[40067] in North American Network Operators' Group
Re: telnet vs ssh on Core equipment , looking for reasons why ?
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Tue Jul 31 19:22:17 2001
Message-Id: <200107312321.f6VNKrw29639@foo-bar-baz.cc.vt.edu>
To: Roeland Meyer <rmeyer@mhsc.com>
Cc: nanog@merit.edu
In-Reply-To: Your message of "Tue, 31 Jul 2001 16:16:24 PDT."
<EA9368A5B1010140ADBF534E4D32C728025AA6@condor.mhsc.com>
From: Valdis.Kletnieks@vt.edu
Mime-Version: 1.0
Content-Type: multipart/signed; boundary="==_Exmh_694515704P";
micalg=pgp-sha1; protocol="application/pgp-signature"
Content-Transfer-Encoding: 7bit
Date: Tue, 31 Jul 2001 19:20:53 -0400
Errors-To: owner-nanog-outgoing@merit.edu
--==_Exmh_694515704P
Content-Type: text/plain; charset=us-ascii
On Tue, 31 Jul 2001 16:16:24 PDT, Roeland Meyer said:
> ... and then they load it on www.distributed.net
Assuming that *all 4 billion* possible IPv4 addresses download and run
it, this cuts it *at most* down to 22,982 years. And that's assuming that
the EFF attack is *ONE* host, and that *all 4 billion* have equivalent
hardware. I don't see 4 billion copies of the EFF box on the net, do you?
--
Valdis Kletnieks
Operating Systems Analyst
Virginia Tech
--==_Exmh_694515704P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8
Comment: Exmh version 2.5 07/09/2001
iQA/AwUBO2c9VHAt5Vm009ewEQJPDgCZAeEh1zeGldBGNZUAt+G8pFen5DUAoIOM
IgvXNG3WdVfdKipvpr+Disat
=cPQM
-----END PGP SIGNATURE-----
--==_Exmh_694515704P--