Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 29 Jun 2012 12:00:43 -0500
From: "jfoug" <jfoug@....net>
To: <john-dev@...ts.openwall.com>
Subject: RE: For some dynamic formats on linux-x86-mmx build cracking depends on password candidate sequence

>>From Frank Dittrich:  Friday, June 29, 2012 6:33 AM
>
>$ uname -srvp
>Linux 3.4.2-1.fc16.i686.PAE #1 SMP Thu Jun 14 20:53:38 UTC 2012 i686
>
>$ cd test
>$ mv pw.dic pw.dic.orig
>$ LC_ALL=C tac pw.dic.orig > pw.dic
>
>$ sha1sum pw.dic.orig pw.dic
>71e6e0bb9c766c2030730ee1effde079b9fb1222  pw.dic.orig
>ee862671a9c34fc76b863670782b3959d0319caa  pw.dic
>$ ./jtrts.pl -q dynamic
>------------------------------------------------------------------------
>-------
>- JtR-TestSuite (jtrts). Version 1.12.4, June 22, 2012.  By, Jim
>Fougeron & others
>- Testing:  John the Ripper password cracker, ver: 1.7.9-jumbo-6 [linux-
>x86-mmx]
>------------------------------------------------------------------------
>--------
>form=dynamic_2                    guesses: 1496 time: 0:00:00:00 :
>Expected count(s) (1500)  [!!!FAILED!!!]

Clip

I am absolutely NOT able to get a pw.dic file reversed using tac, to fail (cygwin 32 bit builds).  Also, my tac version has the EXACT same sha1sum as what you list here.

$ ./jtrts.pl -b=../../john-1.7.9/john-1.7.9-jumbo-6/run -q dynamic
-------------------------------------------------------------------------------
- JtR-TestSuite (jtrts). Version 1.12.4, June 22, 2012.  By, Jim Fougeron & others
- Testing:  John the Ripper password cracker, ver: 1.7.9-jumbo-6 [win32-cygwin-x86-mmx]
--------------------------------------------------------------------------------
All tests passed without error.  Performed 42 tests.  Time used was 169 seconds

$ ./jtrts.pl -b=../../john-1.7.9/john-1.7.9-jumbo-6/run -q dynamic
-------------------------------------------------------------------------------
- JtR-TestSuite (jtrts). Version 1.12.4, June 22, 2012.  By, Jim Fougeron & others
- Testing:  John the Ripper password cracker, ver: 1.7.9-jumbo-6 [win32-cygwin-x86-any]
--------------------------------------------------------------------------------
All tests passed without error.  Performed 42 tests.  Time used was 169 seconds

$ ./jtrts.pl -b=../../john-1.7.9/john-1.7.9-jumbo-6/run -q dynamic
-------------------------------------------------------------------------------
- JtR-TestSuite (jtrts). Version 1.12.4, June 22, 2012.  By, Jim Fougeron & others
- Testing:  John the Ripper password cracker, ver: 1.7.9-jumbo-6 [win32-cygwin-x86-sse2]
--------------------------------------------------------------------------------
All tests passed without error.  Performed 42 tests.  Time used was 118 seconds

$ ./jtrts.pl -b=../../john-1.7.9/john-1.7.9-jumbo-6/run -q dynamic
-------------------------------------------------------------------------------
- JtR-TestSuite (jtrts). Version 1.12.4, June 22, 2012.  By, Jim Fougeron & others
- Testing:  John the Ripper password cracker, ver: 1.7.9-jumbo-6 [win32-cygwin-x86-sse2i]
--------------------------------------------------------------------------------
All tests passed without error.  Performed 42 tests.  Time used was 120 seconds

$ shasum pw.dic
ee862671a9c34fc76b863670782b3959d0319caa *pw.dic

Nothing fails.

Could there be some other 'reason'?  I do not build with OMP.  Was this an OMP build?  I have checked, and pw.dic (and pw.dic-orig) are both 'unix' files (only \n line endings).

I am at a loss, and am not able to replicate the problem you are seeing.


Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.