[193876] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: SHA1 collisions proven possisble

daemon@ATHENA.MIT.EDU (valdis.kletnieks@vt.edu)
Wed Mar 1 19:22:40 2017

X-Original-To: nanog@nanog.org
From: valdis.kletnieks@vt.edu
X-Google-Original-From: Valdis.Kletnieks@vt.edu
To: james.d@hexhost.net
In-Reply-To: <00e301d292d2$c1f6f360$45e4da20$@hexhost.net>
Date: Wed, 01 Mar 2017 19:22:27 -0500
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org

--==_Exmh_1488414147_2618P
Content-Type: text/plain; charset=us-ascii

On Wed, 01 Mar 2017 15:28:23 -0600, "james.d--- via NANOG" said:

> Those statistics are nowhere near real world for ROI. You'd have to invest
> at least 7 figures (USD) in resources. So the return must be millions of
> dollars before anyone can detect the attack. Except, it's already
> detectable.

*Somebody* has to invest 7 figures in resources.  Doesn't have to be you.

Remember that if you have access to a 1M node botnet, you could have 56,940,000
hours of CPU time racked racked up in... under 60 hours.


--==_Exmh_1488414147_2618P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Comment: Exmh version 2.5 07/13/2001

iQEVAwUBWLdlw40DS38y7CIcAQJgswgAnJuONsx2imEA3nnpb4d3FoEn9yvwUZy5
72BEB2fiZbgIg0OISFtfI36CBhmrYFeqwvd7Qq+ARZneXLToP9meEg24dHHOUE2n
XEzeoh1jsI75iRo9a9ZsNq4BoFVZWJqGGR0c6WYj9DCD84J6KeRSBeku4AIVivNO
DoLHrEIDWGAn39lfFZ3h9TTJzq7kNgu1+IR2LlPS5hB9Ji6iRAKZe9azEw3nACfj
2Y8USjqHGJy74Cri86a4igRoKwxKw+OGcNWXNjeo6E3wa1TOWIBFZR5Bql4OZc9x
z6h0bWtnDJ+elDNFGaFrt0UpfYqpnhqNLooCEc5jYC39cgq9IvUEiQ==
=89zg
-----END PGP SIGNATURE-----

--==_Exmh_1488414147_2618P--

home help back first fref pref prev next nref lref last post