Subject: Re: [harikiri@ATTRITION.ORG: S/Key & OPIE Database Vulnerability]
To: None <tech-security@netbsd.org>
From: der Mouse <mouse@Rodents.Montreal.QC.CA>
List: tech-security
Date: 01/30/2000 23:06:00
by redmail.netbsd.org with SMTP; 31 Jan 2000 04:06:06 -0000
by Twig.Rodents.Montreal.QC.CA (8.8.8/8.8.8) id XAA07653;
Sun, 30 Jan 2000 23:06:00 -0500 (EST)
Date: Sun, 30 Jan 2000 23:06:00 -0500 (EST)
From: der Mouse <mouse@Rodents.Montreal.QC.CA>
Message-Id: <200001310406.XAA07653@Twig.Rodents.Montreal.QC.CA>
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
To: tech-security@netbsd.org
Subject: Re: [harikiri@ATTRITION.ORG: S/Key & OPIE Database Vulnerability]
> The documentation only says [from skey(1)]:
> S/Key uses 64 bits of information, transformed by the MD4 algorithm into
> 6 English words.
That documentation, then, is so loosely written I would hesitate to
trust it for *anything*, on the "what other mistakes am I *not*
competent to notice" principle. (MD4's output is not English words!)
der Mouse
mouse@rodents.montreal.qc.ca
7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B