Tue, 30 Dec 2008 19:27:41 -0500
From: Valdis.Kletnieks@...edu
To: chort <chort0@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Creating a rogue CA certificate

On Tue, 30 Dec 2008 16:19:31 PST, chort said:

> The viability of that approach depends on how much the code depends on
> the systems being clustered together over low-latency interconnects.
> 4000 machines spread all across the internet separated by 300ms of
> latency is not the same thing as 4000 machines in the same room
> running a cluster OS.

They give a hint that it's *highly* parallel code:

"This part is not suited for the PS3s SPU cores due to the large memory demands
and the high number of branches in the software execution flow."

Presumably, if the hit that a lot of branches create is bad, the *huge*
hit of even an Infiniband interconnect would be fatal...

Content of type "application/pgp-signature" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ