[110366] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Security team successfully cracks SSL using 200 PS3's and MD5

daemon@ATHENA.MIT.EDU (Christopher Morrow)
Sun Jan 4 11:40:13 2009

Date: Sun, 4 Jan 2009 11:40:00 -0500
From: "Christopher Morrow" <morrowc.lists@gmail.com>
To: "Marshall Eubanks" <tme@multicasttech.com>
In-Reply-To: <B3CFF2FA-B26F-40C5-A10F-5634440DEE8B@multicasttech.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

On Sun, Jan 4, 2009 at 9:37 AM, Marshall Eubanks <tme@multicasttech.com> wrote:
> There is a discussion of this going on in CFRG.
>
> https://www.irtf.org/mailman/listinfo/cfrg
>

sadly, and apropos I suppose, www.irtf.org is serving up a *.ietf.org
ssl cert :( and the archives require membership to view them.

-chris


home help back first fref pref prev next nref lref last post