Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 29 Sep 2012 16:00:16 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-dev@...ts.openwall.com
Subject: JtR on ppc (big-endian)

Hi,

Here is a list of formats which don't work on big-endian platforms.

Benchmarking: 1Password Agile Keychain PBKDF2-HMAC-SHA-1 AES
[32/32]... FAILED (cmp_all(1))
Benchmarking: Apple DMG PBKDF2-HMAC-SHA-1 3DES / AES [32/32]... FAILED
(cmp_all(1))
Benchmarking: EncFS PBKDF2 AES / Blowfish [32/32]... FAILED (cmp_all(1))
Benchmarking: Mac OS X Keychain PBKDF2-HMAC-SHA-1 3DES [32/32]...
FAILED (cmp_all(1))
Benchmarking: MS SQL 2005 SHA-1 [32/32]... FAILED (get_hash[0](0))
Benchmarking: MS SQL 2012 SHA512 [ms-sql12]... FAILED (get_hash[0](0))
Benchmarking: Office 2007/2010 (SHA-1) / 2013 (SHA-512), with AES
[32/32]... FAILED (cmp_all(1))
Benchmarking: Office <= 2003 MD5/SHA-1, RC4 [32/32]... FAILED (get_key(0))
Benchmarking: GRUB2 / OS X 10.8 pbkdf2-hmac-sha512 [PBKDF2-SHA512
CPU]... FAILED (get_hash[0](0))
Benchmarking: STRIP Password Manager PBKDF2-SHA1 [32/32]... FAILED (cmp_all(1))
Benchmarking: WPA-PSK PBKDF2-HMAC-SHA-1 [32/32]... FAILED (valid)
Benchmarking: RAR3 SHA-1 AES (4 characters) [32/32]... FAILED (cmp_all(1))
12 out of 178 tests have FAILED

In addition, SSH format crashed john badly with double-free.

7 out of these 12 formats use common PBKDF2 code. Lukas, Can you take
a took and see what is wrong?

-- 
Cheers,
Dhiru

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ