Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <010a01ce3c42$cf4448f0$6dccdad0$@net>
Date: Thu, 18 Apr 2013 09:41:27 -0500
From: "jfoug" <jfoug@....net>
To: <john-dev@...ts.openwall.com>
Subject: RE: Bug report: specific hex salted hash failure

Yes, this was a bug (recently introduced).  Included are patches for
bleeding (and memdbg) branch, and unstable branch.  Also fixed was a pretty
significant performance issue in valid().  We were always calling sprintf 10
times, on each candidate, even if there were not $$Fx values that 'should'
have been looked for.  Reworked the check of flags, so we ONLY do the
sprintf IF the format should contain one of those special salt sections.

NOTE, unstable and bleed required separate patches. There was a tiny
difference, that is now the same between the 2 branches, after this patch.

This was a bug triggered by an recent patch, working around the HDAA
crashing on bogus data, and that patch having incorrect logic.

From: magnum Sent: Wednesday, April 17, 2013 15:28
>I realize now it *should* load without changing john.conf provided
>you say --format=dynamic_1007, which you tried... this may be a bug.
>Jim?



Download attachment "JtR_unstable_Dynamic_bare_hash_fix.patch" of type "application/octet-stream" (2159 bytes)

Download attachment "JtR_bleed_Dynamic_bare_hash_fix.patch" of type "application/octet-stream" (2105 bytes)

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.