On Wed, Aug 25, 2004 at 06:02:22AM +0200, Almut Behrens wrote:
Somewhat more seriously: are there generally any defining criteria for
something one would call a 'hash function', saying that it always must
map some larger input space to some smaller output space?
Yes. A hash function is any
* Quoting Matthew Palmer ([EMAIL PROTECTED]):
On Tue, Aug 24, 2004 at 09:11:34PM -0400, Michael Stone wrote:
On Wed, Aug 25, 2004 at 12:39:57AM +0200, Rolf Kutz wrote:
This depends on how the attack really works. If
you just need to flip a few bits in a document it
might just look like
On Wed, Aug 25, 2004 at 11:24:00AM +1000, Matthew Palmer wrote:
I imagine that the garbage would be to bring the md5sum back to the original
to hide the trojan, rather than hey, look, I can stick garbage on the end
of the .deb and still keep the same md5sum! whee!.
Well, that's the part nobody's
On Tue, 24 Aug 2004 at 06:18:50PM -0400, Matthew Palmer wrote:
If I understand your postulate correctly:
If I, the user, encrypt a message with algorithm X and the cipher text
is intercepted by the attacker. The attacker can make his chances of
brute forcing the text BETTER by
BRIT Consulting E Logistica LTDA
Marketing Division
Avenida Conselheiro Nebias
n 340, group 64 vila Mathias
Santos, Sao Paulo, Brazil
scientific society in England to see and regret the weakness of government is bound to respect and protect The compact then and now thirty feet below it On
Hi people,
I've been trying to set up a volume group on a partition on an IDE hard drive
(a
Western Digital 80 GB) at /dev/hda. I am doing this by issuing the command
pvcreate /dev/hda4. However, instead of creating the physical
volume, an error
is returned: Failed to create regex device filter.
Sam Peppe [EMAIL PROTECTED] - Wed, Aug 25, 2004:
I've been trying to set up a volume group on a partition on an IDE hard drive
(a
Western Digital 80 GB) at /dev/hda. I am doing this by issuing the command
pvcreate /dev/hda4. However, instead of creating the physical
volume, an error
is
hi!
First of all - I also think that this is nothing security related!!!
maybe ltrace it? Because I don't think the error message comes from
pvcreate:
strings `which pvcreate` | grep regex
(yields nothing)
[EMAIL PROTECTED] roger # strings `which pvcreate` | grep regex
Again, my apologies to all for posting my query up on the wrong news list.
Just to tie off the thread, it was pointed out to me from reading the source of
the LVM2 tools, that pvcreate may have been failing due to a misconfiguration in
/etc/lvm/lvm.conf - it's failing to set up a filter for the
On Wed, Aug 25, 2004 at 10:01:25AM +0100, Dale Amon wrote:
Hashing (think of cornbeef hash with things all chopped up into bits)
is a technique to generate fast lookup keys. The discussion here is
about cryptographic hash functions.
...and I think somewhere in between lie hashing functions
On Wed, Aug 25, 2004 at 01:15:13AM -0400, Hubert Chan wrote:
Ah, but then using that definition of oneway, every hash is oneway,
since there must always be some hash value corresponding to two
different input strings (assuming the input space is larger than the
output space, which is
On Thu, 26 Aug 2004, Almut Behrens wrote:
On Wed, Aug 25, 2004 at 01:15:13AM -0400, Hubert Chan wrote:
... So the only useful notion of oneway is that the hash is not easily
invertible (i.e. you can't easily find some string that produces a
given hash value).
So, if you can somehow come up with
Hi all!
Has anyone made any progress in solving the su/sudo/super TIOCSTI ioctl
vulnerability?
--
Jan
pgpAFoEO7DWgl.pgp
Description: PGP signature
On Wed, Aug 25, 2004 at 09:24:01AM -0400, Phillip Hofmeister wrote:
On Tue, 24 Aug 2004 at 06:18:50PM -0400, Matthew Palmer wrote:
In the case of hashing algorithms, there's one 'key' involved -- the
plaintext -- and for password security, you don't need to retrieve the key
necessarily,
On Wed, Aug 25, 2004 at 10:01:25AM +0100, Dale Amon wrote:
On Wed, Aug 25, 2004 at 06:02:22AM +0200, Almut Behrens wrote:
Somewhat more seriously: are there generally any defining criteria for
something one would call a 'hash function', saying that it always must
map some larger input space
On Thu, Aug 26, 2004 at 01:04:21AM +0200, Almut Behrens wrote:
...and I think somewhere in between lie hashing functions like crc32,
as used for detecting transmission errors, for example. Those are
not cryptographic, but possess a sufficiently large output space, so we
can expect few random
16 matches
Mail list logo