[6922] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

QNX crypt() broken

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Sat Apr 15 19:06:57 2000

From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
To: cryptography@c2.net, cypherpunks@cyberpass.net
Reply-To: pgut001@cs.auckland.ac.nz
X-Charge-To: pgut001
Date: Sun, 16 Apr 2000 09:13:54 (NZST)
Message-ID: <95583323401676@kahu.cs.auckland.ac.nz>

I haven't seen this mentioned here before, but it looks like the people 
playing with the iOpener (effectively a $99 PC once you bypass a few hurdles 
set up by the manufacturer) have managed to reverse the QNX version of 
crypt(), which is a homebrew (and insecure) algorithm rather than a real 
crypt().  Source code is at http://i-opener-linux.net/decrypt.  The iOpener 
discussion board, http://www.kenseglerdesigns.com/cgi-bin/UltraBoard/ \
UltraBoard.pl?Action=ShowPost&Board=technical&Post=481 has a number of 
messages in which people are posting (nontrivial) QNX root passwords (things 
like 'osiw$6.4' and 'e0FGglvv', ie not ones which are been brute-forced).
Pretty much every QNX system, not just the iOpener, would be vulnerable to 
this.

Ouch.

Peter.



home help back first fref pref prev next nref lref last post