Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 20 Jul 2012 08:31:56 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: john with Apple Keychains (/Users/Alex/Library/Keychains/login.keychain)

On Thu, Jul 19, 2012 at 11:51 PM, Solar Designer <solar@...nwall.com> wrote:
> Alex, Dhiru -
>
> On Thu, Jul 19, 2012 at 10:11:49PM +0400, Solar Designer wrote:
>> On Thu, Jul 19, 2012 at 08:05:56PM +0200, Alex Kornilov wrote:
>> > /Users/Alex/Desktop/magnumripper-magnum-jumbo-06444ba/run/john
>> > --wordlist=/Users/Alex/Downloads/wordlist_john/Wordlists-20031009/all.lst
>> > /Users/Alex/Library/Keychains/login.keychain-john
>> > Loaded 1 password hash (Mac OS X Keychain PBKDF2-HMAC-SHA-1 3DES [32/64])
>> > Abort trap: 6
>> >
>> > now error Abort trap: 6 (with most recent version)
>>
>> Yeah, I just ran into what looks like the same bug myself.  It seems it
>> is in magnum-jumbo only.  Please try to downgrade to 1.7.9-jumbo-6
>> release.  (And we'll fix the bug in magnum-jumbo indeed.)
>
> The crash I am observing on Linux is specific to single crack mode (and
> thus is also seen in batch mode, which is the default when no options
> are given).  It is avoided with explicit "-w=password.lst -ru" or -i.

This is the bug.

uint8_t ipad[16];
for (i = 0; i < keylen; i++)
                ipad[i] = var1 ^ key[i];

The pbkdf kernel doesn't handle password lenghts > 16. I have
committed a fix by limiting PLAINTEXT_LENGTH. Arch Linux didn't
complain about stack smashing. Seems its gcc was built with that
feature turned off :-(

Alex,

Do git pull and try again.

Solar,

I will integrate keychain2john into john soon. I was under assumption
that I had done it until this mail came up.

-- 
Cheers,
Dhiru

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.