Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 27 Apr 2011 03:45:26 +0400
From: Solar Designer <>
Subject: [openwall-announce] GSoC 2011 accepted projects; Summer of Security; new mailing lists


As announced previously, Openwall is participating in Google Summer of
Code 2011 (GSoC).  We've accepted 5 great student projects, which I'll
announce below.  However, many more students had applied, and we'd love
to work with some of those who we couldn't accept specifically under the
GSoC program.  Thus, our own Summer of Security program is born:

This is inspired by similar programs run by some other GSoC mentoring
organizations.  (The name Summer of Security was suggested by Donnie
Berkholz of Gentoo - thanks!)  Initially, we intend to focus on GSoC
students who we would have accepted under slightly different
circumstances, but almost anyone else is welcome to apply (please refer
to the wiki page above for details).  We welcome non-code contributions
as well.

Now, the GSoC students who will work with us this summer, and their
projects (in "ideas page" order):

Vasiliy Kulikov will work on Linux kernel hardening, producing patches
both for latest mainline kernels and for RHEL6/OpenVZ kernels (which
we're going to use in Owl).  Thus, he is to work with LKML, Red Hat, and
OpenVZ folks, as well as with others involved/interested (Ubuntu,
Gentoo, grsecurity/PaX).  As many of you are aware, Vasiliy has been
with Openwall since last year and he intends to stay involved after GSoC
2011, which is important since this project is likely to proceed beyond
the end of summer.  Vasiliy is already starting the work:

Dhiru Kholia, who had contributed some John the Ripper patches before,
has chosen to work on the "support more non-hashes" task now.  In fact,
he has already implemented a SSH private key passphrase cracker as a JtR
patch (this early implementation is far from clean and is quite limited,
but it's a good start):

Lukas Odzioba is to work on GPU-accelerated support for "slow" hashes in
John the Ripper.  To get started (and selected for GSoC), he implemented
JtR patches that crack SHA-256 ("fast") and 5000 iterations of SHA-256
("slow") hashes on NVidia GPUs (currently implemented in CUDA).  (As
expected, without changes to JtR core, good efficiency is only achieved
for "slow" hashes.)  Lukas is currently working on phpass hashes.

Yuri Gonzaga is to work on a new password hashing method for servers,
including an FPGA implementation.  He has already implemented bcrypt on
FPGA as his qualification task:
Project rationale:

Luka Marcetic will work with Rich Felker (mentor) to implement standard
C library unit tests, which will be used to test current and future
versions of musl, glibc, and other implementations:
Additions to this wiki page are welcome.
In fact, Luka has already implemented one of the tests as his
qualification task:
(this code will need to be cleaned up and wrapped in a testing framework).

Many other students contributed code as well.  As I wrote above, we
intend to work with some of them under Summer of Security.

The ideas page has been revised to note which projects are claimed under
GSoC 2011, and to link to mailing list postings and wiki pages with
relevant contributions:

Then, we've setup three new mailing lists (two of which have already
been indirectly mentioned above): crypt-dev (design and implementation
of a new password hashing method for servers), musl (discussions around
musl, a new standard C library for Linux), and sabotage (discussions
around Sabotage Linux, an experimental distribution based on musl and
BusyBox).  The archives and subscription form are available here:

Last but not least, I'd like to thank Google for continuing to sponsor
Open Source projects - and even increasing the budget this year,
accepting as many as 175 mentoring organizations and 1116 students.
Some of the students may get into Open Source specifically due to this
program.  I would also like to thank Nmap, Gentoo, and coreboot
projects (established GSoC mentoring organizations) for the
assistance they have provided us (a new GSoC mentoring organization).

Did you know that coreboot can embed a Linux kernel+initrd or a
cryptographically enhanced bootloader (GRUB2 with patches) into the
mainboard flash/BIOS chip to get a secure boot without relying on
signature verification code stored on disk?  (I didn't.)


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.