Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 28 Dec 2012 22:38:41 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Formats dmg, encfs and strip crash on longer passwords

On Fri, Dec 28, 2012 at 10:26 PM, Frank Dittrich
<frank_dittrich@...mail.com> wrote:
> All three formats claim to support a maximum password length of 32, but
> if you try to use a word list with longer passwords, they all segfault
> (at least on my 32bit Linux system).

I get "stack smashing detected" on a 32-bit machine. These formats
works fine on 64-bit machines (even when using ASAN).

> $ ./john encfs --wordlist=test-p
> Loaded 4 password hashes with 4 different salts (EncFS PBKDF2 AES /
> Blowfish [32/32])
> Segmentation fault (core dumped)
>
> For me, this looks like a systematic error in Dhiru's formats.
> Unfortunately, if I build a debug version, the error disappears.

Yes, it is a common problem as these formats share a lot of code.

I am working on fixing them.

-- 
Cheers,
Dhiru

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ