It's not *new* address of Alvaro :)

Greetings,
Jędrzej Nowak



On Wed, Sep 21, 2011 at 10:52 AM, Sharl.Jimh.Tsin <[email protected]> wrote:
> 在 2011-09-20二的 11:09 +0200,Alvaro Lopez Ortega写道:
>> Folks,
>>
>>
>> You ought to be aware of this if you site relays on TLS 1.0:
>>
>>
>> "... The vulnerability resides in versions 1.0 and earlier of TLS, or
>> transport layer security, the successor to the secure sockets layer
>> technology that serves as the internet's foundation of trust. Although
>> versions 1.1 and 1.2 of TLS aren't susceptible, they remain almost
>> entirely unsupported in browsers and websites alike."
>>
>>
>> "... requires about two seconds to decrypt each byte of an encrypted
>> cookie. That means authentication cookies of 1,000 to 2,000 characters
>> long will still take a minimum of a half hour for their PayPal attack
>> to work. Nonetheless, the technique poses a threat to millions of
>> websites that use earlier versions of TLS"
>>
>>
>> http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/
>>
>>
>>
>> --
>> Greetings, alo.
>> http://www.alobbs.com/
>> _______________________________________________
>> Cherokee mailing list
>> [email protected]
>> http://lists.octality.com/listinfo/cherokee
>
> wow,your new email address is so COOL~ how did you get it? are you a
> member of GNU project? Alvaro Lopez Ortega.(sorry for OT)
>
> --
> Best regards,
> Sharl.Jimh.Tsin (From China **Obviously Taiwan INCLUDED**)
>
> Using Gmail? Please read this important notice:
> http://www.fsf.org/campaigns/jstrap/gmail?10073.
>
> _______________________________________________
> Cherokee mailing list
> [email protected]
> http://lists.octality.com/listinfo/cherokee
>
>
_______________________________________________
Cherokee mailing list
[email protected]
http://lists.octality.com/listinfo/cherokee

Reply via email to