Subject: | Re: ConferenceRoom
| Date: | Sat, 05 Jun 2004 14:13:15 +0300
| From: | Jan Knutar <shadowjksp@yahoo.se>
| Newsgroups: | alt.irc
|
Lee Mills wrote:
> Thats cool dave.. And what i was implementing was its just abit easy
> all i wanted to point out is how easy it is and how easy it is to
> compromise any server..
Easy?
The key is about 8 times longer than the average password (well, based on
the examples of keys tossed around). That means it's easier to compromise
the server by guessing the oper passwords instead.
Hopefully conferenceroom has checks in place to prevent such bruteforce
attacks though, atleast the last one I saw was very anal wrt floods, made
you have to limit norma chat a bit at times too, so bruteforce attack
shouldn't be that realistic.
|