[aklug] Re: Security issue

From: Shane Spencer <shane@bogomip.com>
Date: Mon Jan 17 2011 - 21:30:03 AKST

As long as I'm chatting away.... check out http://www.cebatech.com/
for compression accel. :) Those are way fun to use when frontending a
web cluster that has easily compressible but high throughput dynamic
content delivery.. aka.. words on a web page.

On Mon, Jan 17, 2011 at 9:27 PM, Shane Spencer <shane@bogomip.com> wrote:
> On topic.. My SHA1 aware Via C3 can pump out an estimated (due to
> context switching) half gigabit per second of rolling SHA1 sums thanks
> to the padlock engine in it using OpenSSL directly.
>
> Via Via website (haha) - Implementing the SHA-1 and SHA-256 variants
> of secure hash, the VIA Padlock SHA engine can deliver real-time data
> encryption peaking at 5 gigabits per second.
>
> I think the person that wrote that needs to be hurt.. but it means
> that a sha-1 sum for a reasonable encryption block size can be fetched
> at tremendous speeds using a cheap processor most DIY firewalls use.
>
> Poke a peek at the Soekris made boards that cuddle up to a really neat
> and easily usable crypto accelerator. =A0http://soekris.com/vpn1401.htm
>
> I've tested those boards as an SSL frontend for several applications
> and they work like a champ.
>
> - Shane
>
> On Mon, Jan 17, 2011 at 9:21 PM, Shane Spencer <shane@bogomip.com> wrote:
>> Off topic... sorry.. but ec2 is fertile ground for cheap bots.
>> Probably cheaper than a botnet pimp.
>>
>> On Mon, Jan 17, 2011 at 9:20 PM, Shane Spencer <shane@bogomip.com> wrote=
:
>>> You don't even want to know how often I have to fend off EC2 bots for
>>> SIP/HTTP/SSH.
>>>
>>> On Sat, Jan 15, 2011 at 3:14 PM, Jim Gribbin <jimgribbin@gmail.com> wro=
te:
>>>> I just ran across something on Slashdot that appears to me to be reaso=
n
>>>> to be concerned.
>>>>
>>>> http://it.slashdot.org/story/11/01/13/2024237/Amazon-EC2-Enables-Cheap=
-Brute-Force-Attacks
>>>>
>>>> That Amazon EC2 server thingie they have going on appears to have GPU
>>>> cluster arrays available, cheap. Seems some German white hat hack has
>>>> figured out a way to use one to brute force WPA-PSK wireless security =
in
>>>> 6 minutes at about $1.68, so he claims anyway.
>>>>
>>>> It seems to me if one of these GPU cluster thingies can be used to cra=
ck
>>>> this, it can be used to crack other things as well. A PGP encrypted ha=
rd
>>>> disk for instance.
>>>>
>>>> Maybe someone here can explain why I have no reason for concern.
>>>>
>>>> Jim G
>>>>
>>>>
>>>> ---------
>>>> To unsubscribe, send email to <aklug-request@aklug.org>
>>>> with 'unsubscribe' in the message body.
>>>>
>>>>
>>>
>>
>
---------
To unsubscribe, send email to <aklug-request@aklug.org>
with 'unsubscribe' in the message body.
Received on Mon Jan 17 21:30:10 2011

This archive was generated by hypermail 2.1.8 : Mon Jan 17 2011 - 21:30:10 AKST