Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 18 Jan 2007 07:57:39 +0300
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: New NT patch

On Wed, Jan 17, 2007 at 09:23:14PM -0500, Erik Winkler wrote:
> Patch compiles on a PowerPC MacOSX, but I get the following on the  
> bench test:
> 
> Benchmarking: NT MD4 [Rapid NT MD4]... FAILED (get_hash[0])

This was to be expected - the code assumes a little-endian architecture.

> and I get "No password hashes loaded" when I try to test it against a  
> password file.

This is also not news - I've already mentioned in here that this patch
lacks the loader.c hack needed for PWDUMP format files.  For it to work,
you have to use passwd-like files:

user:$NT$8846f7eaee8fb117ad06bdd830b7586c

(this was also supported with the old patches).

But it won't work anyway, until the get_hash_*() and binary_hash_*()
functions are fixed (this is trivial to do - just add the proper "and"
masks for 4, 8, and 12 bits).

-- 
Alexander Peslyak <solar at openwall.com>
GPG key ID: 5B341F15  fp: B3FB 63F4 D7A3 BCCC 6F6E  FC55 A2FC 027C 5B34 1F15
http://www.openwall.com - bringing security into open computing environments

-- 
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ