Secure password/passphrase generator.
By default spass will generate passwords. You can control the length using the -l modifier. Examples:
$ spass mqGP0GEZ $ ./spass -l 10 @-9Me6VNnT
If you pass the -p modifier, spass will output a passphrase instead of a password:
$ ./spass -p -l 4 pecan suey faith signor
For more options see spass --help.
mkdir build cd build cmake .. make sudo make install
Or use one of the provided binary packages.
cmake can receive the following options:
WITH_PORTAUDIO use PortAudio as the audio backend instead of ALSA [default=OFF] WITH_OSS use Open Sound System (OSS) as the audio backend instead of ALSA [default=OFF] WITH_ALSA use Advanced Linux Sound Architecture (ALSA) as the audio backend [default=ON]
The options are exclusive, e.g. only one of them can be used each time. If no option is provided, the ALSA is used.
The security of a password generator like spass, is determined by the quality of its underlying random number generator. spass employs a true random number generator based on noise obtained via the microphone. The noise goes through an unbiasing phase and then every 512 bits are compressed into 128 bits using a hash function. After those two phases the output bits should have full entropy.
The words for the passphrases are taken from a list containing 8192 words. Hence, each word provides 13 bits of entropy.
The current implementation can't open the audio device for capture in an exclusive mode (due to ALSA limitation). This means that theoratically, if you use spass on a system with a malicious user, he could record the same noise you're using and guess the output of spass. This means that you've to be in full control of the system your using spass on. While this may seem problematic, in practice it's a requirement for every other cryptography related application as well.