From owner-freebsd-chat Sat Mar 1 23:32:05 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id XAA27168 for chat-outgoing; Sat, 1 Mar 1997 23:32:05 -0800 (PST) Received: from grackle.grondar.za (n9QhI5458dIL8h8shGz3JyvIXTTXXF4H@grackle.grondar.za [196.7.18.131]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id XAA27130 for ; Sat, 1 Mar 1997 23:32:00 -0800 (PST) Received: from grackle.grondar.za (w7TVoo8Z2lbwJK8X3GD+S726N7alnIjQ@localhost [127.0.0.1]) by grackle.grondar.za (8.8.5/8.8.4) with ESMTP id JAA25731; Sun, 2 Mar 1997 09:31:49 +0200 (SAT) Message-Id: <199703020731.JAA25731@grackle.grondar.za> X-Mailer: exmh version 2.0gamma 1/27/96 To: Brian Tao cc: chat@freebsd.org Subject: Re: Crazy RSA-cracking idea... Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Sun, 02 Mar 1997 09:31:40 +0200 From: Mark Murray Sender: owner-chat@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Brian Tao wrote: > How about we turn the RC5 cracking code into an lkm and include it > with the next distribution of FreeBSD? I figure the 56-bit key will > take over a year to crack given the current growth curve and figuring > in a bit of luck. Why not make it easy for every FreeBSD box out > there to join in? ;-) That would be.... wild. :) Why does it have to be an LKM? Just load it with the daemons... M -- Mark Murray PGP key fingerprint = 80 36 6E 40 83 D6 8A 36 This .sig is umop ap!sdn. BC 06 EA 0E 7A F2 CE CE