Log in

No account? Create an account


More Kaminsky

« previous entry | next entry »
24th Jul 2008 | 11:09

So there's another form of attack which is closer to the Matasano description but still different in significant ways.

$ md5 <~/doc/kaminsky2

| Leave a comment |

Comments {2}


from: zkzkz
date: 24th Jul 2008 12:21 (UTC)

I always find it interesting how code which has been around for a while and even been inspected quite thoroughly suddenly has lots of obvious bugs or holes once someone points out a single one. I wonder if it would be useful to just randomly claim there's a hole in some random piece of software just to help find the holes which actually exist.

Reply | Thread

Tony Finch

from: fanf
date: 24th Jul 2008 12:26 (UTC)

In this case I required several clues before I twigged, so I doubt hints that are far from the mark will help.

Reply | Parent | Thread