|
Message-ID: <000301cd5618$b8ff5f00$2afe1d00$@net> Date: Fri, 29 Jun 2012 12:00:43 -0500 From: "jfoug" <jfoug@....net> To: <john-dev@...ts.openwall.com> Subject: RE: For some dynamic formats on linux-x86-mmx build cracking depends on password candidate sequence >>From Frank Dittrich: Friday, June 29, 2012 6:33 AM > >$ uname -srvp >Linux 3.4.2-1.fc16.i686.PAE #1 SMP Thu Jun 14 20:53:38 UTC 2012 i686 > >$ cd test >$ mv pw.dic pw.dic.orig >$ LC_ALL=C tac pw.dic.orig > pw.dic > >$ sha1sum pw.dic.orig pw.dic >71e6e0bb9c766c2030730ee1effde079b9fb1222 pw.dic.orig >ee862671a9c34fc76b863670782b3959d0319caa pw.dic >$ ./jtrts.pl -q dynamic >------------------------------------------------------------------------ >------- >- JtR-TestSuite (jtrts). Version 1.12.4, June 22, 2012. By, Jim >Fougeron & others >- Testing: John the Ripper password cracker, ver: 1.7.9-jumbo-6 [linux- >x86-mmx] >------------------------------------------------------------------------ >-------- >form=dynamic_2 guesses: 1496 time: 0:00:00:00 : >Expected count(s) (1500) [!!!FAILED!!!] Clip I am absolutely NOT able to get a pw.dic file reversed using tac, to fail (cygwin 32 bit builds). Also, my tac version has the EXACT same sha1sum as what you list here. $ ./jtrts.pl -b=../../john-1.7.9/john-1.7.9-jumbo-6/run -q dynamic ------------------------------------------------------------------------------- - JtR-TestSuite (jtrts). Version 1.12.4, June 22, 2012. By, Jim Fougeron & others - Testing: John the Ripper password cracker, ver: 1.7.9-jumbo-6 [win32-cygwin-x86-mmx] -------------------------------------------------------------------------------- All tests passed without error. Performed 42 tests. Time used was 169 seconds $ ./jtrts.pl -b=../../john-1.7.9/john-1.7.9-jumbo-6/run -q dynamic ------------------------------------------------------------------------------- - JtR-TestSuite (jtrts). Version 1.12.4, June 22, 2012. By, Jim Fougeron & others - Testing: John the Ripper password cracker, ver: 1.7.9-jumbo-6 [win32-cygwin-x86-any] -------------------------------------------------------------------------------- All tests passed without error. Performed 42 tests. Time used was 169 seconds $ ./jtrts.pl -b=../../john-1.7.9/john-1.7.9-jumbo-6/run -q dynamic ------------------------------------------------------------------------------- - JtR-TestSuite (jtrts). Version 1.12.4, June 22, 2012. By, Jim Fougeron & others - Testing: John the Ripper password cracker, ver: 1.7.9-jumbo-6 [win32-cygwin-x86-sse2] -------------------------------------------------------------------------------- All tests passed without error. Performed 42 tests. Time used was 118 seconds $ ./jtrts.pl -b=../../john-1.7.9/john-1.7.9-jumbo-6/run -q dynamic ------------------------------------------------------------------------------- - JtR-TestSuite (jtrts). Version 1.12.4, June 22, 2012. By, Jim Fougeron & others - Testing: John the Ripper password cracker, ver: 1.7.9-jumbo-6 [win32-cygwin-x86-sse2i] -------------------------------------------------------------------------------- All tests passed without error. Performed 42 tests. Time used was 120 seconds $ shasum pw.dic ee862671a9c34fc76b863670782b3959d0319caa *pw.dic Nothing fails. Could there be some other 'reason'? I do not build with OMP. Was this an OMP build? I have checked, and pw.dic (and pw.dic-orig) are both 'unix' files (only \n line endings). I am at a loss, and am not able to replicate the problem you are seeing.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.