Project

pwdhash

0.01
No commit activity in last 3 years
No release in over 3 years
Command line version of Stanford PwdHash
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
 Dependencies

Runtime

~> 1.6, >= 1.6.12
 Project Readme

PwdHash.rb

Generates PwdHash passwords from the command line.

What is this?

This is a simple Ruby command line tool to generate hashed passwords, using PwdHash's algorithm.

PwdHash was written as a browser plug-in, but sometimes we'd like to extend its use to desktop applications too. e.g. IM clients, Dropbox, etc. just to name a few.

This tool is essentially a straight copy of Chris Roos' implementation, with a couple of command line interface improvements:

  1. The password is masked properly when the user is typing it.
  2. The realm is specified as an argument instead of prompted.
  3. The prompt text is sent to STDOUT instead of STDERR so the output can be piped to e.g. xclip or putclip.

What is PwdHash?

Standford PwdHash helps you create theft-resistant passwords for each realm (domain name). In the case that your email password gets stolen, the attacker won't be able to log in your PayPal account to transfer all your money, even though you only have to remember one password for all logins. The USENIX Security Symposium 2005 paper (PDF) explains it in details.

Installation

gem install pwdhash

Example/Usage

$ pwdhash example.com
Password for example.com:
5NBoCKraALBs

$ pwdhash example.com | xclip # Put generated password to X clipboard (paste with middle-click)
$ pwdhash example.com | xclip -selection c # Put generated password to X clipboard (paste with CTRL+V)
$ pwdhash example.com | pbcopy # Or in OS X
> pwdhash example.com | clip # Or in Windows
$ pwdhash example.com | putclip # Or in Cygwin

PwdHash2

Some vulnerabilities of PwdHash have been exposed in Cracking PwdHash: A Brute-force Attack on Client-side Password Hashing, along with a proof-of-concept update to PwdHash. The updated algorithm (with PBKDF2-SHA256 + salt + multiple iterations) has been implemented as a Firefox Add-On at GWuk/PwdHash2.

The corresponding algorithm can be used with:

$ pwdhash2 URI [SALT] [ITERATIONS]

$ pwdhash2 example.com ReplaceThisSalt 50_000
Password for example.com (salt = 'ReplaceThisSalt', iterations = 50000):
IHC8WhmO40v

SALT can be defined in PWDHASH2_SALT environment variable.

ITERATIONS can be defined in PWDHASH2_ITERATIONS environment variable.

$ pwdhash2 example.com | xclip -selection c # Put generated password to X clipboard (paste with CTRL+V)

Attribution

The library part of this tool is a straight copy of Chris Roos' implementation. The reason this git repository is set up is because: a) Chris Roos decided to put the code in an obscure corner in a pile of code which makes it hard for people to find and b) GitHub uses git :p

The PwdHash plug-in and the PwdHash algorithm is contributed by Stanford PwdHash.

The PwdHash2 algorithm is contributed by David Llewellyn-Jones and Graham Rymer.