Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 29 Aug 2013 00:10:18 +0530
From: Sayantan Datta <std2048@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: sha1 opencl bug fixed in bleeding-jumbo

On Tue, Aug 27, 2013 at 2:33 PM, magnum <john.magnum@...hmail.com> wrote:

> On 27 Aug, 2013, at 4:41 , Sayantan Datta <std2048@...il.com> wrote:
> > On Tue, Aug 27, 2013 at 7:16 AM, magnum <john.magnum@...hmail.com>
> wrote:
> > After fixing that, bleeding-jumbo passes test suite but bleeding-mask
> does not - despite that mask mode is *not* used in test suite yet. All your
> mask-mode enabled formats seem to fail about half of the cracks in wordlist
> mode.
> >
> > I would like to reproduce those errors. Which test hahses were you
> using, those provided in the test suite?
>
> Sure, just run the test suite:
>
> magnum@...r-osx:test [master]$ GWS=128 ./jtrts.pl raw-sha1-opencl
> nt-opencl raw-md4-opencl raw-md5-opencl
>
> -------------------------------------------------------------------------------
> - JtR-TestSuite (jtrts). Version 1.12.12, July 21, 2013.  By, Jim Fougeron
> & others
> - Testing:  John the Ripper password cracker, version
> 1.8.0.2-bleeding-jumbo [macosx-x86-64-native-gpu]
>
> --------------------------------------------------------------------------------
>
> John Jumbo build detected.
>
> form=raw-md4-opencl               guesses:  834 0:00:00:03 DONE : Expected
> count(s) (1500)  [!!!FAILED!!!]
> .pot CHK:raw-md4-opencl           guesses:  530 0:00:00:02 DONE : Expected
> count(s) (1500)  [!!!FAILED!!!]
>
> form=raw-md5-opencl               guesses:  880 0:00:00:03 DONE : Expected
> count(s) (1500)  [!!!FAILED!!!]
> .pot CHK:raw-md5-opencl           guesses:  578 0:00:00:02 DONE : Expected
> count(s) (1500)  [!!!FAILED!!!]
>
> form=raw-sha1-opencl              guesses:  919 0:00:00:03 DONE : Expected
> count(s) (1500)  [!!!FAILED!!!]
> .pot CHK:raw-sha1-opencl          guesses:  608 0:00:00:02 DONE : Expected
> count(s) (1500)  [!!!FAILED!!!]
>
> form=nt-opencl                    guesses:  365 0:00:00:01 DONE : Expected
> count(s) (1478)  [!!!FAILED!!!]
> .pot CHK:nt-opencl                guesses:  300 0:00:00:00 DONE : Expected
> count(s) (1478)  [!!!FAILED!!!]
>
> Some tests had Errors. Performed 4 tests.4 errors  4 errors reprocessing
> the .POT files
> Time used was 29 seconds
>
> I did not test descrypt-opencl, maybe you should.
>
> magnum
>

Hi magnum,

There were some weird compiler bugs in most cases. I have a workaround in
place for all the above formats. However nt-opencl may have some other
issues along with compiler bugs.

sayantan@...n:~/JohnTheRipper/JtrTs$ ./jtrts.pl -noprelim raw-md5-opencl
raw-md4-opencl raw-sha1-opencl nt-opencl descrypt-opencl
-------------------------------------------------------------------------------
- JtR-TestSuite (jtrts). Version 1.12.12, July 21, 2013.  By, Jim Fougeron
& others
- Testing:  John the Ripper password cracker, version
1.8.0.2-bleeding-jumbo [linux-x86-64-opencl]
--------------------------------------------------------------------------------

John Jumbo build detected.

form=raw-md4-opencl               guesses: 1500 0:00:00:00 DONE  [PASSED]
.pot CHK:raw-md4-opencl           guesses: 1500 0:00:00:00 DONE  [PASSED]

form=raw-md5-opencl               guesses: 1500 0:00:00:00 DONE  [PASSED]
.pot CHK:raw-md5-opencl           guesses: 1500 0:00:00:00 DONE  [PASSED]

form=raw-sha1-opencl              guesses: 1500 0:00:00:00 DONE  [PASSED]
.pot CHK:raw-sha1-opencl          guesses: 1500 0:00:00:00 DONE  [PASSED]

form=nt-opencl                    guesses: 1477 0:00:00:00 DONE : Expected
count(s) (1478)  [!!!FAILED!!!]
.pot CHK:nt-opencl                guesses: 1477 0:00:00:00 DONE  [PASSED]

form=descrypt-opencl              guesses: 1500 0:00:00:16 DONE  [PASSED]
.pot CHK:descrypt-opencl          guesses: 1500 0:00:00:16 DONE  [PASSED]


Is it possible to isolate the test hashes that did not get cracked ?

Regards,
Sayantan

[ CONTENT OF TYPE text/html SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ