Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 16 Aug 2013 19:19:36 +0200
From: Katja Malvoni <kmalvoni@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Parallella: bcrypt

Hi Alexander,

On Thu, Aug 15, 2013 at 1:39 AM, Solar Designer <solar@...nwall.com> wrote:

> On Wed, Aug 14, 2013 at 11:28:11PM +0200, Katja Malvoni wrote:
> > these are results of tests on both boards. 20 test cases (both boards
> used
> > the same set), 3000 random strings, 1000 hashes, each test takes 20 - 21
> > minutes.
>
> Does this mean that each system spent about 400 minutes on these?
>

Yes it does.


> I suggest that you use a smaller wordlist and a smaller list of hashes -
> e.g., 64 of each (with every word actually cracking a password) - and do
> many more invocations.  This will likely trigger the problem more
> frequently (because more of the bcrypt computation results will actually
> need to match a loaded hash).  Maybe you'll trigger it on the "embecosm"
> system too.
>

I tried this on both system. Results are attached. And it didn't trigger
the problem... Only problem is occasional stall (lines with 0 cracked
passwords).
What should I do next?

Katja

[ CONTENT OF TYPE text/html SKIPPED ]

[ CONTENT OF TYPE application/octet-stream SKIPPED ]

[ CONTENT OF TYPE application/octet-stream SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ