krb5-strength-wordlist(1) Create a krb5-strength database from a word list

SYNOPSIS

krb5-strength-wordlist [-am] [-c output-cdb] [-l min-length]
    [-L max-length] [-o output-wordlist] [-s output-sqlite]
    [-x exclude ...] wordlist

DESCRIPTION

krb5-strength-wordlist converts a word list (a file containing one word per line) into a database that can be used by the krb5-strength plugin or heimdal-strength command for checking passwords. Two database formats are supported, with different features. CDB is more space-efficient and possibly faster, but supports checking passwords only against exact matches or simple transformations (removing small numbers of leading and trailing characters). SQLite creates a much larger database, but supports rejecting any password within edit distance one of a word in the word list.

CDB is a format invented by Dan Bernstein for fast, constant databases. The database is fixed during creation and cannot be changed without rebuilding it, and is optimized for very fast access. For cdb, the database generated by this program will have keys for each word in the word list and the constant 1 as the value.

SQLite stores the word list in a single table containing both each word and each word reversed. This allows the krb5-strength plugin or heimdal-strength command to reject passwords within edit distance one of any word in the word list. (Edit distance one means that the word list entry can be formed by changing a single character of the password, either by adding one character, removing one character, or changing one character to a different character.) However, the SQLite database will be much larger and lookups may be somewhat slower.

krb5-strength-wordlist takes one argument, the input word list file. Use the -c option to specify an output CDB file, -s to specify an output SQLite file, or -o to just filter the word list against the criteria given on the command line and generate a new word list. The input word list file does not have to be sorted. See the individual option descriptions for more information.

OPTIONS

-a, --ascii
Filter all words that contain non-ASCII characters or control characters from the resulting cdb file, leaving only words that consist solely of ASCII non-control characters.
-c output-cdb, --cdb=output-cdb
Create a CDB database in output-cdb. A temporary file named after output-cdb with ".data" appended will be created in the same directory and used to stage the database contents. The actual CDB file will be built using the cdb command, which must be on the user's path. If either file already exists, krb5-strength-wordlist will abort with an error.

This option cannot be used with -o or -s.

-L maximum, --max-length=maximum
Filter all words of length greater than maximum from the resulting cdb database. The length of each line (minus the separating newline) in the input word list will be checked against minimum and will be filtered out of the resulting database if it is shorter. Useful for generating password dictionaries from word lists that contain random noise that's highly unlikely to be used as a password.

The default is to not filter out any words for maximum length.

-l minimum, --min-length=minimum
Filter all words of length less than minimum from the resulting cdb database. The length of each line (minus the separating newline) in the input word list will be checked against minimum and will be filtered out of the resulting database if it is shorter. Useful for generating password dictionaries where shorter passwords will be rejected by a generic length check and no dictionary lookup will be done for a transform of the password shorter than the specified minimum.

The default is not to filter out any words for minimum length.

-m, --man, --manual
Print out this documentation (which is done simply by feeding the script to "perldoc -t").
-o wordlist, --output=wordlist
Rather than creating a database, apply the filter rules given by the other command-line arguments and generate a new word list in the file name given by the wordlist option. This can be used to reduce the size of a raw word list file (such as one taken from Internet sources) by removing the words that will be filtered out of the dictionary anyway, thus reducing the size of the source required to regenerate the dictionary.

This option cannot be used with -c or -s.

-s output-sqlite, --sqlite=output-sqlite
Create a SQLite database in output-sqlite. If this file already exists, krb5-strength-wordlist will abort with an error. The resulting SQLite database will have one table, "passwords", with two columns, "password" and "drowssap". The first holds a word from the word list, and the second holds the same word reversed.

Using this option requires the DBI and DBD::SQLite Perl modules be installed.

This option cannot be used with -c or -o.

-x exclude, --exclude=exclude
Filter all words matching the regular expression exclude from the resulting cdb database. This regular expression will be matched against each line of the source word list after the trailing newline is removed. This option may be given repeatedly to add multiple exclusion regexes.

AUTHOR

Russ Allbery <[email protected]>

COPYRIGHT AND LICENSE

Copyright 2013, 2014 The Board of Trustees of the Leland Stanford Junior University

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the ``Software''), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED ``AS IS'', WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.