lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <9A043F3CF02CD34C8E74AC1594475C7343D28C71@uxcn10-tdc02.UoA.auckland.ac.nz> Date: Fri, 22 Mar 2013 01:52:44 +0000 From: Peter Gutmann <pgut001@...auckland.ac.nz> To: "discussions@...sword-hashing.net" <discussions@...sword-hashing.net> Subject: Re: [PHC] Password Hashing done wrong on CISCO IOS Marsh Ray <maray@...rosoft.com> writes: >The challenge with subtle password hash bugs is that QA can do a thorough job >of black-box testing and still not catch 1 round instead of 1000. Customers in >the field are even unlikely to notice or complain about it. Firefox (meaning probably NSS, so potentially lots of other products as well) did this for quite some time, possibly years. It was only corrected when I noticed it with dumpasn1 and filed a bug. Even then it took them over a year, and repeated nags by me, to get it fixed, and I don't think they changed the code to fix up existing stored data. There's probably still who knows how many private keys floating around out there with effectively no protection on them because of this. So it's not just Cisco, it affects other widely-deployed implementations as well. Peter.
Powered by blists - more mailing lists