|
Message-ID: <20130427010026.GA30904@openwall.com> Date: Sat, 27 Apr 2013 05:00:26 +0400 From: Solar Designer <solar@...nwall.com> To: john-dev@...ts.openwall.com Subject: Re: revised incremental mode and charset files (was: Bleeding-jumbo branch updated from core) On Fri, Apr 26, 2013 at 11:27:36PM +0200, magnum wrote: > BTW I did some really quick'n'dirty tests comparing unstable and bleeding at exact same conditions (0x7e and 15, trained from rockyou and attacking a real dataset of 70,000 raw-md5 hashes for 60 seconds). Unstable was 1.5% faster in terms of c/s but bleeding cracked 2.5% more passwords despite that, from picking better candidates earlier. And that was before these latest changes :-) Thank you for testing this! I've just committed some further fixes to charset.c and inc.c, so can you merge these and re-test? I don't expect any surprises, but more testing won't hurt. Also, can you (or/and anyone else) test interrupting/restoring with the new incremental mode? Make sure it cracks the same passwords as a non-interrupted session would. Make sure it doesn't take significantly more time than a non-interrupted session would. 1 second lost per interrupt/restore is OK, more is suspicious. Thanks again, Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.