Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sun, 22 May 2011 23:47:21 +0200
From: magnum <rawsmooth@...dband.net>
To: john-dev@...ts.openwall.com
Subject: "excessive partial hash collisions detected" for mskrb5

Solar,

After I managed to create a perl script that can make test hashes for 
mskrb5, I noticed I get this warning when running against a lot of hashes:

Warning: excessive partial hash collisions detected
(cause: the "format" lacks proper binary_hash() function definitions)

True, I have no binary_hash() or get_hash() functions. As far as I can 
tell, there's just no way to implement them for this format. I think you 
could say it's implemented as "salt only". After crypt_all() I have a 
partial decrypt of the input, that will contain known plaintext if the 
key was correct. This means a get_hash() function has no chance of 
producing anything that a binary_hash() could produce too.

Am I over-looking something here? Should I do it some other way?

If not, maybe there should be a way to tell john that it should not emit 
that warning for this format (and possibly some others)? Maybe just the 
fact that I'm also using fmt_default_binary()?

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.