Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 21 Sep 2007 00:16:00 +0200
From: Simon Marechal <simon@...quise.net>
To: john-users@...ts.openwall.com
Subject: Re: Markov filter password generation

Michal Luczaj wrote:
> P.S. Just for fun, with john.pot already filled after those
> incremental/markov passes, I've run markov=250:0:0:16 - 17 new guesses,
> ~4h. And then markov=257:0:0:30 - 2 more (9 chars long) guesses, ~8h.
> And that's really really nice. But I've noticed that 250:0:0:16 found
> some additional short (6-7 chars long) passwords that 266:0:0:8 didn't.
> Is it correct behavior?

Hello,

	266:0:0:8 should find all passwords that are 8 chars or less that
250:0:0:16 found, and some more, so this looks definitely like a bug.
However, given the code quality of my contributions, i'm not sure
whether it's from the markov part or the md5 part (if it's mine ...).
Could you send me one of the cleartext passwords so that i could
pinpoint the bug?

-- 
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ