Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4F15E4A9.6090100@redhat.com>
Date: Tue, 17 Jan 2012 14:14:17 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Henri Salo <henri@...v.fi>
Subject: Re: Re: pwgen: non-uniform distribution of passwords

On 01/17/2012 12:58 PM, Henri Salo wrote:
> On Tue, Jan 17, 2012 at 11:51:31PM +0400, Solar Designer wrote:
>> It was just pointed out to me off-list that the man page for pwgen
>> specifically mentions that this kind of passwords "should not be used in
>> places where the password could be attacked via an off-line brute-force
>> attack."  I had missed that detail or at least I did not recall it.
>>
>> This kind of documentation certainly mitigates the problem to some extent.
> I'll bet most of the end-users will also miss this if you did.
>
> - Henri Salo
I'm of the mind that documenting issues is good but documenting issues
doesn't always make them go away.

E.g. documenting a default usrname/password where it can be easily
changed is reasonable. Documenting a default username/password that
cannot be changed doesn't really help to the same degree.

In this case we have something that tells you not to use an unsafe
option but isn't exceedingly noticeable or clear (if it came up every
time you used that option there would be a stringer case for no CVE).
I'm sitting on the fence for this one (I can see it going either way),
wouldn't mind some more opinions from the smart people on this list.

-- 

-- Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.