Now that the firestorm over implementing Md5 has quieted down a bit, is
anybody aware of whether the exploit has been used?
Feel free to reply off list.
Thanks,
Keith Wallace
Director, Telecommunications
PC Connection Services
Now that the firestorm over implementing Md5 has quieted down a bit, is
anybody aware of whether the exploit has been used?
Feel free to reply off list.
Thanks,
Keith Wallace
Director, Telecommunications
PC Connection Services
I would also be interested in what %-age of peers are MD5-ized? And if anyone has had any operational issues with the MD5 process - issues contacting peers, software incompatibility, varying key synchronization processes, additional CPU, re-writing internal tools, monitoring MD5-ness, etc.?
Happy to collect the data off-list and reply with the summarized / anonymized stats.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Now that the firestorm over implementing Md5 has quieted down a bit, is
anybody aware of whether the exploit has been used?
Feel free to reply off list.
Even more interesting, did anyone manage to reproduce it?
- - kurtis -