This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/db-wg@ripe.net/
[db-wg] crypted password
- Previous message (by thread): [db-wg] crypted password
- Next message (by thread): [db-wg] crypted password
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Marco d'Itri
md at Linux.IT
Tue Jul 25 12:40:27 CEST 2006
On Jul 25, Max Tulyev <president at ukraine.su> wrote: > My view: When arguing about security vulnerabilities it is a good idea to provide a threat model explaining exactly how much the current system is insecure. I have not seen one, and I object to implementing all this without a clear analisys of why wisely chosen MD5-hashed passwords are not secure enough when the hashes are publically disclosed. Especially considering that people who want an higher level of security can already use PGP or X.509 authentication and are not be vulnerable. -- ciao, Marco -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 189 bytes Desc: Digital signature URL: </ripe/mail/archives/db-wg/attachments/20060725/39fe0fd6/attachment.sig>
- Previous message (by thread): [db-wg] crypted password
- Next message (by thread): [db-wg] crypted password
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
[ db-wg Archives ]