On Wed, 3 Mar 2004 02:54:35 +0100 (CET) [EMAIL PROTECTED] (Jesper Juhl) wrote:
> On Tue, 2 Mar 2004, Charlie Watts wrote: > > > Clearly the virus DB maintainers are inundated with > > password-protected.zip files with viruses inside. > > > > I think I understand the technical impossibility of making a > > signature fo > r > > these - the .zip header is the same, and then the filenames inside > > are randomized, as is the password, and thus the encrypted body has > > nothing recognizable - so there isn't anything available to make a > > signature off of. > > > > What I'm thinking is; Would it be feasible to add an option to attempt > to brute-force-crack the passwords on zip files when scanning them? > Yes, it would slow down scanning immensely, and there's *no* way it > should ever be a default option, but zip file passwords are > /resonably/ simple to crack, so it is doable (although it takes > time)... > > I could whip some code together for this if it has any interrest at > all... There 2 ways to see this fact: 1. The AV is able to clean/scan EACH file coretly, well! But on the other hand what's with ACE, RAR and many others? 2. On the other hand there's my point of view and (sure.. :) ) it's the right point of view: NO! I don't angree! I will stop all work for clamAV and other things! I wont ask old contacts anymore if this feauture will be included. Why? a) Huge Mailsers CAN'T crack each file... there's not enough CPU-Power b) That's the way the damn GOV-GUYS work, it's not my way... and so I say hard NO couse if you break a encryption enabled by a user you could spy his personal data and so on. And you're wrong! ZIP-PWs aren't easy to crack. The old PW, well.. But GZ use blowfish and i read somewhere that WinZIP will use AES soon. Rembrandt
pgp00000.pgp
Description: PGP signature