Re: blf uses only 2^4 round for passwd encoding?! [Re: Default password hash]

2012-06-11 Thread Mike Andrews
On 6/10/12 8:03 PM, Oliver Pinter wrote: On 6/11/12, RW wrote: On Mon, 11 Jun 2012 00:37:30 +0200 Oliver Pinter wrote: 16 rounds in 2012? It is not to weak?! It's hard to say. Remember that blowfish was designed as a cipher not a hash. It's designed to be fast, but to still resist known plai

Re: PHK's MD5 might not be slow enough anymore

2010-01-28 Thread Mike Andrews
On Thu, 28 Jan 2010, Mike Andrews wrote: On 1/28/10 3:18 PM, Chris Palmer wrote: For backwards compatibility, which do people prefer: Creating a new $N$ prefix every time we re-tune the algorithm, or using a new notation to say how many times this password was hashed? For example: $1.1000

Re: PHK's MD5 might not be slow enough anymore

2010-01-28 Thread Mike Andrews
On 1/28/10 3:18 PM, Chris Palmer wrote: For backwards compatibility, which do people prefer: Creating a new $N$ prefix every time we re-tune the algorithm, or using a new notation to say how many times this password was hashed? For example: $1.1000$, $1.10$, et c.? I prefer the latter. It ca

Re: Port scan from Apache?

2006-07-18 Thread Mike Andrews
r nameserver is attacking them. Same story -- a slow DNS lookup that takes longer than their firewall is willing to wait on a UDP response, and they assume that every single thing a firewall logs is from an OMG WTF DDOS script kiddie... :) -- Mike Andrews * [EMAIL PROTECTED] * http://www.b