All Projects → ulif → Diceware

ulif / Diceware

Licence: other
Passphrases to remember

Programming Languages

python
139335 projects - #7 most used programming language

Labels

Projects that are alternatives of or similar to Diceware

Pass Update
A pass extension that provides an easy flow for updating passwords.
Stars: ✭ 191 (-21.07%)
Mutual labels:  password
Ladon
大型内网渗透扫描器&Cobalt Strike,Ladon8.9内置120个模块,包含信息收集/存活主机/端口扫描/服务识别/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010/SMBGhost/Weblogic/ActiveMQ/Tomcat/Struts2,密码口令爆破(Mysql/Oracle/MSSQL)/FTP/SSH(Linux)/VNC/Windows(IPC/WMI/SMB/Netbios/LDAP/SmbHash/WmiHash/Winrm),远程执行命令(smbexec/wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
Stars: ✭ 2,911 (+1102.89%)
Mutual labels:  password
Two Factor Auth
Two Factor Authentication Java code implementing the Time-based One-time Password Algorithm
Stars: ✭ 225 (-7.02%)
Mutual labels:  password
Dcipher Cli
🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.
Stars: ✭ 193 (-20.25%)
Mutual labels:  password
Libreauth
LibreAuth is a collection of tools for user authentication.
Stars: ✭ 201 (-16.94%)
Mutual labels:  password
Hackers Tool Kit
Its a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram
Stars: ✭ 211 (-12.81%)
Mutual labels:  password
Zxcvbn4j
This is a java port of zxcvbn, which is a JavaScript password strength generator.
Stars: ✭ 188 (-22.31%)
Mutual labels:  password
Vault Secrets Gen
A Vault secrets plugin for generating high entropy passwords and passphrases.
Stars: ✭ 238 (-1.65%)
Mutual labels:  password
Pwdb Public
A collection of all the data i could extract from 1 billion leaked credentials from internet.
Stars: ✭ 2,497 (+931.82%)
Mutual labels:  password
Password Validator
Validates password according to flexible and intuitive specification
Stars: ✭ 224 (-7.44%)
Mutual labels:  password
Python Scripts
Collection of Various Python Script's.💻
Stars: ✭ 195 (-19.42%)
Mutual labels:  password
Filevaultcracker
macOS FileVault cracking tool
Stars: ✭ 199 (-17.77%)
Mutual labels:  password
React Native Smooth Pincode Input
A cross-platform, smooth, lightweight, customizable PIN code input component for React Native.
Stars: ✭ 216 (-10.74%)
Mutual labels:  password
Awesome Iam
👤 Identity and Access Management Knowledge for Cloud Platforms
Stars: ✭ 186 (-23.14%)
Mutual labels:  password
Cli Prompt
Allows you to prompt for user input on the command line, and optionally hide the characters they type
Stars: ✭ 228 (-5.79%)
Mutual labels:  password
Mysql Unsha1
Authenticate against a MySQL server without knowing the cleartext password
Stars: ✭ 191 (-21.07%)
Mutual labels:  password
Ad Password Protection
Active Directory password filter featuring breached password checking and custom complexity rules
Stars: ✭ 210 (-13.22%)
Mutual labels:  password
Hatch
Hatch is a brute force tool that is used to brute force most websites
Stars: ✭ 242 (+0%)
Mutual labels:  password
Oblivion
Data leak checker & OSINT Tool
Stars: ✭ 237 (-2.07%)
Mutual labels:  password
Passport Local
Username and password authentication strategy for Passport and Node.js.
Stars: ✭ 2,545 (+951.65%)
Mutual labels:  password

diceware

Passphrases to remember...

|bdg-build| | documentation <https://diceware.readthedocs.io/>_ | sources <https://github.com/ulif/diceware>_ | issues <https://github.com/ulif/diceware/issues>_

.. |bdg-build| image:: https://travis-ci.org/ulif/diceware.png?branch=master :target: https://travis-ci.org/ulif/diceware :alt: Build Status

.. |bdg-last-release| image:: https://img.shields.io/pypi/v/diceware.svg :target: https://pypi.python.org/pypi/diceware/ :alt: Latest Release

.. |bdg-versions| image:: https://img.shields.io/pypi/pyversions/diceware.svg :target: https://pypi.python.org/pypi/diceware/ :alt: Supported Python Versions

.. |bdg-license| image:: https://img.shields.io/pypi/l/diceware.svg :target: https://pypi.python.org/pypi/diceware/ :alt: License

.. |doc-status| image:: https://readthedocs.io/projects/diceware/badge/?version=latest :target: https://diceware.readthedocs.io/en/latest/ :alt: Documentation Status

diceware is a passphrase generator following the proposals of Arnold G. Reinhold on http://diceware.com . It generates passphrases by concatenating words randomly picked from wordlists. For instance::

$ diceware MyraPend93rdSixthEagleAid

The passphrase contains by default six words (with first char capitalized) without any separator chars. Optionally you can let diceware insert special chars into the passphrase.

diceware supports several sources of randomness (including real life dice) and different wordlists (including cryptographically signed ones).

.. contents::

Install

This Python package can be installed via pip_::

$ pip install diceware

The exact way depends on your operating system.

Usage

Once installed, use --help to list all available options::

$ diceware --help Create a passphrase

positional arguments: INFILE Input wordlist. `-' will read from stdin.

optional arguments: -h, --help show this help message and exit -n NUM, --num NUM number of words to concatenate. Default: 6 -c, --caps Capitalize words. This is the default. --no-caps Turn off capitalization. -s NUM, --specials NUM Insert NUM special chars into generated word. -d DELIMITER, --delimiter DELIMITER Separate words by DELIMITER. Empty string by default. -r SOURCE, --randomsource SOURCE Get randomness from this source. Possible values: realdice',system'. Default: system -w [NAME [NAME ...]], --wordlist [NAME [NAME]] Use words from this wordlist. Possible values: de',de_8k', en_adjectives',en_eff', en_nouns',en_orig', en_securedrop',pt-br'. Wordlists are stored in the folder displayed below. Default: en_eff -v, --verbose Be verbose. Use several times for increased verbosity. --version output version information and exit.

Arguments related to `realdice' randomsource: --dice-sides N Number of sides of dice. Default: 6

Wordlists are stored in

With -n you can tell how many words are supposed to be picked for your new passphrase::

$ diceware -n 1 Thud

$ diceware -n 2 KnitMargo

You can diceware additionally let generate special chars to replace characters in the 'normal' passphrase. The number of special chars generated can be determined with the -s option (default is zero)::

$ diceware -s 2 Heroic%unkLon#DmLewJohns

Here "%" and "#" are the special chars.

Special chars are taken from the following list::

~!#$%^&*()-=+[]{}:;"'<>?/0123456789

Please note that several special chars might replace the same original char, resulting in a passphrase with less special chars than requested.

With -d you can advise diceware to put a delimiter string between the words generated::

$ diceware -d "_" Wavy_Baden_400_Whelp_Quest_Macon

By default we use the empty string as delimiter, which is good for copying via double click on Linux systems. But other delimiters might make your passphrases more readable (and more secure, see Security Traps <#sec-traps>_ below).

By default the single phrase words are capitalized, i.e. the first char of each word is made uppercase. This does not necessarily give better entropy (but protects against entropy loss due to non prefix code, see Security Traps <#sec-traps> below), and it might improve phrase readability.

You can nevertheless disable caps with the --no-caps option::

$ diceware --no-caps oceanblendbaronferrylistenvalet

This will leave the input words untouched (upper-case stays upper-case, lower-case stays lower-case). It does not mean, that all output words will be lower-case (except if all words of your wordlist are lowercase).

As the default lists of diceware contain only lower-case terms, here --no-caps means in fact lower-case only output, which might be easier to type on smart phones and similar.

diceware supports also different sources of randomness, which can be chosen with the -r <SOURCENAME> or --randomsource <SOURCENAME> option. Use the --help option to list all valid values for this option.

By default we use the random.SystemRandom_ class of standard Python lib but you can also bring your own dice to create randomness::

$ diceware -r realdice --dice-sides 6 Please roll 5 dice (or a single dice 5 times). Enter your 5 dice results, separated by spaces: 6 4 2 3 1 Please roll 5 dice (or a single dice 5 times). Enter your 5 dice results, separated by spaces: 5 4 3 6 2 ... UnleveledSimilarlyBackboardMurkyOasisReplay

Normally dice have six sides. And this is also the default in diceware if you do not use --dice-sides. But if you do, you can tell how many sides (all) your dice have. More sides will lead to less rolls required.

We support even sources of randomness from other packages. See the documentation <https://diceware.readthedocs.io/>_ for more details.

diceware comes with an English wordlist provided by the EFF_, which will be used by default and contains 7776 (=6^5) different words. This list is registered as en_eff.

Additionally diceware comes with an English wordlist provided by @heartsucker_, which contains 8192 different words. This list is based off the original diceware list written by Arnold G. Reinhold.

Both the original and 8k diceware wordlists by Mr. Reinhold are provided. You can enable a certain (installed) wordlist with the -w option::

$ diceware --wordlist en_orig YorkNodePrickEchoToriNiobe

See diceware --help for a list of all installed wordlists.

You can also build phrases from adjectives and nouns (yet in english only) using the included en_adjectives and en_nouns lists. For that you specify these two wordlists after each other::

$ diceware -n 1 -w en_adjectives en_nouns TediousPerimeter

These adjective/noun phrases might be easier to memorize.

If you do not like the wordlists provided, you can use your own one. Any INFILE provided will be parsed line by line and each line considered a possible word. For instance::

$ echo -e "hi\nhello\n" > mywordlist.txt $ diceware mywordlist.txt HelloHelloHiHiHiHello

With dash (-) as filename you can pipe in wordlists::

$ echo -e "hi\nhello\n" | diceware - HiHiHelloHiHiHello

In custom wordlists we take each line for a valid word and ignore empty lines (i.e. lines containing whitespace characters only). Oh, and we handle even PGP-signed wordlists.

You can set customized default values in a configuration file .diceware.ini (note the leading dot) placed in your home directory. This file could look like this::

[diceware] num = 7 caps = off specials = 2 delimiter = "MYDELIMITER" randomsource = "system" wordlist = "en_securedrop"

The options names have to match long argument names, as output by --help. The values set must meet the requirements valid for commandline usage. All options must be set within a section [diceware].

What is it good for?

Normally, diceware passphrases are easier to remember than shorter passwords constructed in more or less bizarre ways. But at the same time diceware passphrases provide more entropy as xkcd_ can show with the famous '936' proof_:

.. image:: http://imgs.xkcd.com/comics/password_strength.png :align: center :target: http://xkcd.com/936/

.. _xkcd: http://xkcd.com/ .. _proof: http://xkcd.com/936/

The standard english wordlist of this diceware implementation contains 7776 = 6^5 different english words. It is the official EFF_ wordlist. compiled by Joseph Bonneau_. Therefore, picking a random word from this list gives an entropy of nearly 12.9 bits. Picking six words means an entropy of 6 x 12.9 = 77.54 bits.

The special chars replacing chars of the originally created passphrase give some more entropy (the more chars you have, the more additional entropy), but not much. For instance, for a sixteen chars phrase you have sixteen possibilities to place one of the 36 special chars. That makes 36 x 16 possibilitities or an entropy of about 9.17 you can add. To get an entropy increase of at least 10 bits, you have to put a special char in a phrase with at least 29 chars (while at the same time an additional word would give you 13 bits of extra entropy). Therefore you might think again about using special chars in your passphrase.

Is it secure?

The security level provided by Diceware_ depends heavily on your source of random. If the delivered randomness is good, then your passphrases will be very strong. If instead someone can foresee the numbers generated by a random number generator, your passphrases will be surprisingly weak.

This Python implementation uses (by default) the random.SystemRandom_ source provided by Python. On Un*x systems it accesses /dev/urandom. You might want to follow reports about manipulated random number generators in operating systems closely.

The Python API of this package allows usage of other sources of randomness when generating passphrases. This includes real dice. See the -r option.

.. _sec-traps:

Security Traps

There are issues that might reduce the entropy of the passphrase generated. One of them is the prefix code_ problem:

Prefix Code ...........

If the wordlist contains, for example, the words::

"air", "airport", "portable", "able"

and we switched off caps and delimiter chars, then diceware might generate a passphrase containing::

"airportable"

which could come from air-portable or airport-able. We cannot tell and an attacker would have less combinations to guess.

To avoid that, you can leave caps enabled (the default), use any word delimiter except the empty string or use the en_eff wordlist, which was checked to be a prefix code_ (i.e. it does not contain words that start with other words in the list). The pt-br is also a secure prefix code_.

Each of these measures is sufficient to protect you against the prefix code_ problem.

Reduced Entropy ...............

Overall, diceware is a kind of mapping input values, dice throws for instance, onto wordlist entries. We normally want each of the words in the wordlist to be picked for passphrases with the same probability.

This, however, is not possible, if the number of wordlist entries is not a power of dice sides. In that case we cut some words of the wordlist and inform the user about the matter. Reducing the number of words this way makes it easier for attackers to guess the phrase picked.

You can fix that problem by using longer wordlists.

Developer Install

Developers want to fork me on github_::

$ git clone https://github.com/ulif/diceware.git

We recommend to create and activate a virtualenv_ first::

$ cd diceware/ $ virtualenv -p /usr/bin/python3.4 py34 $ source py34/bin/activate (py34) $

We support Python versions 2.6, 2.7, 3.3 to 3.7, and pypy.

Now you can create the devel environment::

(py34) $ python setup.py dev

This will fetch test packages (py.test_). You should be able to run tests now::

(py34) $ py.test

If you have also different Python versions installed you can use tox_ for using them all for testing::

(py34) $ pip install tox # only once (py34) $ tox

Should run tests in all supported Python versions.

Documentation Install .....................

The docs can be generated with Sphinx_. The needed packages are installed via::

(py34) $ python setup.py docs

To create HTML you have to go to the docs/ directory and use the prepared Makefile::

(py34) $ cd docs/ (py34) $ make

This should generate the docs in docs/_build/html/.

Creating the Man Page .....................

We provide a ReStructuredTexT_ template to create a man page. When the documentation engine is installed (Sphinx_, see above), then you can create a manpage doing::

(py34) $ rst2man.py docs/manpage.rst > diceware.1

The template is mainly provided to ease the job of Debian maintainers. Currently, it is not automatically updated. Dates, authors, synopsis, etc. have to be updated manually. Information in the manpage may therefore be wrong, outdated, or simply misleading.

Credits

Arnold G. Reinhold deserves all merits for the working parts of Diceware_. The non-working parts are certainly my fault.

People that helped spotting bugs, providing solutions, etc.:

  • Conor Schaefer (conorsch) <https://github.com/conorsch>_
  • Rodolfo Gouveia suggested to activate the --delimiter option.
  • @drebs_ provided patches and discussion for different sources of randomness and the excellent pt-br wordlist. @drebs_ also initiated and performed the packaging of diceware for the Debian_ platform. Many kudos for this work! @drebs_ is also the official Debian maintainer of the diceware package.
  • @heartsucker_ hand-compiled and added a new english wordlist.
  • dwcoder <https://github.com/dwcoder>_ revealed and fixed bugs #19, #21, #23. Also showed sound knowledge of (theoretical) entropy. A pleasure to work with.
  • George V. Reilly <https://github.com/georgevreilly>_ pointed to new EFF wordlists.
  • lieryan <https://github.com/lieryan>_ brought up the prefix code_ problem.
  • LogosOfJ <https://github.com/LogosOfJ>_ discovered and fixed serious realdice source of randomness problem.
  • Bhavin Gandhi <https://github.com/bhavin192>_ fixed the confusing error message when an invalid input filename is given.
  • Simon Fondrie-Teitler <https://github.com/simonft>_ contributed a machine-readable copyright file, with improvements from @anarcat_
  • Doug Muth <https://github.com/dmuth>_ fixed formatting in docs.

Many thanks to all of them!

Links

  • The Diceware_ home page. Reading definitely recommended!
  • fork me on github_

Wordlists:

  • Diceware standard list_ by Arnold G. Reinhold.
  • Diceware8k list_ by Arnold G. Reinhold.
  • Diceware SecureDrop list_ by @heartsucker_.
  • EFF large list_ provided by EFF_.
  • English adjectives and nouns lists_ provided by NaturalLanguagePasswords_.

License

This Python implementation of Diceware, (C) 2015-2019 Uli Fouquet, is licensed under the GPL v3+. See file LICENSE for details.

"Diceware" is a trademark of Arnold G Reinhold, used with permission.

The copyright for the Diceware8k list_ is owned by Arnold G Reinhold. The copyright for the the Diceware SecureDrop list_ are owned by @heartsucker. Copyright for the EFF large list by Joseph Bonneau_ and EFF_. Copyright for the english adjective and noun lists by NaturalLanguagePasswords_. See file COPYRIGHT for details.

.. _pip: https://pip.pypa.io/en/latest/ .. _@anarcat: https://github.com/anarcat .. _Debian: https://www.debian.org/ .. _Diceware: http://diceware.com/ .. _Diceware standard list: http://world.std.com/~reinhold/diceware.wordlist.asc .. _Diceware SecureDrop list: https://github.com/heartsucker/diceware .. _Diceware8k list: http://world.std.com/~reinhold/diceware8k.txt .. _@drebs: https://github.com/drebs .. _EFF: https://eff.org/ .. _EFF large list: https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt .. _English adjectives and nouns lists: https://github.com/NaturalLanguagePasswords/system .. _fork me on github: http://github.com/ulif/diceware/ .. _@heartsucker: https://github.com/heartsucker/ .. _Joseph Bonneau: https://www.eff.org/about/staff/joseph-bonneau .. _NaturalLanguagePasswords: https://github.com/NaturalLanguagePasswords .. _prefix code: https://en.wikipedia.org/wiki/Prefix_code .. _random.SystemRandom: https://docs.python.org/3.4/library/random.html#random.SystemRandom .. _ReStructuredText: http://docutils.sourceforge.net/rst.html .. _virtualenv: https://virtualenv.pypa.io/ .. _py.test: https://pytest.org/ .. _tox: https://tox.testrun.org/ .. _Sphinx: https://sphinx-doc.org/

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].