On Thu, Aug 26, 2004 at 01:04:21AM +0200, Almut Behrens wrote:
> ...and I think somewhere in between lie hashing functions like crc32,
> as used for detecting transmission errors, for example. Those are
> not cryptographic, but possess a sufficiently large output space, so we
> can expect few rand
On Wed, Aug 25, 2004 at 10:01:25AM +0100, Dale Amon wrote:
> On Wed, Aug 25, 2004 at 06:02:22AM +0200, Almut Behrens wrote:
> > Somewhat more seriously: are there generally any defining criteria for
> > something one would call a 'hash function', saying that it always must
> > map some larger input
On Wed, Aug 25, 2004 at 09:24:01AM -0400, Phillip Hofmeister wrote:
> On Tue, 24 Aug 2004 at 06:18:50PM -0400, Matthew Palmer wrote:
> > In the case of hashing algorithms, there's one 'key' involved -- the
> > plaintext -- and for password security, you don't need to retrieve the key
> > necessaril
Hi all!
Has anyone made any progress in solving the su/sudo/super TIOCSTI ioctl
vulnerability?
--
Jan
pgpAFoEO7DWgl.pgp
Description: PGP signature
On Thu, 26 Aug 2004, Almut Behrens wrote:
On Wed, Aug 25, 2004 at 01:15:13AM -0400, Hubert Chan wrote:
... So the only useful notion of oneway is that the hash is not easily
invertible (i.e. you can't easily find some string that produces a
given hash value).
So, if you can somehow come up with a
On Wed, Aug 25, 2004 at 01:15:13AM -0400, Hubert Chan wrote:
>
> Ah, but then using that definition of "oneway", every hash is oneway,
> since there must always be some hash value corresponding to two
> different input strings (assuming the input space is larger than the
> output space, which is g
On Wed, Aug 25, 2004 at 10:01:25AM +0100, Dale Amon wrote:
>
> Hashing (think of cornbeef hash with things all chopped up into bits)
> is a technique to generate fast lookup keys. The discussion here is
> about cryptographic hash functions.
...and I think somewhere in between lie hashing function
Again, my apologies to all for posting my query up on the wrong news list.
Just to tie off the thread, it was pointed out to me from reading the source of
the LVM2 tools, that pvcreate may have been failing due to a misconfiguration in
/etc/lvm/lvm.conf - it's failing to set up a filter for the de
hi!
First of all - I also think that this is nothing security related!!!
> maybe ltrace it? Because I don't think the error message comes from
> pvcreate:
> strings `which pvcreate` | grep regex
> (yields nothing)
[EMAIL PROTECTED] roger # strings `which pvcreate` | grep regex
regex_f
Sam Peppe <[EMAIL PROTECTED]> - Wed, Aug 25, 2004:
>
> I've been trying to set up a volume group on a partition on an IDE hard drive
> (a
> Western Digital 80 GB) at /dev/hda. I am doing this by issuing the command
> "pvcreate /dev/hda4". However, instead of creating the physical
> volume, an err
Hi people,
I've been trying to set up a volume group on a partition on an IDE hard drive
(a
Western Digital 80 GB) at /dev/hda. I am doing this by issuing the command
"pvcreate /dev/hda4". However, instead of creating the physical
volume, an error
is returned: "Failed to create regex device filte
BRIT Consulting E Logistica LTDA
Marketing Division
Avenida Conselheiro Nebias
n 340, group 64 vila Mathias
Santos, Sao Paulo, Brazil
scientific society in England to see and regret the weakness of government is bound to respect and protect The compact then and now thirty feet below it On t
On Tue, 24 Aug 2004 at 06:18:50PM -0400, Matthew Palmer wrote:
> > If I understand your postulate correctly:
> >
> > If I, the user, encrypt a message with algorithm X and the cipher text
> > is intercepted by the attacker. The attacker can make his chances of
> > brute forcing the text BETTER by
On Wed, Aug 25, 2004 at 11:24:00AM +1000, Matthew Palmer wrote:
I imagine that the garbage would be to bring the md5sum back to the original
to hide the trojan, rather than "hey, look, I can stick garbage on the end
of the .deb and still keep the same md5sum! whee!".
Well, that's the part nobody's
* Quoting Matthew Palmer ([EMAIL PROTECTED]):
> On Tue, Aug 24, 2004 at 09:11:34PM -0400, Michael Stone wrote:
> > On Wed, Aug 25, 2004 at 12:39:57AM +0200, Rolf Kutz wrote:
> > >This depends on how the attack really works. If
> > >you just need to flip a few bits in a document it
> > >might just
On Wed, Aug 25, 2004 at 06:02:22AM +0200, Almut Behrens wrote:
> Somewhat more seriously: are there generally any defining criteria for
> something one would call a 'hash function', saying that it always must
> map some larger input space to some smaller output space?
Yes. A hash function is any m
16 matches
Mail list logo