Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20110627092918.GA5300@openwall.com>
Date: Mon, 27 Jun 2011 13:29:18 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: brute force attack of an Unix crypt

Martin -

On Mon, Jun 27, 2011 at 02:06:27AM +0300, Martin T wrote:
> Checking the CPU usage of my 4-core Xeon X3220(4x 2.4GHz) processor, I
> found out, that I had started an brute force attack at the beginning
> of February(!). I had dedicated an entire CPU core for this process:

Oh, if you deliberately only dedicated one CPU core for this, then
please disregard my suggestion to use an OpenMP-enabled build.  But do
use a more optimal build otherwise - perhaps with the
john-1.7.8-fast-des-key-setup-3.diff patch and using the linux-x86-64
make target.  It will do around 2.7 million c/s on one CPU core, and it
supports the Idle setting (unlike an OpenMP-enabled build).

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.