On Tue, 11 Oct 2005 01:21:55 +0200, Michael Ströder wrote:

> Dan Stromberg wrote:
>> [quoted text muted]
> 
> http://www.faqs.org/rfcs/rfc2945.html
> 
> Ciao, Michael.

OK, thanks for the reference.

I guess I neglected to stress that we're talking about using random
strings of characters, not dictionary words or other weak forms of
user-chosen passwords.

Is there something easily attacked about the original algorithm, if you
use a long, quite random password in combination with a hash algorithm
that hasn't been broken?

If you look over my fallback-reboot package at:
http://dcs.nac.uci.edu/~strombrg/fallback-reboot/ you'll see that there's
a small python script that generates a 32 character hex string for the
passwords.

I suppose I probably should rewrite it to not use whrandom though.

Thanks!


-- 
http://mail.python.org/mailman/listinfo/python-list

Reply via email to