Date: Sat, 19 Jan 2002 16:22:30 +0000 From: Mark Murray <mark@grondar.za> To: "Andrey A. Chernov" <ache@nagual.pp.ru> Cc: Kris Kennaway <kris@obsecurity.org>, cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: Re: cvs commit: src/lib/libpam/modules/pam_opie pam_opie.c Message-ID: <200201191622.g0JGMUt22213@grimreaper.grondar.org> In-Reply-To: <20020119143617.GB9803@nagual.pp.ru> ; from "Andrey A. Chernov" <ache@nagual.pp.ru> "Sat, 19 Jan 2002 17:36:17 %2B0300." References: <20020119143617.GB9803@nagual.pp.ru>
next in thread | previous in thread | raw e-mail | index | archive | help
> > Nothing to it; you'd store a few bytes in /var/run or somewhere, and > > hash them with the provided username to generate the fake challenge. > > And your hash provide random numbers instead of constantly decreased as=20 > they expected be (by intruder too). Nope. The hash is based on things that don't change very often, so it will be constant for most attacks. As the intruder is not sucessfully breaking in, there MUST BE NO decrement. M -- o Mark Murray \_ FreeBSD Services Limited O.\_ Warning: this .sig is umop ap!sdn To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200201191622.g0JGMUt22213>