[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <514B3551.9060505@gmail.com>
Date: Thu, 21 Mar 2013 09:29:05 -0700
From: ravin wind <ravinwinddce@...il.com>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] Password Hashing done wrong on CISCO IOS
On 03/21/2013 09:06 AM, Yann Droneaud wrote:
> "The algorithm was incorrectly implemented in version 15 of Cisco's
> IOS operating system, so that instead of using an 80-bit "salt" value,
> it used none, and instead of an intended 1000 iterations through
> SHA256, it used only one."
>
> What can be worst ? :/
What is worst is that Cisco has *no plans to correct this error*
according to their current statement. IOS is used in commercial-scale
(heavy metal) routers.
Powered by blists - more mailing lists