Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID:
 <QB1PR01MB3267D1D5DA091A643CB1B3C1D494A@QB1PR01MB3267.CANPRD01.PROD.OUTLOOK.COM>
Date: Fri, 22 Dec 2023 20:16:33 +0000
From: Jason Keltz <jas@...ku.ca>
To: "john-users@...ts.openwall.com" <john-users@...ts.openwall.com>
Subject: Re: john jumbo 1.9.0 and yscrypt support

Hi Alexander,

This makes so much more sense. Thanks for explaining that. It's very helpful.  That being said, I compiled my own later version of libxcrypt on RHEL8, but can't seem to find an easy way to tell the compiler about it. Is there an option I can pass to configure ? Would this solve the problem ? Or not possible on RHEL8 at all?

Thanks again!!

Jason.



________________________________
From: Solar Designer <solar@...nwall.com>
Sent: Friday, December 22, 2023 11:08 AM
To: john-users@...ts.openwall.com <john-users@...ts.openwall.com>
Subject: Re: [john-users] john jumbo 1.9.0 and yscrypt support

Hi Jason,

On Fri, Dec 22, 2023 at 03:25:22PM +0000, Jason Keltz wrote:
> I'm trying to use John 1.9.0 jumbo with yescrypt support.
> I've compiled it on a RHEL8 system, and I know that RHEL8 doesn't use yescrypt for its own passwords, but it doesn't really matter.

Unfortunately, it does matter that RHEL8's version of libxcrypt lacks
yescrypt support.  Currently, John the Ripper only supports yescrypt via
the underlying system's crypt(3) or crypt_r(3) functions.

> The sample file I'm experimenting with has username:yescrypt hash.
> I see that there's a "yescrypt" directory inside the source folder.  I see that yescrypt is compiled as part of John.
> I can even run src/yescrypt/test and it does a bunch of successful tests!

Right, but the rest of John the Ripper jumbo tree currently only uses
that code to provide scrypt, not yescrypt.

> However, when I try to use the newly compiled john tool with yescrypt hashes, I get:
>
> Warning: hash encoding string length 75, type id $y
> appears to be unsupported on this system; will not load such hashes.

Right.  We should indeed improve our code.  We have an open issue here:

https://github.com/openwall/john/issues/4621

For now, you need a system with newer libxcrypt, such as RHEL9 (or its
rebuilds), Fedora 29+, Ubuntu 20.04+, Debian 11+.

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.