[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] testing pwqgen
From:       Solar Designer <solar () openwall ! com>
Date:       2012-01-27 1:18:01
Message-ID: 20120127011801.GA5887 () openwall ! com
[Download RAW message or body]

Hi,

I think we can and should use this list not only for discussing actual
vulnerabilities, but also for sharing information on what was audited,
tested, etc. even if found not vulnerable.  Such information may be
helpful too.

In light of the pwgen vulnerability:

http://www.openwall.com/lists/oss-security/2012/01/17/5
http://www.openwall.com/lists/oss-security/2012/01/19/24
http://www.openwall.com/lists/oss-security/2012/01/22/6

I also tested our pwqgen (part of passwdqc) for (lack of) a similar
issue.  Testing was easy with low random=... settings (like for 1 or 2
words), but I also wanted to test with our default settings (no options
on pwqgen's command line at all, which means 47 bits of randomness).

I happened to generate 466896327 such passwords (or phrases) until I
interrupted the script.  Out of them, 779 appear twice and none more
than two times.  Thus, 466895548 are unique.

For uniform distribution, the expectation is that we'll have about
466895552.5 unique passwords, or about 774.5 duplicates.  The test
results match this pretty closely.

Of course, this heavily depends on the quality of /dev/urandom.  I did
my testing on the same system where I had tested pwgen.  This is an
8-core machine running Linux 2.6.18-274.3.1.el5.028stab094.3.owl1 (an
Owl revision/build of a RHEL5 branch OpenVZ kernel) for x86_64.

Alexander
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic