Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120705053103.GE16484@openwall.com>
Date: Thu, 5 Jul 2012 09:31:03 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: John the Ripper 1.7.9-jumbo-6

On Wed, Jul 04, 2012 at 03:10:53PM -0400, Brad Tilley wrote:
> > ...some have
> > unreasonable expectations on what's possible judging by speeds for other
> > hash types achieved with other tools...
> 
> I've found this to be true for some users. They'll have a fast GPU card
> and they'll see it do hundreds of millions of plain MD5 hashes a second
> using some other password cracking software, then they'll get some OpenBSD
> Blowfish hashes and run them through JtR and wonder why JtR is so slow in
> comparison.

Yes, although in the OpenNet thread this time it was trickier: someone
expected that AMD cards would always be a lot faster than NVIDIA at
password cracking, because they usually are, for good reasons.  However,
for SHA-512 this isn't the case, at least so far - not only for JtR, but
also for hashcat.

> It's just a basic lack of understanding. Perhaps a wiki page would be
> appropriate to help user expectations be inline with reality? If that's an
> acceptable idea, I'd be glad to write a rough first draft provided one
> does not already exist.

Please feel free to write that wiki page.  We don't have one yet.

That would be a welcome contribution.

Thank you!

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.