|
Message-ID: <20120705053103.GE16484@openwall.com> Date: Thu, 5 Jul 2012 09:31:03 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: John the Ripper 1.7.9-jumbo-6 On Wed, Jul 04, 2012 at 03:10:53PM -0400, Brad Tilley wrote: > > ...some have > > unreasonable expectations on what's possible judging by speeds for other > > hash types achieved with other tools... > > I've found this to be true for some users. They'll have a fast GPU card > and they'll see it do hundreds of millions of plain MD5 hashes a second > using some other password cracking software, then they'll get some OpenBSD > Blowfish hashes and run them through JtR and wonder why JtR is so slow in > comparison. Yes, although in the OpenNet thread this time it was trickier: someone expected that AMD cards would always be a lot faster than NVIDIA at password cracking, because they usually are, for good reasons. However, for SHA-512 this isn't the case, at least so far - not only for JtR, but also for hashcat. > It's just a basic lack of understanding. Perhaps a wiki page would be > appropriate to help user expectations be inline with reality? If that's an > acceptable idea, I'd be glad to write a rough first draft provided one > does not already exist. Please feel free to write that wiki page. We don't have one yet. That would be a welcome contribution. Thank you! Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.