1997-07-15 - Re: Fuck the Usenet Cabal

Header Data

From: Paul Bradley <paul@fatmans.demon.co.uk>
To: “Dr.Dimitri Vulis KOTM” <dlv@bwalk.dm.com>
Message Hash: 5c7d99babee9b2981a6a919ba40722e2dfb815ec4f2c907a3040296d85ea4ba3
Message ID: <Pine.LNX.3.91.970713111822.728B-100000@fatmans.demon.co.uk>
Reply To: <836q0D18w165w@bwalk.dm.com>
UTC Datetime: 1997-07-15 08:02:55 UTC
Raw Date: Tue, 15 Jul 1997 01:02:55 -0700 (PDT)

Raw message

From: Paul Bradley <paul@fatmans.demon.co.uk>
Date: Tue, 15 Jul 1997 01:02:55 -0700 (PDT)
To: "Dr.Dimitri Vulis KOTM" <dlv@bwalk.dm.com>
Subject: Re: Fuck the Usenet Cabal
In-Reply-To: <836q0D18w165w@bwalk.dm.com>
Message-ID: <Pine.LNX.3.91.970713111822.728B-100000@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



> ObCrypto: I was offered a 76GB changer for $350.  I thought of the following
> demo application: a user e-mails a piece of a Unix passwd file (password+salt)
> to a server, which looks up a password that works.  Problem is, 76GB doesn't
> seem sufficient for the lookup table. :-( (Assume infinite time available
> on a fast box.)

I have to confess ignorance over the form of the password in the unix 
passwd file, how much salt is used, does it vary from ?nix to ?nix or is it 
pretty standard? Maybe a small(ish) lookup table/ dictionary attack could 
be mounted using this.

        Datacomms Technologies data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"







Thread