lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <514B3551.9060505@gmail.com> Date: Thu, 21 Mar 2013 09:29:05 -0700 From: ravin wind <ravinwinddce@...il.com> To: discussions@...sword-hashing.net Subject: Re: [PHC] Password Hashing done wrong on CISCO IOS On 03/21/2013 09:06 AM, Yann Droneaud wrote: > "The algorithm was incorrectly implemented in version 15 of Cisco's > IOS operating system, so that instead of using an 80-bit "salt" value, > it used none, and instead of an intended 1000 iterations through > SHA256, it used only one." > > What can be worst ? :/ What is worst is that Cisco has *no plans to correct this error* according to their current statement. IOS is used in commercial-scale (heavy metal) routers.
Powered by blists - more mailing lists