BeGIN:_GENPW_8TD15uZkGtHJWL9CNMBRfGJGMTGsN1U_C8O40075DGL755dGO2JyNJoJE
8(X8u1qQaxd7zS2WcJDqB31JXU:b2V5X083N1gg0MJ51kGYtVQGBdWtE,TMAQ7Px9RF9eh
DhB5TAoWBl5GCDU;)b3b98U.MJ0FxlB3Qp1XhGM0j7IGWaM9)A67QdLI!XVdORxTgjH+Yr

genpw                                            Latest Version: 0.3.0

Overview:
1.   General Informations
1.1    Description
1.2    Platforms
1.3    License
1.4    Todo
2.   Download
3.   Changes
4.   Papers
4.1    pwgen-0.1 Password Security Analysis


-[ 1.   General Informations                                        ]-

-[ 1.1  Description                                                 ]-

    genpw is a program to generate passwords. These passwords are 
generated using a set of charactersets with different probabilities. 
The usage of probabilities and different charactersets gives the user 
more influence on the layout and security of the generated passwords.

    Another feature of genpw is that it is able to use password 
patterns to generate passwords with a userspecified characterset 
layout. Please note this can lead to a security weakness if an 
attacker knows the pattern. In general this is a good way to tighten
up user passwords which are probably easy to break by dictionary
attacks, by appending a random part including special characters and 
numbers.

    genpw is able to generate random numbers and print them to stdout.
This is very useful to randomize password patterns, probabilites or 
the length of passwords generated by genpw.

-[ 1.2  Platforms                                                   ]-

genpw is designed to be as platform independent as possible. Actually
genpw compiles, with correct settings, on various systems. genpw is
developed on a x86 GNU/Linux system and will use advantages offered by
the system.
Please set the #define/#undef these variables in defines.h

+--------------------------------------------------------------------+
| System   | USE_RANDOMNUMBERDEVICE    | USE_GETOPTLONG              |
+--------------------------------------------------------------------+
| Linux    | Supported                 | Supported                   |
| BSD      | Supported                 | Supported                   |
| Solaris  | * Supported               | Supported                   |
| Cygwin   | Not Supported             | Not Supported               |
| Other    | Unknown                   | Unknown                     |
|          |                           |                             |
+--------------------------------------------------------------------+

* = Requires some additional tools

-[ 1.3  License

genpw actually is licensed and will be licensed under the GPL until
the end of time. If you want to know more about the GPL please take
a look here: http://www.gnu.org/copyleft/gpl.html

-[ 1.4 Todo                                                         ]-

Here is a small snipped of my actual Todo-List for genpw:
- Improving the internal design
- Improving the usage of Verbosity
- Implementing password strength calculation routines
- ...


-[ 2.   Download                                                    ]-

You will find a link for all downloads on the projects sourceforge.net
page: http://sourceforge.net/projects/genpw


-[ 3.   Changes                                                     ]-

Version 0.2.3 -> 0.3.0
----------------------

- Lowered the default value of DEFAULT_DEVICE_ACCESS_COUNT
- Some minor changes in random_number.c
- Added the possibility to use Phonetics
- Updated printHelp(...)
- New Options:
  --phonetics / -p PHONETIC_ALPHABET
    Enables the use of Phonetics to print Passwords and sets the used
	Phonetic Alphabet to PHONETIC_ALPHABET
- Two available Phonetic Alphabets: Nato, Aero (International)


Version 0.2.2 -> 0.2.3
----------------------

- Added ABORT_PROGRAM to terminate program with an errormessage and
  return-code -1.
- assert(...) is now widely used in the code, to find bugs earlier in
  the development process and to document code dependencies. 
- Added USE_FASTER_RANDOMNUMBERDEVICE; using this option will speed up
  the password generation process. This option requires 
  DEFAULT_DEVICE_ACCESS_COUNT.
- Added DEFAULT_DEVICE_ACCESS_COUNT controls how often genpw will read
  a new initialization number from the random device. It reinitialize
  the pseudo random number all 1/DEFAULT_DEVICE_ACCESS_COUNT times. 
- USE_FASTER_RANDOMNUMBERDEVICE is activated by default!  
- Added DEFAULT_CHARACTER_SETS to specify the default character set
  table in defines.h
- Removed some unused defines
- Updated the manpage
- Updated informations.c


Version 0.2.1 -> 0.2.2
----------------------

- getRandomNumber now (re)initializes the Random Number Generator on
  every call, this makes USE_NO_PSEUDORANDOMNUMBERS obsolete.
- USE_NO_PSEUDORANDOMNUMBERS is not used anymore
- Some structural changes in main()
- It is now possible to turn on/off the default use of random length
  passwords via DEFAULT_USE_RANDOM_PASSWORD_LENGTH
- The default maximum and minimum length of random length passwords can
  be set using DEFAULT_PASSWORD_LENGTH_MINIMUM and
  DEFAULT_PASSWORD_LENGTH_MAXIMUM
- It is possible to set the default action (Generate numbers, generate
  passwords or no operation) using DEFAULT_OPERATION


Version 0.2.0 -> 0.2.1
----------------------

- Added the possibility to evade the use of a pseudo random number
  generator by setting USE_NO_PSEUDORANDOMNUMBERS. This requires
  USE_RANDOMNUMBERDEVICE, but creates more secure passwords.
- A few minor changes


Version 0.1 -> 0.2.0
--------------------

- Improved the initilization of the Random Number Generator without a
  Random Device
- Changed the internal CharacterSet representation
- Some internal improvements
- USE_DEVURANDOM in defines.h is now called USE_RANDOMNUMBERDEVICE
- Added the possibility to set a default Random Device, by changing
  DEFAULT_RANDOM_NUMBER_DEVICE in defines.h
- New version system
- New Options:
  --device / -d PATH
    Sets the used Random Device to PATH, if supported
  --random-number / -N MIN:MAX
    Prints a random number in the range between MIN and MAX, where MAX
    highest value can be (2^32)-1 (on a common 32Bit machine). If MAX
    is zero a number between 0 and (2^32)-1 will be generated.


Version 0.1
-----------

- First public release


-[ 4.   Papers                                                      ]-

[1] pwgen-0.1 Password Security Analysis



Copyright (C) 2004 Boris Schauerte  borisscha[AT]users.sourceforge.net

UU449gNX(AwBJNqXPL5+06+dIRwJRRzA849Zdc0YFDcgr19j4o5552GcE31O0cCYSXoAYf
K_m2s0-Y1HVv:Krg91KEz38lN5TtRMj7N0RDk9XjxyS80K_l-41IKtj4Bp3Zj6gGU9gr54
SCf9LLYErjCwkDJ4586OSi2TK6u!(C6JfIXe2e2M-a92yiOWD3tX5H4ZZ:7eV0BmCZbEOF

SourceForge.net Logo