Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 02 Oct 2015 09:52:48 +0200
From: "Michael Kramer" <michael.kramer@...-konstanz.de>
To: john-dev@...ts.openwall.com
Subject: Re: Kerberoast for John

 
Am Mittwoch, 30. September 2015 22:39 CEST, magnum <john.magnum@...hmail.com> schrieb: 
> 
> Thanks! I committed your patch as-is and then made significant changes 
> and enhancements in a separate commit:
> https://github.com/magnumripper/JohnTheRipper/commit/05e5146
> https://github.com/magnumripper/JohnTheRipper/commit/00bd1bb
> 
> On a core i5 laptop, speed went from 80K to 116K single-thread, and to 
> 368K "many-salts" speed running 4 threads (HT).
> 
> You were using OpenSSL EVP, which is slow and not thread-safe. I bet 
> that bug was because of that, so it was probably squashed in the process.
> 
> To get a snapshot of bleeding-jumbo with this format, use:
> https://github.com/magnumripper/JohnTheRipper/archive/bleeding-jumbo.tar.gz
> 
> magnum
> 
 
Thanks again for fixing/enhancing my code! I was able to test it today and it works faster and better than before.

But I still encounter this strange bug. If I just use ./john <myfile>, the speed gets slower over time.

Some numbers:

0g 0:00:00:01 33.54% 1/3 (ETA: 08:32:05) 0g/s 405927p/s 405927c/s 405927C/s

0g 0:00:01:08 69.54% 2/3 (ETA: 08:33:40) 0g/s 43377p/s 535782c/s 535782C/s

0g 0:00:01:39  3/3 0g/s 30441p/s 528406c/s 528406C/s 011087..025246

0g 0:00:05:46  3/3 0g/s 10025p/s 542166c/s 542166C/s

0g 0:00:29:32  3/3 0g/s 3367p/s 543035c/s 543035C/s

0g 0:01:16:24  3/3 0g/s 2320p/s 526810c/s 526810C/s 

Is this behaviour normal?
The file I've loaded has 311 hashes.

- Michael

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ