Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 5 Aug 2013 12:51:22 +0200
From: Katja Malvoni <kmalvoni@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Parallella: bcrypt

Hi Alexander,

On Mon, Aug 5, 2013 at 10:06 AM, Solar Designer <solar@...nwall.com> wrote:

> I think that at this time we should clean up your code and get it merged
>  into the main core or jumbo tree.  Can you make whatever cleanups you
> think need to be done?  Then I'll take another look and either identify
> further cleanups for you to make or maybe I will make those myself.
>

I did cleanups, code is commited.

Yesterday Lukas suggested running john 20 times in a loop with 20 different
sets of hashes and words. I used 1000 hashes and 3000 candidate passwords.
This is the result:

1000 password hashes cracked, 0 left
1000 password hashes cracked, 0 left
999 password hashes cracked, 1 left
999 password hashes cracked, 1 left
1000 password hashes cracked, 0 left
1000 password hashes cracked, 0 left
1000 password hashes cracked, 0 left
1000 password hashes cracked, 0 left
1000 password hashes cracked, 0 left
1000 password hashes cracked, 0 left
1000 password hashes cracked, 0 left
1000 password hashes cracked, 0 left
1000 password hashes cracked, 0 left
1000 password hashes cracked, 0 left
1000 password hashes cracked, 0 left
1000 password hashes cracked, 0 left
1000 password hashes cracked, 0 left
1000 password hashes cracked, 0 left
1000 password hashes cracked, 0 left
999 password hashes cracked, 1 left

Katja

Content of type "text/html" skipped

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ