Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: jf (jfownco.net)
Date: Thu Feb 24 2011 - 11:34:37 CST
On Thu, Feb 24, 2011 at 12:27:29PM -0500, jf wrote:
> On Thu, Feb 24, 2011 at 01:20:32PM -0800, Michal Zalewski wrote:
> > >> this is only true for remote attackers hitting network service auth.
> > > Mhmm, and runas, su et al couldn't benefit from this?
> > Not a whole lot. You can likely tell a successful login from a failed
> > one within several miliseconds by watching /proc or so.
Erm, slightly misunderstood what you were saying-- although overall statement still sorta holds. Doing this locally is obviously going to incurr a lot more side-channel information leakage chances. I'd still prefer to see those addressed over abandonment of it all together.
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/