Home page logo
/

oss-sec logo oss-sec mailing list archives

testing pwqgen
From: Solar Designer <solar () openwall com>
Date: Fri, 27 Jan 2012 05:18:01 +0400

Hi,

I think we can and should use this list not only for discussing actual
vulnerabilities, but also for sharing information on what was audited,
tested, etc. even if found not vulnerable.  Such information may be
helpful too.

In light of the pwgen vulnerability:

http://www.openwall.com/lists/oss-security/2012/01/17/5
http://www.openwall.com/lists/oss-security/2012/01/19/24
http://www.openwall.com/lists/oss-security/2012/01/22/6

I also tested our pwqgen (part of passwdqc) for (lack of) a similar
issue.  Testing was easy with low random=... settings (like for 1 or 2
words), but I also wanted to test with our default settings (no options
on pwqgen's command line at all, which means 47 bits of randomness).

I happened to generate 466896327 such passwords (or phrases) until I
interrupted the script.  Out of them, 779 appear twice and none more
than two times.  Thus, 466895548 are unique.

For uniform distribution, the expectation is that we'll have about
466895552.5 unique passwords, or about 774.5 duplicates.  The test
results match this pretty closely.

Of course, this heavily depends on the quality of /dev/urandom.  I did
my testing on the same system where I had tested pwgen.  This is an
8-core machine running Linux 2.6.18-274.3.1.el5.028stab094.3.owl1 (an
Owl revision/build of a RHEL5 branch OpenVZ kernel) for x86_64.

Alexander


  By Date           By Thread  

Current thread:
  • testing pwqgen Solar Designer (Jan 27)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault