From owner-freebsd-security Sat May 29 16:20:13 1999 Delivered-To: freebsd-security@freebsd.org Received: from frmug.org (frmug-gw.frmug.org [193.56.58.252]) by hub.freebsd.org (Postfix) with ESMTP id BE5A214ED6 for ; Sat, 29 May 1999 16:20:01 -0700 (PDT) (envelope-from roberto@keltia.freenix.fr) Received: (from uucp@localhost) by frmug.org (8.9.1/frmug-2.3/nospam) with UUCP id BAA04350 for security@FreeBSD.ORG; Sun, 30 May 1999 01:19:58 +0200 (CEST) (envelope-from roberto@keltia.freenix.fr) Received: by keltia.freenix.fr (Postfix, from userid 101) id CB62387AE; Sun, 30 May 1999 00:02:48 +0200 (CEST) (envelope-from roberto) Date: Sun, 30 May 1999 00:02:48 +0200 From: Ollivier Robert To: security@FreeBSD.ORG Subject: Re: System beeing cracked! Message-ID: <19990530000248.A6429@keltia.freenix.fr> Mail-Followup-To: security@FreeBSD.ORG References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii User-Agent: Mutt/0.95.5i In-Reply-To: ; from Paul Hart on Sat, May 29, 1999 at 10:19:38AM -0600 X-Operating-System: FreeBSD 4.0-CURRENT/ELF ctm#5322 AMD-K6 MMX @ 200 MHz Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org According to Paul Hart: > non-DES crypt replacements used in various UNIX versions, such as > FreeBSD's MD5 and OpenBSD's Blowfish, and uses hand-optimized assembly So does Crack 5.0a, I know, I gave Alec the pointers to it because he told me that he was a Linux guy but wanted to support our scheme :-) OpenBSD is not supported though because Crack was out before they implemented it. > It is probably the best overall password cracker available, in my opinion. I've not looked at JtR recently but I like the rule-based way of doing things used in Crack. -- Ollivier ROBERT -=- FreeBSD: The Power to Serve! -=- roberto@keltia.freenix.fr FreeBSD keltia.freenix.fr 4.0-CURRENT #71: Sun May 9 20:16:32 CEST 1999 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message