Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <bc48997ee35737090c5a721c534495e5@smtp.hushmail.com>
Date: Fri, 29 Jun 2012 00:17:34 +0200
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: Shouldn't the TS work with a pw.dic in reversed order
 as well?

On 2012-06-29 00:10, Frank Dittrich wrote:
> I just wanted to find out which hmac-sha1 passwords get cracked if I try
> the candidate passwords in reversed order.
> 
> 
> mv pw.dic pw.dic.orig
> tac pw.dic.orig > pw.dic
> 
> 
> But I already stumbled over
> 
>  form=dynamic_2                    guesses: 1482 time: 0:00:00:00 :
> Expected count(s) (1500)  [!!!FAILED!!!]
> Exiting on error.  The pot file ./tst.pot contains the found data
> The command used to run this test was:
> 
> ../run/john -ses=./tst -nolog -pot=./tst.pot dynamic_2_tst.in
> --wordlist=pw.dic 2>&1 >/dev/null
> 
> 
> Other formats that fail:

Interesting find. I used to do "shuf pw.dic.orig > pw.dic" for similar
adventures.


> form=dynamic_2-raw                guesses: 1482 time: 0:00:00:00 :
> Expected count(s) (1500)  [!!!FAILED!!!]
> .pot CHK:dynamic_2-raw            guesses: 1482 time: 0:00:00:00  [PASSED]
> 
> form=dynamic_3                    guesses: 1482 time: 0:00:00:00 :
> Expected count(s) (1500)  [!!!FAILED!!!]
> .pot CHK:dynamic_3                guesses: 1482 time: 0:00:00:00  [PASSED]
> 
> form=dynamic_3-raw                guesses: 1482 time: 0:00:00:00 :
> Expected count(s) (1500)  [!!!FAILED!!!]
> .pot CHK:dynamic_3-raw            guesses: 1482 time: 0:00:00:00  [PASSED]
> 
> form=dynamic_34                   guesses: 1482 time: 0:00:00:00 :
> Expected count(s) (1500)  [!!!FAILED!!!]
> .pot CHK:dynamic_34               guesses: 1482 time: 0:00:00:00  [PASSED]

It's very consistent :)


> form=hmac-sha1                    guesses:  730 time: 0:00:00:09 :
> Expected count(s) (1500)  [!!!FAILED!!!]
> .pot CHK:hmac-sha1                guesses:  730 time: 0:00:00:01  [PASSED]
> 
> So,. for hmac-sha1 at least the password count is the same if we reverse
> the order of candidates tried.

You did not pull the fix Jim authored? This problem should be long gone.

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.