Date: Sun, 18 Dec 2005 00:01:31 +0300 From: Solar Designer <solar@...nwall.com> To: announce@...ts.openwall.com Cc: john-users@...ts.openwall.com Subject: John the Ripper 1.6.40 Hi, John the Ripper 1.6.40 is out. It is available from the usual location: http://www.openwall.com/john/ The following changes have been made since 1.6.39: The handling of hex-encoded hashes (such as LM hashes) has been enhanced to use case insensitive comparisons of the encodings when eliminating duplicate and already-cracked hashes at load time and when displaying cracked passwords. I'd like to thank Frank Dittrich for bringing this issue to my attention. The Makefile has been revised: more openbsd-* targets added (thanks to Sebastian Rother and the OpenBSD "port" maintainers), linux-sparc made compatible with glibc 2.3.x, many targets renamed, re-ordered, and some marked as "best" or "obsolete". The way nouns ending in "z" and "h" are pluralized with the "p" wordlist rules command has been corrected. A workaround for OpenAFS has been added to unafs (thanks to Heiko Schulz and Lionel Cons). Any charset file changes will now be detected when restoring sessions (such that John will correctly refuse to run rather than proceed to do the wrong thing). The charset files have been updated and included with this development version. The supplied password.lst has been updated. A new pre-defined "incremental" mode "Alnum" (for alphanumeric) has been added. A bug with the handling of break statements with nested loops in the external mode compiler has been fixed. A bug affecting optimal MD5 implementation selection with "make generic" has been fixed. With these changes, we should be very close to a 1.7 release. If you've been sticking with the 1.6 release so far, now may be the time to upgrade to this "development" version for a last chance to report any annoyances before I put out a 1.7. ;-) Please direct your feedback to the john-users mailing list (those who are getting this via the announcement list only will need to subscribe to john-users first). Thanks, -- Alexander Peslyak <solar at openwall.com> GPG key ID: B35D3598 fp: 6429 0D7E F130 C13E C929 6447 73C3 A290 B35D 3598 http://www.openwall.com - bringing security into open computing environments
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.