Control: severity -1 important

I have split two parts into separate bugs, I think the remainder are ok:

CVE-2013-4440 non-tty passwords are trivially weak by default
* #725507, my assessment: grave
CVE-2013-4441 Phonemes mode has heavy bias and is enabled by default
* works as designed
CVE-2013-4442 Silent fallback to insecure entropy
* #767008, my assessment: important
CVE-2013-4443 Secure mode has bias towards numbers and uppercase letters
* REJECTED, actually improves security!

CVE-2013-4443 has been rejected from the CVE database.

So let's discuss CVE-2013-4441.  Such a bias means the program does what
it's designed to do: it produces pronounceable passwords rather than a pure
line noise.  These are not necessarily less secure -- you just need a longer
length than on line noise.  Recently this has been popularized as the
"correct horse battery staple" issue: long passwords are far, far easier to
memorize for a human than shorter but more complex ones, while being capable
of providing as much or more entropy.

What remains is that pwgen's default length, 8 characters, might been
adequate when the program was written, but is insecure today.  But let's
discuss that elsewhere.

So I think this bug should be closed.  Being not a security expert myself,
I'm merely degrading it to "important" for now, until someone else can
confirm and close.

I'll bump #725507 to grave after the next britney run.

-- 
// If you believe in so-called "intellectual property", please immediately
// cease using counterfeit alphabets.  Instead, contact the nearest temple
// of Amon, whose priests will provide you with scribal services for all
// your writing needs, for Reasonable and Non-Discriminatory prices.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to