[45159] in Cypherpunks

home help back first fref pref prev next nref lref last post

Timing attacks

daemon@ATHENA.MIT.EDU (SINCLAIR DOUGLAS N)
Mon Dec 11 12:35:56 1995

From: SINCLAIR  DOUGLAS N <sinclai@ecf.toronto.edu>
To: cypherpunks@toad.com
Date: 	Mon, 11 Dec 1995 11:10:42 -0500

I have had some success using timing against UNIX to find out what usernames
are valid on systems with finger &c disabled.  If a username does not exist,
it returns the "Login incorrect" a lot faster than it would if the username
existed but the password was incorrect.  I wonder how many other systems are
vulnerable to this sort of attack.

home help back first fref pref prev next nref lref last post