[aklug] Re: Security issue

From: Marc Grober <marc@interak.com>
Date: Mon Jan 17 2011 - 22:30:38 AKST

And the philosophy that security can be proportional to the value of resourc=
es to be protected is arguably no longer viable as bots sequence through all=
 ip space=20

On Jan 17, 2011, at 9:27 PM, Shane Spencer <shane@bogomip.com> wrote:

> On topic.. My SHA1 aware Via C3 can pump out an estimated (due to
> context switching) half gigabit per second of rolling SHA1 sums thanks
> to the padlock engine in it using OpenSSL directly.
>=20
> Via Via website (haha) - Implementing the SHA-1 and SHA-256 variants
> of secure hash, the VIA Padlock SHA engine can deliver real-time data
> encryption peaking at 5 gigabits per second.
>=20
> I think the person that wrote that needs to be hurt.. but it means
> that a sha-1 sum for a reasonable encryption block size can be fetched
> at tremendous speeds using a cheap processor most DIY firewalls use.
>=20
> Poke a peek at the Soekris made boards that cuddle up to a really neat
> and easily usable crypto accelerator. http://soekris.com/vpn1401.htm
>=20
> I've tested those boards as an SSL frontend for several applications
> and they work like a champ.
>=20
> - Shane
>=20
> On Mon, Jan 17, 2011 at 9:21 PM, Shane Spencer <shane@bogomip.com> wrote:
>> Off topic... sorry.. but ec2 is fertile ground for cheap bots.
>> Probably cheaper than a botnet pimp.
>>=20
>> On Mon, Jan 17, 2011 at 9:20 PM, Shane Spencer <shane@bogomip.com> wrote:=

>>> You don't even want to know how often I have to fend off EC2 bots for
>>> SIP/HTTP/SSH.
>>>=20
>>> On Sat, Jan 15, 2011 at 3:14 PM, Jim Gribbin <jimgribbin@gmail.com> wrot=
e:
>>>> I just ran across something on Slashdot that appears to me to be reason=

>>>> to be concerned.
>>>>=20
>>>> http://it.slashdot.org/story/11/01/13/2024237/Amazon-EC2-Enables-Cheap-=
Brute-Force-Attacks
>>>>=20
>>>> That Amazon EC2 server thingie they have going on appears to have GPU
>>>> cluster arrays available, cheap. Seems some German white hat hack has
>>>> figured out a way to use one to brute force WPA-PSK wireless security i=
n
>>>> 6 minutes at about $1.68, so he claims anyway.
>>>>=20
>>>> It seems to me if one of these GPU cluster thingies can be used to crac=
k
>>>> this, it can be used to crack other things as well. A PGP encrypted har=
d
>>>> disk for instance.
>>>>=20
>>>> Maybe someone here can explain why I have no reason for concern.
>>>>=20
>>>> Jim G
>>>>=20
>>>>=20
>>>> ---------
>>>> To unsubscribe, send email to <aklug-request@aklug.org>
>>>> with 'unsubscribe' in the message body.
>>>>=20
>>>>=20
>>>=20
>>=20
> ---------
> To unsubscribe, send email to <aklug-request@aklug.org>
> with 'unsubscribe' in the message body.
>=20
---------
To unsubscribe, send email to <aklug-request@aklug.org>
with 'unsubscribe' in the message body.
Received on Mon Jan 17 22:31:02 2011

This archive was generated by hypermail 2.1.8 : Mon Jan 17 2011 - 22:31:02 AKST