in reply to Re: Re: Why applying MD5 hash twice?
in thread Why applying MD5 hash twice?

The problem with that reasoning is that someone else argues along the same lines. There are tons of people writing Windows applications, so we should discuss all Windows vulnerability here. However, the original post wasn't about warning us about a newly discovered vulnerability, it has been known for years. The original post was a question: what's that exploit?.

I fail to see how that's Perl related, or why this forum is an appropriate place to ask. The fact that there isn't an "MD5 monks" doesn't make this appropriate either. There are a billion things for which there's no "X monks", does that mean all questions about them should be asked here?

However, while there isn't an MD5 website in the same form as perlmonks, there is a whole lot of information about MD5 readily available on the web. For instance, at the website of the developers of the MD5 algorithm, RSA (www.rsasecurity.com). They have a FAQ, which discusses MD5 - and guess what? The FAQ discusses the vulnerabilities as well.

Abigail

Replies are listed 'Best First'.
Re: Re: Why applying MD5 hash twice?
by huguei (Scribe) on Sep 09, 2003 at 23:40 UTC
    Hi Abigail.
    The reason that i posted this question here was cause the book that i was reading was written by Lincoln Stein and Doug MacEachern, and Stein is the perl CGI module creator.

    Also, the book uses perl as programming language and, as cfreak notes, it's cgi-related.

    I don't focuse my post in the warning of the vulnerability itself, because is well documented (for example, this post describes the solution)

    So, i expected that some big perlmonger could give me some answers. That's all.