Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 31 Dec 2015 08:36:43 -0600
From: jfoug <>
Subject: Re: QNX Neutrino 6.6.0 password hashes

A new test was performed, using just a 1 byte password and 16 byte 
salt.  It appears that hashes (salt+passwords) up to 114 bytes 'work', 
but after that, they are broken (but consistently broken) for sha512.  
It may be that the buffer cleaning is not being properly done (the final 
'bit length' buffer).  Hopefully this can be figured out, and 
replicated, so that sha512 can also be cracked by jtr.  It is especially 
important, since sha512 is the 'default'

On 12/30/2015 7:24 PM, jfoug wrote:
> Hmm, it looks to me like QNX sha512 is broken. Look at this newer page

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ