Security Basics mailing list archives

Re: CISCO MD5 encryption


From: krymson () gmail com
Date: Fri, 25 Feb 2011 08:11:07 -0700

There are two different things here.

1- How strong is salted MD5 against rainbow attacks (pre-computation)?

2- How strong is salted MD5 when the salt and hash are known (for someone with crypto-fu)?

The first one is very strong still. The second one, not so much.

The contributor who mentioned config confidentiality policies has the right of it. Password lenths should also be long 
to make post-computation of such tables more difficult. Yes, you'll need to do that whether you want to "decrypt" the 
password or just find a collision. Likewise, change your passwords regularly.

Still, none of this follows that Cisco + MD5 === insecure kneejerk. It requires more thought than that.


<- snip ->
Do we KNOW what Cisco's password-checking code looks like?

Since you can copy the running configuration text file to a virgin device
and it all works, I'd say that there's an excellent chance that any password
entered will be accepted if the hash matches -- that is, an engineered
collision is as good as recovery of the actual password.

David Gillett

------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


Current thread: