Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 05 Jun 2012 08:30:49 +0200
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: GPU formats vs Test Suite

On 06/05/2012 08:24 AM, magnum wrote:
> On 06/05/2012 08:07 AM, SAYANTAN DATTA wrote:
>> I found that the output of openssl version of pbkdf2 in mscash2(cpu
>> version) do not matches with the SSE version of pbkdf2 for salts greater
>> than 19 charachters. Since mscash2-opencl is based on openssl version of
>> pbkdf2, so I have limited the max salt length to 19 charcters only.
>> But the
>> file /test/MSCash2_tst.in contains salts upto 22 character. I think
>> this is
>> the main source of problem.
>
> How come not a single password is cracked then? A smashed buffer? It
> should crack all passwords with <= 19 character salts.

BTW you only *have* to fix the buffer smashing (if that is what 
happens), not necessarily bump the max supported length (although that 
won't hurt). If you fix it and it ends up cracking 1411 out of 1500 
hashes, we'll just instruct the Test Suite that 1411 is a success.

magnum

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ