Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130316192739.GB449@openwall.com>
Date: Sat, 16 Mar 2013 23:27:39 +0400
From: Solar Designer <solar@...nwall.com>
To: john-dev@...ts.openwall.com
Subject: Re: Cisco - Password type 4 - SHA256

On Sat, Mar 16, 2013 at 11:32:35AM -0700, Kurt Grutzmacher wrote:
> You can not enter a cleartext greater than 25 characters:
> 
> rtr1(config)#username len25 secret 12345678901234567890123456
> % Invalid Password length - must contain 1 to 25 characters. Password
> configuration failed

Thanks!

I think we should get rid of the separate format and merge the
functionality - only valid() and binary() - into the main raw SHA-256
format.

Once I enhance core to distinguish truncation vs. unallowed longer
passwords, we may add a separate struct fmt_main with the proper flag.

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.