Date: Mon, 16 Nov 1998 20:14:52 +0100 From: Poul-Henning Kamp <phk@critter.freebsd.dk> To: Fernando Schapachnik <fpscha@ns1.sminter.com.ar> Cc: tcrimi+@andrew.cmu.edu (Thomas Valentino Crimi), tlambert@primenet.com, freebsd-security@FreeBSD.ORG Subject: Re: Would this make FreeBSD more secure? Message-ID: <23903.911243692@critter.freebsd.dk> In-Reply-To: Your message of "Mon, 16 Nov 1998 15:11:16 -0300." <199811161811.PAA01939@ns1.sminter.com.ar>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <199811161811.PAA01939@ns1.sminter.com.ar>, Fernando Schapachnik writes:
>En un mensaje anterior, Thomas Valentino Crimi escribió:
>[...]
>> And then we have md5 passwords, arguably broken, now, but orders of
>> magnitudes better than DES.
>
>Broken? I'm using them with no problem. What do you mean?
He means that he hasn't understood the first law of cryptography:
"No cipher is unbreakable, it's all a question about time & effort"
Given sufficient resources you can brute-force any encryption or
scrambling.
MD5 scambled passwords are not even close to being broken, for any
value of broken worth talking about.
--
Poul-Henning Kamp FreeBSD coreteam member
phk@FreeBSD.ORG "Real hackers run -current on their laptop."
"ttyv0" -- What UNIX calls a $20K state-of-the-art, 3D, hi-res color terminal
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?23903.911243692>
