Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 18 Jul 2008 16:08:40 +0400
From: Solar Designer <>
Subject: [openwall-announce] JtR


This is to announce availability of John the Ripper, which is a
"development" version, from the usual location:

John the Ripper 1.7.3 and focus on better x86-64 support.
Most notably, two Blowfish-based crypt(3) hashes may now be computed in
parallel for much better performance on x86-64 CPUs (on Intel Core 2 and
AMD CPUs tested, the speedup was 50% to 65%), and new make targets have
been added for Mac OS X 10.5+ (Leopard) and recent versions of Solaris
on 64-bit capable x86 processors, producing 64-bit builds that make use
of the 64-bit mode extended SSE2 for DES-based hashes.  Previously, such
"fully native" builds were only supported on Linux and *BSDs.  This
addition has required making the assembly source files more portable,
including conversion to instruction pointer relative addressing on
x86-64 as it is required for Mac OS X and avoiding constructs not
supported by Sun's assembler.  Hopefully, this has not made things any
worse for any other systems - and some testing has been done to confirm
this, but further testing is desired.

A number of other make targets have been added as well, including for
32-bit with SSE2 and 32-bit with MMX builds on Solaris (with Sun Studio
C compiler or gcc), for Linux/IA64 (Itanium), and for building
three-architecture Universal binaries with Xcode 3.0 on Mac OS X.

I'd like to thank Anatoly Pugachev for his assistance with testing the
Solaris builds.

As a bonus, "DumbForce" and "KnownForce" external mode samples have been
added to the default john.conf.  DumbForce is a generic implementation
of "dumb" exhaustive search, given a range of lengths and an arbitrary
charset.  The sample is pre-configured for trying 8-bit characters
(except for known terminal controls) against LM hashes, but this can be
changed easily.  KnownForce is a generic implementation of exhaustive
search for a partially-known password - arbitrary character sets or even
fixed characters may be specified for each position separately.

Wanted: native make target vs. "make generic" benchmarks on Itanium and
on newer RISC processors (those capable of issuing more than 2 integer
instructions per clock cycle), with gcc and with other compilers.  Right
now, the "dual Blowfish" code is only enabled for x86-64 (where it is
known to work well) and IA64 (where it is expected to work well), but
not for any other architectures (where at least some versions of gcc are
known to produce poor code at least for some dual-issue RISC processors).

Please post any follow-ups to this message to the john-users mailing list
(be sure to join the list first if you're not on it already).

I will post another message on JtR Pro updates.


Alexander Peslyak <solar at>
GPG key ID: 5B341F15  fp: B3FB 63F4 D7A3 BCCC 6F6E  FC55 A2FC 027C 5B34 1F15 - bringing security into open computing environments

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.