|
Message-ID: <20010510183226.A19985@openwall.com> Date: Thu, 10 May 2001 18:32:26 +0400 From: solar@...nwall.com To: announce@...ts.openwall.com Subject: crypt_blowfish v0.4 and John the Ripper v1.6.26-dev Hi, I've just released a new version of the password hashing package, crypt_blowfish v0.4. It adds two functions and most importantly a manual page describing the programming interfaces, including on systems based on the GNU C Library with crypt_blowfish patched into libcrypt. Meanwhile, there're new development versions of John the Ripper. John v1.6.24-dev includes a cracker for passwords you may have generated with Strip v0.5 (http://www.zetetic.net/products.html). The cracker is implemented in john.conf as an "external mode" and will try all passwords Strip could generate with all possible settings. Other uses of Strip are unaffected. The cracker is based on analysis by Thomas Roessler and Ian Goldberg. John v1.6.25-dev provides an additional x86 assembly implementation of Blowfish for the Pentium Pro family of processors (which includes the Pentium III). I'd appreciate any benchmarks ("john -test") of v1.6.24 vs. v1.6.25+, especially on the original Pentium MMX (just to check the CPU detection: the new code shouldn't be used) and on non-Intel x86 processors. John v1.6.26-dev improves idle priority emulation with POSIX.1b (POSIX.4) scheduling calls. The URL's are as usual: http://www.openwall.com/crypt/ and http://www.openwall.com/john/ -- /sd
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.