Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 2 Feb 2012 04:16:33 +0400
From: Solar Designer <solar@...nwall.com>
To: john-dev@...ts.openwall.com
Subject: Re: strange behaviour of c/s on raw-md5 and raw-md5-opencl

On Wed, Feb 01, 2012 at 03:43:09PM +0100, Samuele Giovanni Tonon wrote:
> same password file, same incremental mode on CPU it last for 7:13 at
> at 192911M c/s , on GPU it last for 5:12 at 48408 M c/s ? should'nt
> the c/s be higher ?

This sounds like the integer overflow issue that I fixed in the CVS tree
a while ago.  It's triggered when you use a format that buffers a lot of
passwords (thousands) and at the same time you load a lot of hashes for
a certain salt (or total if saltless).

Here are the relevant changes:

http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/john/john/src/cracker.c.diff?r1=1.9;r2=1.10
http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/john/john/src/status.h.diff?r1=1.2;r2=1.3
http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/john/john/src/status.c.diff?r1=1.8;r2=1.10

Alexander

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ