| 
  | 
Message-ID: <20130210002752.GA29065@openwall.com>
Date: Sun, 10 Feb 2013 04:27:52 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: SSHA-512 supported?
Jon -
On Fri, Feb 08, 2013 at 03:24:52PM -0500, Jon Schipp wrote:
> I have a salted SHA-512 hash that I'm having trouble cracking, it's from an
> AIX 5.3 OS, using their Pluggable Authentication Modules.
> The /etc/security/passwd file has account information in stanzas:
> 
> test:
>         password =
> {ssha512}06$aXayEJGxA02Bl4d2$TWfWx34oD.UjrS/Qtco6Ij2XPY1CPYJfdk3CcxEjnMZvQw2p5obHYH7SI2wxcJgaS9.S9Hz948R.GdGwsvR...
Can you run these commands on your AIX and post their output, please?
time perl -e '$p = "{ssha512}04$................"; print crypt("", $p), "\n"; for ($n = 0; $n < 100000; $n++) { $c = crypt($n, $p); print "$n $c\n" if ($c =~ /\.\.\.[^\$]*$/); }'
time perl -e '$p = "{ssha512}06$................"; print crypt("", $p), "\n"; for ($n = 0; $n < 100000; $n++) { $c = crypt($n, $p); print "$n $c\n" if ($c =~ /\.\.\.[^\$]*$/); }'
time perl -e '$p = "\$6\$................"; print crypt("", $p), "\n"; for ($n = 0; $n < 100000; $n++) { $c = crypt($n, $p); print "$n $c\n" if ($c =~ /\.\.\.[^\$]*$/); }'
In case there are any issues with shell escaping here, please run the
commands in bash (I tested the last of the three in bash on Linux).
These commands may take a few minutes to complete (about 6 minutes for
the last command here).
I am interested in both output from the Perl one-liners and the output
from "time" (duration and CPU usage).  If possible, run these under no
or light other load.
I am hoping that AIX's custom algorithm is available via crypt(3) and
thus via Perl's crypt() as well, but I am not sure of that.  If this
fails, we'll have to look for the right function to call...
Thanks,
Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.