Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <af9e24.4277.1395581854d.Webtop.0@cox.net>
Date: Thu, 23 Aug 2012 18:01:55 -0400 (EDT)
From: jfoug@....net
To: john-dev@...ts.openwall.com
Subject: RFC dynamic changes:  Was: RE: [john-users] Is there any patch to
 crack MySQL Network auth?

Ok, here is the issues:

1. changes to get all 4 functions working (append2 to 1, 2 to 2, 1 to 1) 
for 16 byte hashes (md4/md5) is pretty easy.
2. changes to all other formats are not quite as simple, and here is 
where I would like some feedback.

Currently all 'larger' hash formats, perform a crypt, and fully write 
the results to 'some' buffer (1 or 2).  They may append, or they may 
overwrite.  However, there is no access to the original raw crypt 
buffer.  This may sound limiting, but actually, almost all formats one 
can think of can be designed under these limitations.

Also, the current dynamic ONLY is able to support a simple function call 
of:  void pFunc(void).  Thus, there is little that can be done, other 
than writing more functions.

However, for this, I was thinking of adding a few special functions 
which do setup behavior properties, of these larger hash functions.

Here are the existing functions available to SHA224 (all of them, SHA1, 
SHA224, ... WHIRLPOOL, GOST, etc, are the same) :

extern void DynamicFunc__SHA224_crypt_input1_append_input2_base16();
extern void DynamicFunc__SHA224_crypt_input2_append_input1_base16();
extern void DynamicFunc__SHA224_crypt_input1_overwrite_input1_base16();
extern void DynamicFunc__SHA224_crypt_input2_overwrite_input2_base16();
extern void DynamicFunc__SHA224_crypt_input1_overwrite_input2_base16();
extern void DynamicFunc__SHA224_crypt_input2_overwrite_input1_base16();
extern void DynamicFunc__SHA224_crypt_input1_to_output1_FINAL();
extern void DynamicFunc__SHA224_crypt_input2_to_output1_FINAL();

What I was thinking of doing is this

1. keep the above functions (depricated).  The _FINAL() are kept as is.
2. Building new functiosn:

extern void DynamicFunc__SHA224_crypt_input1_append_input2();
extern void DynamicFunc__SHA224_crypt_input2_append_input1();
extern void DynamicFunc__SHA224_crypt_input1_overwrite_input1();
extern void DynamicFunc__SHA224_crypt_input2_overwrite_input2();
extern void DynamicFunc__SHA224_crypt_input1_overwrite_input2();
extern void DynamicFunc__SHA224_crypt_input2_overwrite_input1();

3. each of the large hash types would have their own 'set' of the above 
functions.
4. create these new functions which set a global, that changes the 
behavior of these functions (not md4/md5 only the longer hashes)

extern void DynamicFunc__LargeHash_OUTMode_base16();
extern void DynamicFunc__LargeHash_OUTMode_base16u();
extern void DynamicFunc__LargeHash_OUTMode_base64();
extern void DynamicFunc__LargeHash_OUTMode_raw();


base16 would be the 'default'  each new crypt() call would start out 
with.  So to do a raw sha256($p)^4 (4 raw sha's back to back), one would 
issue:

DynamicFunc__LargeHash_OUTMode_raw
DynamicFunc__clean_input
DynamicFunc__append_keys
DynamicFunc__clean_input2
DynamicFunc__SHA224_crypt_input1_append_input2
DynamicFunc__clean_input
DynamicFunc__SHA224_crypt_input2_append_input1
DynamicFunc__clean_input2_kwik
DynamicFunc__SHA224_crypt_input1_append_input2
DynamicFunc__SHA224_crypt_input2_to_output1_FINAL


What are others thoughts on this?   Can someone think of a better way to 
do this.  I really do not want to add an extra 6 dynamic function 
primative functions to each 'large' hash type. Only to have to add 
another 6 later, for upper case hex, then another 6 (EACH) for base64, 
then another 6 for some other type, etc, etc, etc.   This method, while 
being a 2 step method, and also making the primatives more complex, does 
scale better, IMOH.  But I am 100% open to other / better ideas.

Jim.


> From: "jfoug" <jfoug@....net>
>
> This is not a simple fix. I am not sure I would be able to get this 
> out for
> the current jumbo, but can get changes in to a future version.  Yes, 
> the
> only 'raw' methods work with fixed md5 (md4) sized crypt buffers.
>
>> From: Solar Designer [mailto:solar@...nwall.com]
>>
>> Jim -
>>
>> On Wed, Aug 22, 2012 at 09:06:07PM +0400, Aleksey Cherepanov wrote:
>>> On Wed, Aug 22, 2012 at 07:48:10PM +0400, Vladimir Vorontsov wrote:
>>>> Need to brute that:
>>>> SHA1(salt + SHA1(SHA1($password)))
>>>
>>> I guess you could use dynamic for that (doc/DYNAMIC in jumbo).
>>
>> I briefly looked into implementing this as a dynamic, however we 
>> appear
>> to lack the needed dynamic functions currently (as of 1.7.9-jumbo-6).
>> Specifically, I couldn't find a way to reuse raw (as opposed to
>> hex-encoded) output of SHA-1 for another SHA-1 computation.
>>
>> Please help implement this dynamic for 1.7.9-jumbo-6 or confirm that
>> this is not currently possible (and make it possible in a later
>> version).

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.