Re: SSL Challenge #2
Is there a standard way we're supposed to get together to divvy up the keyspace? Not knowing of any, I'll just announce that I'm working on those keys that start with "a", from 0xafffffffff down to 0xa000000000. I seem to be getting about 200000 to 400000 keys/sec, so it should take about another 2 days (assuming the machines stay up that long...). If anyone wants to join in, feel free. Get original source from http://pauillac.inria.fr/~doligez/ssl/slave.c (Damien's code), and patch it with the diff at the bottom. Note: I don't think there's any crypto in the diff, and the rest of the sources are in France, so this should be OK with the spooks. But you never know... Compile the patched source on anything you can get, and run ./slave -t -d csclub.uwaterloo.ca 9114 The IP is 129.97.134.11 if you need it. You can add -v or -V for more verbosity, and -n num if you have num processors. - Ian "REALLY hoping I didn't screw up the code..." --- dist/slave.c Thu Aug 17 15:19:52 1995 +++ slave.c Sat Aug 19 13:54:25 1995 @@ -297,18 +297,18 @@ register int i; /* set up the block of data */ -#define x0 0xb894890e -#define x1 0x2eb90ebf - x2 = 0x00074450 + ((~stpoint << 4) & 0xff000000); -#define x4 0xa784af30 -#define x5 0x6913f879 -#define x6 0x539b2520 -#define x7 0x75ae60a0 -#define x8 0x90ebbf51 -#define x9 0xe10c2cf8 -#define x10 0x11ac18ea -#define x11 0x2114834c -#define x12 0x000080b6 +#define x0 0x9109c0fb +#define x1 0x15a61060 + x2 = 0x00368f3f + ((~stpoint << 4) & 0xff000000); +#define x4 0x7bea0730 +#define x5 0x61eb659d +#define x6 0x7441bbfa +#define x7 0x5f3a45e8 +#define x8 0x38e6d5c6 +#define x9 0xa1a88cd6 +#define x10 0xf82ecaae +#define x11 0x0296e2c8 +#define x12 0x000080a4 #define x13 0x00000000 #define x14 0x00000188 #define x15 0x00000000 @@ -506,7 +506,7 @@ int w; strcpy (progname, "worker"); - nice (40); + nice (5); while (1){ sock = open_socket (); if (sock == -1){ @@ -547,7 +547,11 @@ Verb1 ("SIGCHLD received\n"); while (1){ +#if 0 pid = wait3 ((void *) &chldstat, WNOHANG, NULL); +#else + pid = waitpid ((pid_t)-1, (void *) &chldstat, WNOHANG); +#endif if (pid <= 0) break; Verb2 ("got child: %ld\n", pid); for (i = 0; i < nproc; i++){ @@ -610,6 +614,7 @@ } } if (!ignore_ttys){ /* then look at ttys */ +#if 0 d = opendir ("/dev"); if (d == NULL) fatal ("opendir"); while (1){ @@ -629,6 +634,7 @@ } } if (errno) fatal ("readdir"); +#endif } } @@ -901,7 +907,7 @@ if (entry == NULL) fatal ("gethostbyname"); memcpy (&serverhost, entry, sizeof (serverhost)); - sanity_check (); + /* sanity_check (); */ speed_test (); init_devices (); supervisor ();
-----BEGIN PGP SIGNED MESSAGE-----
Is there a standard way we're supposed to get together to divvy up the keyspace? Not knowing of any, I'll just announce that I'm working on those keys that start with "a", from 0xafffffffff down to 0xa000000000.
Thought the idea was to demonstrate how FAST we could all do this together, rather than how SOON. 'Course, I could be wrong ... -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMDZoYYQO/w1Q7FIdAQG9FQP/ed4ZZrL5L1drbLb7pYGoxdSoL3GJ3m09 nxq3IK82ItCftC5l5/AlU324DpeSr4ZyXFTs0SrfpqGaX4EqDTqac40MWSjCpIGG 8+ROsVFx4sJJJwBeXgy0yIJU3hh67I/fT2DUhqJXtxB5yroHF8X2go51rVLFNmwd lNI8v42bWvw= =vokW -----END PGP SIGNATURE----- -- The Checkered Daemon cdaemon@goblin.punk.net
participants (2)
-
Checkered Daemon -
Ian Goldberg