Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 3 Aug 2011 21:38:31 +0400
From: Solar Designer <solar@...nwall.com>
To: announce@...ts.openwall.com, john-users@...ts.openwall.com
Subject: [openwall-announce] John the Ripper 1.7.8-jumbo-5

Hi,

I've just released John the Ripper 1.7.8-jumbo-5:

http://www.openwall.com/john/

In this community-enhanced release, support for more character encodings
via the new "--encoding" option has been added (currently utf-8,
iso-8859-1, koi8-r, and cp1251 are supported).  This affects wordlist
rule processing (what characters are treated as letters, lowercase,
uppercase, how lowercase to/from uppercase conversion is performed).
This is due to work by JimF and magnum - thanks!

Also, support for raw SHA-224, SHA-256, SHA-384, and SHA-512 hashes has
been added (only when building with OpenSSL 0.9.8 or later), due to a
contribution by groszek.

Finally, the Makefile has been revised to work with Solaris native make
again.  It works with either GNU make or Solaris make now, which means
that on Solaris you can use either, but on other platforms you need GNU
make specifically.  Oh, this also fixed a Mac OS X build issue, where
most hash types were missing in -jumbo-4.  Now they should be back.

In development terms, the following patches have been applied:

0001-linux-x86-64-32-sse2i-added-to-Makefile.patch
0002-test-and-test_full-make-targets.patch
0003-unified-get_key-for-mssql-old.patch
0004-many-changes-fixes-improvements-2.patch.gz
0005-Fix-typo-kio8-r-koi8-r.patch
0006-Unified-get_key-for-NT-and-mscash-non-thread-safe-ut.patch
0007-Fix-for-0006-for-any-builds.patch
0008-Unified-gmake-solaris-make.patch
0009-Refuse-to-run-Unicode-formats-with-other-than-ansi-u.patch
0010-NT_fmt-now-uses-the-optimised-x86-64-crypt-unless-in.patch
0011-koi8r-cp1251-unicode-enhance-2.patch.gz
0012-Re-enable-support-for-full-UTF-16-not-just-UCS-2-not.patch
0013-cmpt_cp.pl.patch
0014-rawSHA224-256-384-512-formats-added.patch

and I made some additional changes of my own (documented on john-dev).

Meanwhile, team john-users for the upcoming password cracking contest
keeps growing.  If you'd like to join the team, please e-mail me
off-list.  You do _not_ have to attend DEFCON to participate - in fact,
most people will be participating remotely (but we do have a few
representatives at DEFCON, so our participation is official).
The contest will last 48 hours from 11:59pm Thursday August 4th to
11:59:59pm on Saturday August 6th, Pacific time (PDT, UTC-7).

http://www.openwall.com/lists/announce/2011/08/02/1
http://contest.korelogic.com

Last year's contest site:

http://contest-2010.korelogic.com

Team john-users writeup from last year (lengthy):

http://contest-2010.korelogic.com/team_john-users.html

This is going to be fun.  We'll be using cutting-edge John the Ripper
code (beyond 1.7.8-jumbo-5), as well as other tools and data.

Alexander

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ