Package: apg Version: 2.2.3.dfsg.1-5+b2 Severity: normal Tags: security
Hey. I was thinking about a number of security concernts, and since I'm no expert, maybe someone else has an idea: 1) Attack on pronouncable passwords? Via https://en.wikipedia.org/wiki/Random_password_generator#Stronger_methods I've stumbled over: Ganesan, Ravi; Davies, Chris (1994). "A New Attack on Random Pronounceable Password Generators" http://csrc.nist.gov/publications/history/nissc/1994-17th-NCSC-proceedings-vol-1.pdf and http://www.andrew.cmu.edu/user/nicolasc/publications/Shay-SOUPS12.pdf The former seems to be an attack on what I guess apg is dowing when -a 0? So maybe, if that is real, one should warn against using -a 0? 2) Are symbolls well distributed? The following is really absolutely NOT solid, and probably just stupid perception of mine For many years now I've used: APG_PARM="-c /dev/urandom -a 1 -M SNCL -m 32 -x 32" and I kinda always had the impression that special symbols are way over-represented, e.g. 6^20:#;$0dZw7%AWM{@rVX']TK2q3(kX IHxb*Yse?^@Kx[kZhxJp;4nOPCRxfhe( ty%'a}U{+A)@>r|4;_#$yP^9[ZVXLTN< 5Fz_0.&_rK2+[3vBC0IRODQD5B]M#T9u m#_dRg@x@)\mgbbz57,.||(!g5D`R={d ++4v%Ozl3Ae[e<y0|;W^\\!*zjzW@iFY I had a *very brief* look over the code and couldn't find anything obvious, that would cause troubles in the random distribution, but again it was *very brief* and I'm all but an expert. I tried to do some poor-man testing via something like: apg -n 10000 -a 1 -M SNCL -m 32 -x 32 | sed "s/\(.\)/\1\n/g" | sort | uniq -c | sort -k 2 But that seems to show that each symbol gets a similar share when the numbers are large enough. So probably my whole point (2) is rubbish, anyway, some expert may have more insight. Cheers, Chris.