URI:
       tedunangst_flak.rss.xml - sfeed_tests - sfeed tests and RSS and Atom files
  HTML git clone git://git.codemadness.org/sfeed_tests
   DIR Log
   DIR Files
   DIR Refs
   DIR README
   DIR LICENSE
       ---
       tedunangst_flak.rss.xml (28011B)
       ---
            1 <?xml version="1.0" encoding="UTF-8"?>
            2 <rss version="2.0">
            3   <channel>
            4     <title>flak</title>
            5     <link>https://flak.tedunangst.com/</link>
            6     <description>flak rss</description>
            7     <managingEditor>tedu@tedunangst.com</managingEditor>
            8     <image>
            9       <url>https://flak.tedunangst.com/icon.png</url>
           10       <title>flak rss</title>
           11       <link>https://flak.tedunangst.com/</link>
           12     </image>
           13     <item>
           14       <title>quick thoughts on bouncy castle bcrypt broken compare</title>
           15       <description><![CDATA[A few thoughts on the BCBCBC vulnerability. <a href="https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle/">Original report</a>. There's a few things not explicitly stated in the report, which I thought may be interesting.<p><b>vuln</b><p>To recap, the bug is that password hashes are compared by looking at the position of each character value, instead of comparing the character values at each position. This leads to a great many false positives, effectively a password bypass.<p>Here's a few hashes to review. As a reminder, hashes are structured as algorithm identifier, log round count, then a base64 encoding of the salt followed by the encrypted password. (Password: password)<p><pre><code>$2b$08$EVUJdN.PNZbjUOi9D3nsJecEYZE2jN0dr1/3CEvawNH.d5lp9Nt9G
           16 $2b$08$TMwmj0nJfvO6eXGRTNoeaOGbivW1wvSAklXatjMo7tRwoo5FCxCTu
codemadness.org:70 /git/sfeed_tests/file/input/sfeed/realworld/tedunangst_flak.rss.xml.gph:27: line too long