| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <92bb78b22260a9be803c2092152f7d72@meuh.org> Date: Thu, 21 Mar 2013 17:06:55 +0100 From: Yann Droneaud <ydroneaud@...eya.com> To: <discussions@...sword-hashing.net> Subject: Password Hashing done wrong on CISCO IOS Hi, Reported by H-Online "Weakened password hashing found in Cisco devices" http://www.h-online.com/security/news/item/Weakened-password-hashing-found-in-Cisco-devices-1827197.html "The algorithm was incorrectly implemented in version 15 of Cisco's IOS operating system, so that instead of using an 80-bit "salt" value, it used none, and instead of an intended 1000 iterations through SHA256, it used only one." What can be worst ? :/ Regards. -- Yann Droneaud OPTEYA
Powered by blists - more mailing lists