#[1]prev [2]next [3]up [4]Atom

[5]leah blogs

  [6]« 32, 040, 0x20, 0b100000 [7]October 2019 [8]Merry Christmas! »

09oct2019 · [9]Ken Thompson's Unix password

  Somewhere around 2014 I found an [10]/etc/passwd file in some dumps of
  the BSD 3 source tree, containing passwords of all the old timers such
  as Dennis Ritchie, Ken Thompson, Brian W. Kernighan, Steve Bourne and
  Bill Joy.

  Since the DES-based [11]crypt(3) algorithm used for these hashes is
  well known to be weak (and limited to at most 8 characters), I thought
  it would be an easy target to just crack these passwords for fun.

  Well known tools for this are [12]john and [13]hashcat.

  Quickly, I had cracked a fair deal of these passwords, many of which
  were very weak. (Curiously, bwk used /.,/.,, which is easy to type on a
  QWERTY keyboard.)

  However, kens password eluded my cracking endeavor. Even an exhaustive
  search over all lower-case letters and digits took several days (back
  in 2014) and yielded no result. Since the algorithm was developed by
  Ken Thompson and Robert Morris, I wondered what’s up there. I also
  realized, that, compared to other password hashing schemes (such as
  NTLM), crypt(3) turns out to be quite a bit slower to crack (and
  perhaps was also less optimized).

  Did he really use uppercase letters or even special chars? (A 7-bit
  exhaustive search would still take over 2 years on a modern GPU.)

  The topic [14]came up again earlier this month on [15]The Unix Heritage
  Society mailing list, and I [16]shared my results and frustration of
  not being able to break kens password.

  Finally, today this secret [17]was resolved by Nigel Williams:
From: Nigel Williams <[email protected]>
Subject: Re: [TUHS] Recovered /etc/passwd files

ken is done:

ZghOT0eRm4U9s:p/q2-q4!

took 4+ days on an AMD Radeon Vega64 running hashcat at about 930MH/s
during that time (those familiar know the hash-rate fluctuates and
slows down towards the end).

  This is a chess move in [18]descriptive notation, and the beginning of
  [19]many common openings. It fits very well to Ken Thompson’s
  [20]background in computer chess.

  I’m very happy that this mystery has been solved now and I’m pleased of
  the answer.

  [Update 16:29: fix comment on chess.]

  NP: Mel Stone—By Now


   Copyright © 2004–2019 [21]Leah Neukirchen

References

  1. https://leahneukirchen.org/blog/archive/2019/08/32-040-0x20-0b100000.html
  2. https://leahneukirchen.org/blog/archive/2019/12/merry-christmas.html
  3. https://leahneukirchen.org/blog/archive/2019/10.html
  4. https://leahneukirchen.org/blog/index.atom
  5. https://leahneukirchen.org/blog/
  6. https://leahneukirchen.org/blog/archive/2019/08/32-040-0x20-0b100000.html
  7. https://leahneukirchen.org/blog/archive/2019/10.html
  8. https://leahneukirchen.org/blog/archive/2019/12/merry-christmas.html
  9. https://leahneukirchen.org/blog/archive/2019/10/ken-thompson-s-unix-password.html
 10. https://github.com/dspinellis/unix-history-repo/blob/BSD-3-Snapshot-Development/etc/passwd
 11. https://minnie.tuhs.org/cgi-bin/utree.pl?file=V7/usr/man/man3/crypt.3
 12. https://www.openwall.com/john/
 13. https://hashcat.net/wiki/
 14. https://inbox.vuxu.org/tuhs/tqkjt9nn7p9zgkk9cm9d@localhost/T/#m160f0016894ea471ae02ee9de9a872f2c5f8ee93
 15. https://www.tuhs.org/
 16. https://inbox.vuxu.org/tuhs/87bluxpqy0.fsf@vuxu.org/
 17. https://inbox.vuxu.org/tuhs/CACCFpdx_6oeyNkgH_5jgfxbxWbZ6VtOXQNKOsonHPF2[email protected]/
 18. https://en.wikipedia.org/wiki/Descriptive_notation
 19. https://en.wikibooks.org/wiki/Chess_Opening_Theory/1._d4
 20. https://www.chessprogramming.org/index.php?title=Ken_Thompson
 21. mailto:[email protected]