Date: Fri, 18 Jul 2008 16:08:40 +0400 From: Solar Designer <solar@...nwall.com> To: announce@...ts.openwall.com, john-users@...ts.openwall.com Subject: [openwall-announce] JtR 22.214.171.124 Hi, This is to announce availability of John the Ripper 126.96.36.199, which is a "development" version, from the usual location: http://www.openwall.com/john/ John the Ripper 1.7.3 and 188.8.131.52 focus on better x86-64 support. Most notably, two Blowfish-based crypt(3) hashes may now be computed in parallel for much better performance on x86-64 CPUs (on Intel Core 2 and AMD CPUs tested, the speedup was 50% to 65%), and new make targets have been added for Mac OS X 10.5+ (Leopard) and recent versions of Solaris on 64-bit capable x86 processors, producing 64-bit builds that make use of the 64-bit mode extended SSE2 for DES-based hashes. Previously, such "fully native" builds were only supported on Linux and *BSDs. This addition has required making the assembly source files more portable, including conversion to instruction pointer relative addressing on x86-64 as it is required for Mac OS X and avoiding constructs not supported by Sun's assembler. Hopefully, this has not made things any worse for any other systems - and some testing has been done to confirm this, but further testing is desired. A number of other make targets have been added as well, including for 32-bit with SSE2 and 32-bit with MMX builds on Solaris (with Sun Studio C compiler or gcc), for Linux/IA64 (Itanium), and for building three-architecture Universal binaries with Xcode 3.0 on Mac OS X. I'd like to thank Anatoly Pugachev for his assistance with testing the Solaris builds. As a bonus, "DumbForce" and "KnownForce" external mode samples have been added to the default john.conf. DumbForce is a generic implementation of "dumb" exhaustive search, given a range of lengths and an arbitrary charset. The sample is pre-configured for trying 8-bit characters (except for known terminal controls) against LM hashes, but this can be changed easily. KnownForce is a generic implementation of exhaustive search for a partially-known password - arbitrary character sets or even fixed characters may be specified for each position separately. Wanted: native make target vs. "make generic" benchmarks on Itanium and on newer RISC processors (those capable of issuing more than 2 integer instructions per clock cycle), with gcc and with other compilers. Right now, the "dual Blowfish" code is only enabled for x86-64 (where it is known to work well) and IA64 (where it is expected to work well), but not for any other architectures (where at least some versions of gcc are known to produce poor code at least for some dual-issue RISC processors). Please post any follow-ups to this message to the john-users mailing list (be sure to join the list first if you're not on it already). I will post another message on JtR Pro updates. Thanks, Alexander Peslyak <solar at openwall.com> GPG key ID: 5B341F15 fp: B3FB 63F4 D7A3 BCCC 6F6E FC55 A2FC 027C 5B34 1F15 http://www.openwall.com - bringing security into open computing environments
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.