Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <BLU0-SMTP357DE02E1F204065E286FF7FDC90@phx.gbl>
Date: Tue, 31 Dec 2013 02:32:24 +0100
From: Frank Dittrich <frank_dittrich@...mail.com>
To: john-dev@...ts.openwall.com
Subject: Commit 66557876 (in May) broke raw-sha384, raw-sha512 and raw-sha512-ng-i

Jim, all,

I noticed that raw-sha384 and raw-sha512 only crack 1288 instead of the
expected 1500 hashes, alt least for linux-x86-64.

raw-sha512-ng still cracks 1500, but raw-sha512-ng-i is broken as well
(1288 cracks).

I bisected it and found this as the first bad commit.

commit 665578767df21514a7058db24d7fca07041fd8fd
Author: jimf <jfoug@....net>
Date:   Thu May 23 10:42:59 2013 -0500

    SSE added to raw-sha384/512 and some fixes to other raw SHA formats


I verified my findings by checking out commit
98bbfc4a3dbf86168f195114d975388d4d16f171, and indeed, raw-sha384,
raw-sha512 and raw-sha512-ng-i all work as expected, cracking 1500
passwords from test/rawsha384_tst.in or test/rawsha512_tst.in.


I reported the error in August (without bisecting it at that time), but
nobody cared:
http://www.openwall.com/lists/john-dev/2013/08/01/8
http://www.openwall.com/lists/john-dev/2013/08/02/4

Frank

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.