Skip to content

AlekseyCherepanov/john-devkit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

john-devkit

john-devkit is an advanced code generator for John the Ripper. It aims to separate crypto primitives (sha-512, md5, crypt, pbdkf2 and so on), optimizations (interleave, loop unrolling, round reversing, bitslice and so on) and output for different computing devices (cpu, sse, gpu, fpga).

john-devkit uses its own domain specific language (dsl) on top of Python to describe crypto algorithms in an abstract way. Also there is a kind of instruction language for intermediate representation (referenced as "bytecode"). So there are two levels of code generation: dsl -> intermediate representation -> platform's language (for instance C for cpu).

"bytecode" is a wrong word for the intermediate language/representation and will be fixed in code someday.

Current State

The current implementation is a Proof of Concept.

There is no documentation for dsl and intermediate. It is not obvious how many times everything will be changed drastically.

There is a draft of hash parsing library by Alexander Cherepanov. It is not finished (and works by pure luck). It is included into john-devkit but it will be removed when the library become a persistent part of John the Ripper.

Usage

To run john-devkit, you need

  • john-devkit in john-devkit-dirty/ directory
  • working folder john-devkit-temp/ as sibling to john-devkit-dirty/
  • John the Ripper in john-devkit-temp/JohnTheRipper/
  • run john's ./configure (and make optionally)
  • parsing_plug.c and parsing.h in john-devkit-temp/JohnTheRipper/src/ (symlinks or real files)

Then the following will work:

...john-devkit-temp$ sh ../john-devkit-dirty/run_format_raw.sh sha256

After the first run (for each format), you need to cd into JohnTheRipper/src/ , rerun ./configure script (otherwise you'll get "Unknown ciphertext format name requested") and rerun the command.

Calling format_abstract_all.py can give various formats. It is tricky though because it does not work with run_format_raw.sh and may require changes to enable or disable certain formats.

Files layout

algo_*.py are abstract definitions of crypto primitives written in DSL.

bytecode_main.py is the main library to transform intermediate representation.

bytecode_*.py are other files with filters for intermediate representation.

format_abstract_all.py is a big mess with code to generate and test ~100 formats for john. TODO: split the file.

format_john_*.py are other config files to output certain formats for john.

format_*.py are config files to produce other output files (1 hash algo per file usually).

lang_main.py and lang_spec.py contain support code for DSL.

LICENSE.jtr contains license agreement of John the Ripper (doc/LICENSE from John the Ripper).

output_c.py is the main library to output C code.

parsing.h and parsing_plug.c are a draft of library to parse hashes by Alexander Cherepanov.

README.md is this readme file.

run_format_raw.sh is a script to call format_john_*.py quickly for "raw" formats, call disassembler and count instructions/size of crypt_all() method.

slides_*.src.org are textual source files of slides for talks. See below.

t_raw.c is a C template for "raw" formats. It contains padding and byteswap for endianity fix. It is derived from code of John the Ripper. See below about its license.

t_* are other templates.

util_*.py are miscellaneous library files.

Slides for PHDays V, 2015

Benchmarks demonstrated at PHDays V are quite inaccurate: raw-sha256 and raw-sha224 are more likely to be only 12% over John the Ripper's speed.

Source file of slides for talk about john-devkit at PHDays V is in slides_2015-05-26_phdays_v.src.org.

The slides contain code example from Keccak (from JohnTheRipper/src/KeccakF-1600-unrolling.macros) and code example from NetBSD's libcrypt (from here). Everything else is under the following license:

Copyright © 2015 Aleksey Cherepanov <lyosha@openwall.com>

Redistribution and use in source and binary forms, with or without modification, are permitted.

Code examples are between >>>> and <<<< . # in text is quoted with \: so \#include is for plain #include.

TODO: a link to .pdf file, a script to compile slides.

Slides for PHDays VI, 2016

Source file of slides for talk about john-devkit at PHDays VI is in slides_2016-05-17_phdays_vi.src.org. The code example is in simple_example.py.

TODO: a link to .pdf file.

Usage without John the Ripper

The idea to write a hash algo in Python and get optimized C code is very attractive. But there are limitations with john-devkit: john-devkit is not suitable for regular applications. It is a really bad idea to use john-devkit in most cases. Please use standard/good libraries for hashing; for instance Argon2 (see Password Hashing Competitions), yescrypt or phpass for php.

It is possible to separate john-devkit and John the Ripper (use custom C template, fix output in output_c.py for some instructions that depend on pseudo_intrinsics.h and/or johnswap.h or pull the headers into your application if the licenses permit).

Optimizations in john-devkit rely onto high parallelism of attacker's position, so john-devkit is rather useless if you would like to hash just 1 candidate at a time.

Also it should be easier to implement and optimize 1 hash algo manually than using john-devkit (at least at the moment). john-devkit will benefit mostly from its scale: 200+ formats are still to be implemented.

There is a totally "no-no" thing for regular applications: john-devkit does not care about security, there are no defensive tricks, for instance john-devkit does not prevent information disclose through timings, so produced code is weak against a range of attacks.

License

Currently, files generated by john-devkit are subject for original license of John the Ripper. See below.

Each file in john-devkit has its license written in a comment close to the beginning of the file. Usually it is the following cut-down BSD license: Redistribution and use in source and binary forms, with or without modification, are permitted.

Some (template) files are derived from files of John the Ripper. They are subject for original license of John the Ripper. See LICENSE.jtr in john-devkit or doc/LICENSE in John the Ripper.

Other approaches

While john-devkit may be viewed as a compiler, code generation is not the only way to achieve modularity without penalty on speed and john-devkit is not the only way to perform code generation.

Incomplete list of approaches/implementations, just to name a few:

John the Ripper already has dynamic formats: separate crypto primitives could be combined at runtime without speed penalties due to work on optimal packs of candidates (attacker's position implies parallelism).

John the Ripper's bitslice implementation of descrypt supports easy configuration of output instructions through sets of macros. Even more, it may produce interleaved code including mix of vector and scalar instructions.

Billy Bob Brumley demonstrated application of simulated annealing algorithm to scheduling of des s-box instructions. It was considered possible to achieve 10% speed up over gcc modifying scheduling for specific cpu (though gcc is improved fast so the gap should be smaller).

Roman Rusakov researched and developed the way to generate current formulas for des s-boxes used in John the Ripper (and some others hash crackers). Formulas were sorted by length and then by latency on different processors (so different formulas are used depending on platform). The problem of getting formulas is like in VLSI but optimization criteria is a bit different because levels of circuit does directly affect performance as of we are limited by number of registers while use of memory is slow.

NetBSD's libcrypt uses X-Macro technique to make hmac-sha1 from hmac template and SHA-1 primitives.

liborc: "Orc is a just-in-time compiler implemented as a library and set of associated tools for compiling and executing simple programs that operate on arrays of data. Orc is unlike other general-purpose JIT engines: the Orc bytecode and language is designed so that it can be readily converted into SIMD instructions. This translates to interesting language features and limitations: Orc has built-in capability for SIMD-friendly operations such as shuffling, saturated addition and subtraction, but only works on arrays of data."

GCC now has support for OpenACC (via -fopenacc). So code can be easily converted into accelerated.

OpenCL and CUDA provide specialized languages for parallel computing.

These approaches have limitations. They are too low level, too implicit/smart, too inflexible, does not support multiple targets, know nothing about John the Ripper and/or neglect opportunity to get speed increasing compilation time. Also bitslice usually is not supported while it is an important optimization technique for some crypto algorithms. Nevertheless john's dynamic formats are a tough competitor on cpu (john-devkit will not replace it anyway due to runtime capabilities of dynamic formats, though it would be possible to generate primitives for dynamics if john-devkit outperformed current implementation).

About

advanced code generator for John the Ripper

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages