Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 29 Feb 2016 22:48:13 +0300
From: Solar Designer <solar@...nwall.com>
To: john-dev@...ts.openwall.com
Subject: spurious warning from generic crypt(3) format

magnum -

It was reported to us that jumbo prints a spurious warning before
proceeding to crack SHA-crypt hashes on systems that lack support for
those hashes in crypt(3), like this:

xxxxx-MacBook-Pro:run xxxxxxxx$ ./john passwd.txt
Warning: detected hash type "sha512crypt", but the string is also recognized as "sha512crypt-opencl"
Use the "--format=sha512crypt-opencl" option to force loading these as that type instead
Warning: hash encoding string length 106, type id $6
appears to be unsupported on this system; will not load such hashes.
Using default input encoding: UTF-8
Loaded 1 password hash (sha512crypt, crypt(3) $6$ [SHA512 128/128 AVX 2x])
Press 'q' or Ctrl-C to abort, almost any other key for status

Perhaps the code in loader.c that tries to delegate these hashes to the
generic crypt(3) format should be disabled in jumbo when its own
SHA-crypt formats are compiled in.  Would you implement this logic?

Thanks,

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.