home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 129 
 mark lewis to Ozz Nixon 
 Implementing MPWD 
 22 Jun 18 03:07:20 
 
 On 2018 Jun 21 13:10:52, you wrote to me:

 ml>> there was something interesting discovered several months ago,
 ml>> though... in the CRAM-MD5 implementations, apparently only 32byte
 ml>> checksum strings are allowed (or used?) even though the spec allows
 ml>> for up to 64bytes (IIRC)... i scanned three years of binkd logs and
 ml>> all CRAM-MD5-xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx strings are of the same

 ON> Not one to argue with a European on the hash algorithms, but, I just
 ON> implemented CRAM-MD5 and CRAM-SHA1. Understanding what I coded, the
 ON> only flaw I saw was when the "secret" is > 64 characters, then it
 ON> switches to a 16bit algorithm, and with CRAM you double process the
 ON> "secret", so I guess they mean if someone uses a 65 character or
 ON> longer password for handshaking using BinkP they have reduced the
 ON> accuracy down to 32bit - but, I do not know of any sysop who is
 ON> willing to type in a 65+ character handshake.

talk with rob swindell (aka digital man)... he found it, IIRC... it wasn't the
length of the password, AFAIK... it was that string of x's i have up there...
whatever that part is called :shrug:

)\/(ark

Always Mount a Scratch Monkey
Do you manage your own servers? If you are not running an IDS/IPS yer doin' it
wrong...
... Out of my mind. Back in five minutes.
---
 * Origin:  (1:3634/12.73)

<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca