Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20010510183226.A19985@openwall.com>
Date: Thu, 10 May 2001 18:32:26 +0400
From: solar@...nwall.com
To: announce@...ts.openwall.com
Subject: crypt_blowfish v0.4 and John the Ripper v1.6.26-dev

Hi,

I've just released a new version of the password hashing package,
crypt_blowfish v0.4.  It adds two functions and most importantly a
manual page describing the programming interfaces, including on
systems based on the GNU C Library with crypt_blowfish patched into
libcrypt.

Meanwhile, there're new development versions of John the Ripper.

John v1.6.24-dev includes a cracker for passwords you may have
generated with Strip v0.5 (http://www.zetetic.net/products.html).
The cracker is implemented in john.conf as an "external mode" and will
try all passwords Strip could generate with all possible settings.
Other uses of Strip are unaffected.  The cracker is based on analysis
by Thomas Roessler and Ian Goldberg.

John v1.6.25-dev provides an additional x86 assembly implementation of
Blowfish for the Pentium Pro family of processors (which includes the
Pentium III).  I'd appreciate any benchmarks ("john -test") of v1.6.24
vs. v1.6.25+, especially on the original Pentium MMX (just to check
the CPU detection: the new code shouldn't be used) and on non-Intel
x86 processors.

John v1.6.26-dev improves idle priority emulation with POSIX.1b
(POSIX.4) scheduling calls.

The URL's are as usual:

	http://www.openwall.com/crypt/
and
	http://www.openwall.com/john/

-- 
/sd

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.