From: Ryan Russell/SYBASE <Ryan.Russell@sybase.com>
To: cypherpunks <cypherpunks@sybase.com>
Message Hash: dde50a3f1ea27731ca36433668af11f662baed9ac02144831c2ae89d4c3ead53
Message ID: <9608171503.AA17207@notesgw2.sybase.com>
Reply To: N/A
UTC Datetime: 1996-08-17 17:22:50 UTC
Raw Date: Sun, 18 Aug 1996 01:22:50 +0800
From: Ryan Russell/SYBASE <Ryan.Russell@sybase.com>
Date: Sun, 18 Aug 1996 01:22:50 +0800
To: cypherpunks <cypherpunks@sybase.com>
Subject: Re: Unix passwd-cracker online?
Message-ID: <9608171503.AA17207@notesgw2.sybase.com>
MIME-Version: 1.0
Content-Type: text/plain
I've given this some thought before, and there are some optimizations
required...
First of all, assuming you have one plaintext password
for every crypt()'d combo and salt (I think there are actually
a bunch of possible plaintexts for each encryption, but I'll assume
that we'll save the one that looks most like an english somethingorother
as any of them should work.)
If you just sort them, you only need to store the 8 char plaintext,
which helps with the storage, and halves it approximatly (a little more,
actually.) Now...Still too much sotrage for one system, but
if we had a network of machines around the Internet, with multi-gig
tape changers (i've seen 40GB changer things a discount places for $1000)
I figure DNS could server as a way of reaching the system that has the range
you want..say we have maxhines named xJG*a.crackcrypt.com, with a leading
letter on each hostname, followed by enough characters to represent how
much of a range that system holds.
I don't have a back of the envelop handy, and it's too early in the morning...so
I'll do the calc later.
But, for a small fee, anything can be arranged :)
Ryan
The real problem becomes regeneration when someone's tape
goes corrupt....
---------- Previous Message ----------
To: al177820
cc: cypherpunks
From: wmono @ Direct.CA (William Ono) @ smtp
Date: 08/17/96 01:27:53 AM
Subject: Re: Unix passwd-cracker online?
On Fri, 16 Aug 1996, Carlos L. Mariscal may have written:
> person has obtained a specific password by entering the desired
> adresses'passord on a submnit form in a Web page.
[deletia]
> never have it if there really is such, but this came to my mind when i read
> the posts on the plate-numbers-in-Oregon polemica. I would appreciate
Somehow I have a hard time believing this to be true. I run crack, a
password searching program that uses a dictionary as its base, on my
/etc/passwd regularly to locate any users with easily guessed entries.
With ultra fast crypt (UFC), the fastest crypt() replacement I can find, I
can run through about 9700 passwords per second on this P6-150.
Now, this is a back-of-the-envelope calculation: Assuming that the
password can be one to eight characters of the following:
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890!@#$%^&*()
we find that we have a set of 72 characters. That gives us
72^8 + 72^7 + 72^6 + 72^5 + 72^4 + 72^3 + 72^2 + 72^1 or
732376025552520 possible combinations. At 9700 encryptions per second,
it would take my system 2401 years to brute force -one- password to
completion. That means that, most likely, if this 'locate password on
demand' system existed, it would not work in real time, or in any time
during any person's life. Moore's Law might shorten this timeframe
considerably, but still not to any reasonable time frame.
Continuing with my back-of-the-envelope estimate, we have the length of a
crypt()'d password as being 13 characters. The password in plaintext has
to follow, with a length of 8 characters. At a size of
732376025552520 * 21 characters, we would have a database of
15379896536602920 bytes, or 22565249 650mb CD-ROMs. That's for the
passwords of one salt, without any formatting. Even if we could achieve a
95% compression rate on this data (it is text, after all) we would end up
with 237528 CD-ROMs.
Most likely my set of characters will be found to be incorrect, but
anything that includes even a-z, A-Z, and 0-9 in one to eight character
combinations most likely will not be a favourable crack target.
Sorry, I don't think this is feasable, or possible.
(Please do correct my calculations if errors are detected, especially if
the corrected numbers make this possible.. it's getting late at night, and
my mind is fogging up, so these calculations/estimates/wild guesses may be
off more than usual. It does sound like an interesting project to
undertake, if it were possible, but not on my equipment!)
-- ** NOTE NEW KEY ** As of 08/28/95! Old key 0x2902B621 COMPROMISED!
William Ono <wmono@direct.ca> PGP Key: F3F716BD
fingerprint = A8 0D B9 0F 40 A7 D6 64 B3 00 04 74 FD A7 12 C9 = fingerprint
PGP-encrypted mail welcome! "640k ought to be enough for everybody."
Return to August 1996
Return to “Ryan Russell/SYBASE <Ryan.Russell@sybase.com>”
1996-08-17 (Sun, 18 Aug 1996 01:22:50 +0800) - Re: Unix passwd-cracker online? - Ryan Russell/SYBASE <Ryan.Russell@sybase.com>