|
Message-ID: <CANO7a6xvE9=eMcp6igWRoy9GRr7NZ56b8Jxg2ZtQxxMFEOPTrg@mail.gmail.com> Date: Fri, 28 Dec 2012 22:38:41 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-dev@...ts.openwall.com Subject: Re: Formats dmg, encfs and strip crash on longer passwords On Fri, Dec 28, 2012 at 10:26 PM, Frank Dittrich <frank_dittrich@...mail.com> wrote: > All three formats claim to support a maximum password length of 32, but > if you try to use a word list with longer passwords, they all segfault > (at least on my 32bit Linux system). I get "stack smashing detected" on a 32-bit machine. These formats works fine on 64-bit machines (even when using ASAN). > $ ./john encfs --wordlist=test-p > Loaded 4 password hashes with 4 different salts (EncFS PBKDF2 AES / > Blowfish [32/32]) > Segmentation fault (core dumped) > > For me, this looks like a systematic error in Dhiru's formats. > Unfortunately, if I build a debug version, the error disappears. Yes, it is a common problem as these formats share a lot of code. I am working on fixing them. -- Cheers, Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.