Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 4 Sep 2013 09:15:34 +0200
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: mask mode bug

On 4 Sep, 2013, at 4:26 , Sayantan Datta <std2048@...il.com> wrote:
> I'll check the problem. Can you please try mask with at least four or five placeholders, so that we have sufficient concurrent threads. Most likely you are running on a single thread with just two mask placeholders.

Same problems using any mask, just harder to compare. Here's false negatives:

$ rm new.pot && GWS=4096 ../run/john ~/john/test/bigtest.rawmd5 -form:raw-md5-opencl -pot:new.pot -mask=?a?a?a?a -verb=1
Loaded 61747 password hashes with no different salts (Raw-MD5-opencl [MD5 OpenCL (inefficient, development use only)])
Using kernel md5_ccc...
Press 'q' or Ctrl-C to abort, almost any other key for status
178g 0:00:00:02 69.26g/s 3511p/s 31692Kc/s 2509GC/s   v6..  v6
Warning: passwords printed above might not be all those cracked
Use the "--show" option to display all of the cracked passwords reliably
Session completed

$ rm new.pot &&../run/john ~/john/test/bigtest.rawmd5 -form:raw-md5 -pot:new.pot -mask=?a?a?a?a -verb=1
Loaded 61747 password hashes with no different salts (Raw-MD5 [MD5 128/128 AVX 12x])
Press 'q' or Ctrl-C to abort, almost any other key for status
416g 0:00:00:04 84.38g/s 16521Kp/s 16521Kc/s 1253GC/s ~~~~
Warning: passwords printed above might not be all those cracked
Use the "--show" option to display all of the cracked passwords reliably
Session completed


Here's some interesting results (not using mask) Watch GWS:

$ GWS=1024 ./jtrts.pl raw-md5-opencl
-------------------------------------------------------------------------------
- JtR-TestSuite (jtrts). Version 1.12.12, July 21, 2013.  By, Jim Fougeron & others
- Testing:  John the Ripper password cracker, version 1.8.0.2-bleeding-jumbo [macosx-x86-64-native-gpu]
--------------------------------------------------------------------------------

John Jumbo build detected.

form=raw-md5-opencl               guesses: 1500 0:00:00:01 DONE  [PASSED]
.pot CHK:raw-md5-opencl           guesses: 1500 0:00:00:00 DONE  [PASSED]

All tests passed without error.  Performed 1 tests.  Time used was 4 seconds


$ GWS=2048 ./jtrts.pl raw-md5-opencl
-------------------------------------------------------------------------------
- JtR-TestSuite (jtrts). Version 1.12.12, July 21, 2013.  By, Jim Fougeron & others
- Testing:  John the Ripper password cracker, version 1.8.0.2-bleeding-jumbo [macosx-x86-64-native-gpu]
--------------------------------------------------------------------------------

John Jumbo build detected.

form=raw-md5-opencl               guesses: 1135 0:00:00:00 DONE : Expected count(s) (1500)  [!!!FAILED!!!]
.pot CHK:raw-md5-opencl           guesses: 1135 0:00:00:00 DONE  [PASSED]

Some tests had Errors. Performed 1 tests.1 errors
Time used was 4 seconds


$ GWS=2048 ./jtrts.pl raw-md5-opencl
-------------------------------------------------------------------------------
- JtR-TestSuite (jtrts). Version 1.12.12, July 21, 2013.  By, Jim Fougeron & others
- Testing:  John the Ripper password cracker, version 1.8.0.2-bleeding-jumbo [macosx-x86-64-native-gpu]
--------------------------------------------------------------------------------

John Jumbo build detected.

form=raw-md5-opencl               guesses: 1062 0:00:00:00 DONE : Expected count(s) (1500)  [!!!FAILED!!!]
.pot CHK:raw-md5-opencl           guesses: 1062 0:00:00:00 DONE  [PASSED]

Some tests had Errors. Performed 1 tests.1 errors
Time used was 5 seconds

...first test using low GWS (lower than num of loaded hashes), all cracked. Last two tests should be identical but result varies.

magnum

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ