Skip to content
This repository

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP

Cryptographically secure random password/passphrase generator. Code Moved to:

branch: master
README.rst

Readme - spass

Secure password/passphrase generator.

Authors

Usage

By default spass will generate passwords. You can control the length using the -l modifier. Examples:

$ spass
mqGP0GEZ
$ ./spass -l 10
@-9Me6VNnT

If you pass the -p modifier, spass will output a passphrase instead of a password:

$ ./spass -p -l 4
pecan suey faith signor

For more options see spass --help.

Installation

Just run:

mkdir build
cd build
cmake ..
make
sudo make install

Or use one of the provided binary packages.

Configuration

cmake can receive the following options:

WITH_PORTAUDIO          use PortAudio as the audio backend instead of ALSA
                        [default=OFF]
WITH_OSS                use Open Sound System (OSS) as the audio backend
                        instead of ALSA [default=OFF]
WITH_ALSA               use Advanced Linux Sound Architecture (ALSA) as the
                        audio backend [default=ON]

The options are exclusive, e.g. only one of them can be used each time. If no option is provided, the ALSA is used.

Security

The security of a password generator like spass, is determined by the quality of its underlying random number generator. spass employs a true random number generator based on noise obtained via the microphone. The noise goes through an unbiasing phase and then every 512 bits are compressed into 128 bits using a hash function. After those two phases the output bits should have full entropy.

See also Audio Based True Random Number Generator POC.

The words for the passphrases are taken from a list containing 8192 words. Hence, each word provides 13 bits of entropy.

Caveats

The current implementation can't open the audio device for capture in an exclusive mode (due to ALSA limitation). This means that theoratically, if you use spass on a system with a malicious user, he could record the same noise you're using and guess the output of spass. This means that you've to be in full control of the system your using spass on. While this may seem problematic, in practice it's a requirement for every other cryptography related application as well.

Something went wrong with that request. Please try again.