On Wed, 3 Mar 2004 02:54:35 +0100 (CET)
[EMAIL PROTECTED] (Jesper Juhl) wrote:

> On Tue, 2 Mar 2004, Charlie Watts wrote:
> 
> > Clearly the virus DB maintainers are inundated with
> > password-protected.zip files with viruses inside.
> >
> > I think I understand the technical impossibility of making a
> > signature fo
> r
> > these - the .zip header is the same, and then the filenames inside
> > are randomized, as is the password, and thus the encrypted body has
> > nothing recognizable - so there isn't anything available to make a
> > signature off of.
> >
> 
> What I'm thinking is; Would it be feasible to add an option to attempt
> to brute-force-crack the passwords on zip files when scanning them?
> Yes, it would slow down scanning immensely, and there's *no* way it
> should ever be a default option, but zip file passwords are
> /resonably/ simple to crack, so it is doable (although it takes
> time)...
> 
> I could whip some code together for this if it has any interrest at
> all...

There 2 ways to see this fact:

1. The AV is able to clean/scan EACH file coretly, well! But on the
other hand what's with ACE, RAR and many others?

2. On the other hand there's my point of view and (sure.. :) ) it's the
right point of view:

NO!
I don't angree!
I will stop all work for clamAV and other things!
I wont ask old contacts anymore if this feauture will be included.

Why?
a) Huge Mailsers CAN'T crack each file... there's not enough CPU-Power
b) That's the way the damn GOV-GUYS work, it's not my way... and so I
say hard NO couse if you break a encryption enabled by a user you could
spy his personal data and so on.

And you're wrong!
ZIP-PWs aren't easy to crack. The old PW, well..
But GZ use blowfish and i read somewhere that WinZIP will use AES soon.


Rembrandt

Attachment: pgp00000.pgp
Description: PGP signature

Reply via email to