From owner-freebsd-security Mon Nov 16 13:22:23 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id NAA13516 for freebsd-security-outgoing; Mon, 16 Nov 1998 13:22:23 -0800 (PST) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from critter.freebsd.dk (critter.freebsd.dk [212.242.40.131]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id NAA13465 for ; Mon, 16 Nov 1998 13:22:15 -0800 (PST) (envelope-from phk@critter.freebsd.dk) Received: from critter.freebsd.dk (localhost [127.0.0.1]) by critter.freebsd.dk (8.9.1/8.8.5) with ESMTP id WAA24580; Mon, 16 Nov 1998 22:19:09 +0100 (CET) To: Adam Shostack cc: Robert Watson , Thomas Valentino Crimi , Terry Lambert , freebsd-security@FreeBSD.ORG Subject: Re: Would this make FreeBSD more secure? In-reply-to: Your message of "Mon, 16 Nov 1998 14:45:56 EST." <19981116144556.A11685@weathership.homeport.org> Date: Mon, 16 Nov 1998 22:19:09 +0100 Message-ID: <24578.911251149@critter.freebsd.dk> From: Poul-Henning Kamp Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org In message <19981116144556.A11685@weathership.homeport.org>, Adam Shostack writ es: >My understanding of Dobbertin's attack is that he generates both >halves of a collision pair, not finds an arbitrary match to a >pre-existing value. If he has the latter, that may or may not >transform into an attack on the password system. You'll need to find >a printable (<9 character?) value that collides if you want to attack >the password system via this route. Last I heard about it, Dobbertin didn't attack MD5, but an MD5-like algorithm. Second, you'd need to find a thousand consecutive collisions to hack a password. Check the code. -- Poul-Henning Kamp FreeBSD coreteam member phk@FreeBSD.ORG "Real hackers run -current on their laptop." "ttyv0" -- What UNIX calls a $20K state-of-the-art, 3D, hi-res color terminal To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message