|
Message-ID: <20101215214451.GA1884@openwall.com> Date: Thu, 16 Dec 2010 00:44:51 +0300 From: Solar Designer <solar@...nwall.com> To: Jon Oberheide <jon@...rheide.org> Cc: john-users@...ts.openwall.com Subject: Re: JtR/OpenMP against Gawker passwords Jon, On Wed, Dec 15, 2010 at 04:16:03PM -0500, Jon Oberheide wrote: > Many of the initial results were from some large wordlists and mangling > rules. BTW, you could want to see: http://www.openwall.com/lists/john-users/2010/12/15/3 Maybe you did not try the custom .chr file "trick" (a .chr file based on your already cracked passwords)? > I know others have been using the OpenMP patches on the Gawker > set as well. I'll try to convince my buddy to provide some JtR OpenMP > benchmarks on his 64-way box. Please do! In fact, it'd be great for him to add an entry here: http://openwall.info/wiki/john/benchmarks > > Benchmarking: Traditional DES [128/128 BS SSE2-16]... DONE > > Many salts: 20465K c/s real, 2562K c/s virtual > > Only one salt: 16003K c/s real, 1999K c/s virtual > > For reference, the benchmarked machine was a x86_64 Gentoo box with gcc > 4.5.1. Thanks! You could add that info to the wiki page above, too. I did benchmark a very similar machine, but it was under some unrelated load at the time. > > Apparently, this was with 1.7.6-omp-des-7. The slightly older > > 1.7.6-omp-des-4 patch, also available on the wiki, would do slightly > > better at "many salts" (relevant for the run against Gawker hashes), but > > a lot worse at "only one salt" (irrelevant in this case). > > Ah, nice, I didn't realize -4 was more effective on many-salts. I've just added a clarification to the wiki. > I could run the benchmarks with that patch if that would be desirable. That's up to you. > > It's also curious how the Gawker hashes have only 3844 different salts. > > Normally, for this number of hashes all possible salts would be present - > > that is, there would be exactly 4096 different salts. This suggests a > > poor random number generator, which in turn suggests that of the 3844 > > salts some likely correspond to a lot more hashes than some others. Thus, > > a more efficient attack could be mounted on a large subset of the hashes > > (but a much smaller subset of the salts) by using the "--salts" option. > > I found that very curious as well. I haven't dug into the Gawker's > leaked source code to see what they're were actually using for a > PRNG/crypt. That would be curious to know, but you don't have to. You can just use "--salts" (adjust its parameter) to get more passwords cracked sooner. > > What did you mean by this Twitter comment, though - "Bad JtR, why did > > you forget to load up a third of the hashes? Grrrr..."? Is this some > > kind of usability issue for me to address? > > That was my fault not realizing I had resumed an previous run. I suppose > the status text could be more verbose in terms of session resuming, but > that was a human error! :-P Yeah, "verbose mode" is on my to-do list for JtR. There are many things it could warn/remind about. Thanks, Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.