On Wed, Apr 26, 2000 at 07:05:18PM -0000, [EMAIL PROTECTED] wrote: > > Hi! > > 26 Apr 00 12:45, Alexander Hvostov wrote to UUCP: > > AH> Yeah, yeah, you just try and break an MD5 checksum anytime this > AH> year. *cough* > It'll take some time, but it's possible. A simple brute-force attack will do > the job. And "some time" depends VERY much on the hardware the cracker owns. > It > may be enough to be secure against your friends, but not against a "real" > cracker.
so why don't we use sha1 or rmd160 or all three like OpenBSD ;-) $ uname -rs OpenBSD 2.6 $ cd /usr/ports/editors/emacs/ $ cat files/md5 MD5 (emacs-20.3.tar.gz) = 5aee43bb7c7267cc24b78011d280ecdc RMD160 (emacs-20.3.tar.gz) = 129318e8482e172269923eefcb2f92493dc06e19 SHA1 (emacs-20.3.tar.gz) = aee2b32515d12ba1557cc9e564f68df1e9a6e8f9 $ md5 ../../distfiles/emacs-20.3.tar.gz MD5 (../../distfiles/emacs-20.3.tar.gz) = 5aee43bb7c7267cc24b78011d280ecdc $ rmd160 ../../distfiles/emacs-20.3.tar.gz RMD160 (../../distfiles/emacs-20.3.tar.gz) = 129318e8482e172269923eefcb2f92493dc06e19 $ sha1 ../../distfiles/emacs-20.3.tar.gz SHA1 (../../distfiles/emacs-20.3.tar.gz) = aee2b32515d12ba1557cc9e564f68df1e9a6e8f9 $ which md5 /bin/md5 $ which rmd160 /bin/rmd160 $ which sha1 /bin/sha1 $ lets see you break those ;-) -- Ethan Benson http://www.alaska.net/~erbenson/
pgpITutWqgNRO.pgp
Description: PGP signature