Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 31 Jan 2013 09:54:06 +0400
From: Solar Designer <solar@...nwall.com>
To: john-dev@...ts.openwall.com
Subject: Re: NetNTLMv1

On Thu, Jan 31, 2013 at 09:03:00AM +0400, Solar Designer wrote:
> I took a look.  It's the last portion of the key, not block, that
> contains only 2 bytes.  The table can't be precomputed just once because
> it depends on the challenge, but it can be precomputed in salt() (higher
> memory usage)

I have a quick and dirty implementation, storing the entire 512 KB table
per salt.  (This can be lowered by storing partial DES blocks - still
sufficient to reject most password candidates.)

I'll post benchmarks and patch shortly.

> or set_salt() (lower memory usage, but also lower speed).

I tried this too, the speed was way too low.  We'd need to increase
MAX_KEYS_PER_CRYPT a lot in order to go with this approach, and that
will have performance impact on its own (keys not fitting in caches).

Alexander

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ