Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sun, 18 Dec 2005 00:01:31 +0300
From: Solar Designer <>
Subject: John the Ripper 1.6.40


John the Ripper 1.6.40 is out.  It is available from the usual location:

The following changes have been made since 1.6.39:

The handling of hex-encoded hashes (such as LM hashes) has been enhanced
to use case insensitive comparisons of the encodings when eliminating
duplicate and already-cracked hashes at load time and when displaying
cracked passwords.  I'd like to thank Frank Dittrich for bringing this
issue to my attention.

The Makefile has been revised: more openbsd-* targets added (thanks to
Sebastian Rother and the OpenBSD "port" maintainers), linux-sparc
made compatible with glibc 2.3.x, many targets renamed, re-ordered, and
some marked as "best" or "obsolete".

The way nouns ending in "z" and "h" are pluralized with the "p" wordlist
rules command has been corrected.

A workaround for OpenAFS has been added to unafs (thanks to Heiko Schulz
and Lionel Cons).

Any charset file changes will now be detected when restoring sessions
(such that John will correctly refuse to run rather than proceed to do
the wrong thing).

The charset files have been updated and included with this development

The supplied password.lst has been updated.

A new pre-defined "incremental" mode "Alnum" (for alphanumeric) has been

A bug with the handling of break statements with nested loops in the
external mode compiler has been fixed.

A bug affecting optimal MD5 implementation selection with "make generic"
has been fixed.

With these changes, we should be very close to a 1.7 release.  If you've
been sticking with the 1.6 release so far, now may be the time to
upgrade to this "development" version for a last chance to report any
annoyances before I put out a 1.7. ;-)  Please direct your feedback to
the john-users mailing list (those who are getting this via the
announcement list only will need to subscribe to john-users first).


Alexander Peslyak <solar at>
GPG key ID: B35D3598  fp: 6429 0D7E F130 C13E C929  6447 73C3 A290 B35D 3598 - bringing security into open computing environments

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.