Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BLU0-SMTP3330FD9C3F0A1EA47C7D9BDFDE10@phx.gbl>
Date: Mon, 25 Jun 2012 10:04:42 +0200
From: Frank Dittrich <frank_dittrich@...mail.com>
To: john-dev@...ts.openwall.com
Subject: Re: Jumbo candidate vs Test Suite

On 06/25/2012 06:19 AM, jfoug wrote:
> Could this be buffer overwrites, smashing passwords?  The TS was written
> specifically to cause this form of corruption on formats which require
> additional sanity checking, prior to copying passwords.
> 
> If you look at the pw.dic file (and others???) there will be some bugus,
> unused lines that are long.  These are on purpose, and they have flushed out
> overwrite issues in many of the jumbo formats.

To verify that this can be the cause of the problem, try removing all
the extra long candidate passwords from pw.dic, and see if this
increases the count of cracked passwords.

Frank

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.