[PATCH] Add support for XKCD-style wordlist passwords

Matthieu Weber mweber at free.fr
Wed Oct 31 09:38:16 CET 2018


On Tue, 30 Oct 2018 at 08:01PM +0100, Kjetil Torgrim Homme wrote:
> Den 30. okt. 2018 12:10, skreiv Matthieu Weber:
> > On Tue, 30 Oct 2018 at 10:33AM +0100, Kjetil Torgrim Homme wrote:
> >> yes, but sometimes you need to enter this password by hand.  I use horse
> >> battery passwords when I might need to enter the password on a mobile
> >> phone or on a console in a chilly data centre in the middle of the
> >> night.  both of these will often have problems with strange characters
> >> or keyboard layouts (is "&" on Shift 6 or Shift 7?  since there is often
> >> no echo, there is no way to be sure!)
> > 
> > So you want passwords that are easy to type: generate passwords that are
> > made entirely of lowercase letters, all you need is 40% more characters
> > to have the same entropy as a password made of alphanumerics+symbols
> > i.e., 11 characters instead of 8. They will be easy enough to type even
> > on exotic keyboards, and can be generated using only tools that pass
> > uses already. All you need is to add to “pass generate” an option to
> > reduce $CHARACTER_SET to [:lower:].
> 
> it is not easy to type wahseepienoofac on a mobile phone, IMHO.  but
> adding periods (not hyphens!  the key moves around) will help - not for
> entropy, but to make it easier to read and track how far I've gotten:
> 
>   wah.see.pie.noo.fac

What about whitespace instead of periods? The period may be located on
an awkward key on some keyboard layout, but (I hope) the spacebar is
universal.

> (I just realised I am lucky that I never have qwertz or azerty in my
> environment...  that would reduce the number of available letters to 21,
> ertuiop/sdfghjkl/xcvbnm, by my count.  digits, comma and period brings
> the total to 33.)

If you consider that you cannot trust the letters printed on the
keyboard's keys to know how to type a given character, then you are
totally screwed if someone is using dvorak, colemak, bépo, neo, das… you
won't be able to have a single usable character for your passphrases :(

> >> average length of 13 characters.  this doesn't really help entropy,
> >> though.  489533 distinct words give 18.9 bits of entropy each, so the
> >> above pass phrases (of four words) have 75 bits, or 5.74e+22.  still not
> >> a huge amount, but the attacker would have to know that this is the
> >> method I use to make pass phrases to successfully reduce his search space.
> > 
> > You can get 75 bits of entropy with 16 lowercase letters or 14
> > mixed-case letters. That is surely easier to type than your example.
> 
> it really depends on your keyboard and brain :-)

True. But then again, if you trust the way the password is hashed on the
remote system, you can allow for a much shorter password, as the hashing
algorithm will slow down an attacker to the equivalent of a dozen bits
of entropy.

Matthieu
-- 
 (~._.~)            Matthieu Weber - mweber at free.fr              (~._.~)
  ( ? )                http://weber.fi.eu.org/                    ( ? ) 
 ()- -()          public key id : 0x85CB340EFCD5E0B3             ()- -()
 (_)-(_) "Humor ist, wenn man trotzdem lacht (Otto J. Bierbaum)" (_)-(_)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.zx2c4.com/pipermail/password-store/attachments/20181031/6b0c5859/attachment.asc>


More information about the Password-Store mailing list