On Fri Mar  6 14:58:05 2009, Eric Rescorla wrote:
What do you mean rejects it? The attacker simulates a TCP-level failure. Alternately, he just stalls and waits for the client to give up if he can't
brute-force the password in time.

Right, well, I think I've made myself look stupid enough for one day, so I'll restrict myself to asking questions.

So, we have some potential problems with the use of anything that's subject to an offline dictionary attack.

Have you got any figures on timescales for this, and computing power required? I mean, is this something that anyone who hasn't upset the NSA or GCHQ should be concerned about, or are we within reasonable range of someone trying to phish credit card numbers?

Dave.
--
Dave Cridland - mailto:[email protected] - xmpp:[email protected]
 - acap://acap.dave.cridland.net/byowner/user/dwd/bookmarks/
 - http://dave.cridland.net/
Infotrope Polymer - ACAP, IMAP, ESMTP, and Lemonade

Reply via email to