2 * This program is copyright Alec Muffett 1993. The author disclaims all
3 * responsibility or liability with respect to it's usage or its effect
4 * upon hardware or computer systems, and maintains copyright as set out
5 * in the "LICENCE" document which accompanies distributions of Crack v4.0
10 * Modified as part of the krb5-strength project as follows:
12 * 2007-03-22 Russ Allbery <rra@stanford.edu>
13 * - Add four-, five-, and six-character prefix and suffix rules.
14 * - Longer passwords must contain more different characters, up to 8.
15 * - Disable GECOS checking (useless for a server).
16 * - Replace exit(-1) with return when dictionary doesn't exist.
17 * - Additional system includes for other functions.
18 * 2009-10-14 Russ Allbery <rra@stanford.edu>
19 * - Add ANSI C protototypes for all functions.
20 * - Tweaks for const cleanliness.
21 * - Add parentheses around assignment used for its truth value.
22 * - Change a variable to unsigned int to avoid gcc warnings.
23 * - Remove the unused FascistGecos function.
24 * 2012-05-11 Russ Allbery <rra@stanford.edu>
25 * - Change MINLENGTH to 8.
26 * - Use a separate buffer to hold the reversed password.
27 * - Also check whether a password is a duplicated dictionary word.
30 static const char vers_id[] = "fascist.c : v2.3p3 Alec Muffett 14 dec 1997";
33 #include <sys/types.h>
39 #define ISSKIP(x) (isspace(x) || ispunct(x))
49 static const char *r_destructors[] = {
50 ":", /* noop - must do this to test raw word. */
56 "[", /* trimming leading/trailing junk */
61 "]]]", /* 5 for 8 char passwords */
62 /* This is for longer passwords, it should be based on length */
63 "]]]]", /* 6 for 10 char passwords */
65 "]]]]]", /* 7 for 12 char passwords */
67 "]]]]]]", /* 8 for 14 char passwords */
70 "/?p@?p", /* purging out punctuation/symbols/junk */
74 /* attempt reverse engineering of password strings */
79 "/$s$s/0s0o/2s2a/3s3e",
80 "/$s$s/0s0o/2s2a/3s3e/5s5s",
81 "/$s$s/0s0o/2s2a/3s3e/5s5s/1s1i",
82 "/$s$s/0s0o/2s2a/3s3e/5s5s/1s1l",
83 "/$s$s/0s0o/2s2a/3s3e/5s5s/1s1i/4s4a",
84 "/$s$s/0s0o/2s2a/3s3e/5s5s/1s1i/4s4h",
85 "/$s$s/0s0o/2s2a/3s3e/5s5s/1s1l/4s4a",
86 "/$s$s/0s0o/2s2a/3s3e/5s5s/1s1l/4s4h",
87 "/$s$s/0s0o/2s2a/3s3e/5s5s/4s4a",
88 "/$s$s/0s0o/2s2a/3s3e/5s5s/4s4h",
89 "/$s$s/0s0o/2s2a/3s3e/5s5s/4s4a",
90 "/$s$s/0s0o/2s2a/3s3e/5s5s/4s4h",
91 "/$s$s/0s0o/2s2a/3s3e/1s1i",
92 "/$s$s/0s0o/2s2a/3s3e/1s1l",
93 "/$s$s/0s0o/2s2a/3s3e/1s1i/4s4a",
94 "/$s$s/0s0o/2s2a/3s3e/1s1i/4s4h",
95 "/$s$s/0s0o/2s2a/3s3e/1s1l/4s4a",
96 "/$s$s/0s0o/2s2a/3s3e/1s1l/4s4h",
97 "/$s$s/0s0o/2s2a/3s3e/4s4a",
98 "/$s$s/0s0o/2s2a/3s3e/4s4h",
99 "/$s$s/0s0o/2s2a/3s3e/4s4a",
100 "/$s$s/0s0o/2s2a/3s3e/4s4h",
101 "/$s$s/0s0o/2s2a/5s5s",
102 "/$s$s/0s0o/2s2a/5s5s/1s1i",
103 "/$s$s/0s0o/2s2a/5s5s/1s1l",
104 "/$s$s/0s0o/2s2a/5s5s/1s1i/4s4a",
105 "/$s$s/0s0o/2s2a/5s5s/1s1i/4s4h",
106 "/$s$s/0s0o/2s2a/5s5s/1s1l/4s4a",
107 "/$s$s/0s0o/2s2a/5s5s/1s1l/4s4h",
108 "/$s$s/0s0o/2s2a/5s5s/4s4a",
109 "/$s$s/0s0o/2s2a/5s5s/4s4h",
110 "/$s$s/0s0o/2s2a/5s5s/4s4a",
111 "/$s$s/0s0o/2s2a/5s5s/4s4h",
112 "/$s$s/0s0o/2s2a/1s1i",
113 "/$s$s/0s0o/2s2a/1s1l",
114 "/$s$s/0s0o/2s2a/1s1i/4s4a",
115 "/$s$s/0s0o/2s2a/1s1i/4s4h",
116 "/$s$s/0s0o/2s2a/1s1l/4s4a",
117 "/$s$s/0s0o/2s2a/1s1l/4s4h",
118 "/$s$s/0s0o/2s2a/4s4a",
119 "/$s$s/0s0o/2s2a/4s4h",
120 "/$s$s/0s0o/2s2a/4s4a",
121 "/$s$s/0s0o/2s2a/4s4h",
123 "/$s$s/0s0o/3s3e/5s5s",
124 "/$s$s/0s0o/3s3e/5s5s/1s1i",
125 "/$s$s/0s0o/3s3e/5s5s/1s1l",
126 "/$s$s/0s0o/3s3e/5s5s/1s1i/4s4a",
127 "/$s$s/0s0o/3s3e/5s5s/1s1i/4s4h",
128 "/$s$s/0s0o/3s3e/5s5s/1s1l/4s4a",
129 "/$s$s/0s0o/3s3e/5s5s/1s1l/4s4h",
130 "/$s$s/0s0o/3s3e/5s5s/4s4a",
131 "/$s$s/0s0o/3s3e/5s5s/4s4h",
132 "/$s$s/0s0o/3s3e/5s5s/4s4a",
133 "/$s$s/0s0o/3s3e/5s5s/4s4h",
134 "/$s$s/0s0o/3s3e/1s1i",
135 "/$s$s/0s0o/3s3e/1s1l",
136 "/$s$s/0s0o/3s3e/1s1i/4s4a",
137 "/$s$s/0s0o/3s3e/1s1i/4s4h",
138 "/$s$s/0s0o/3s3e/1s1l/4s4a",
139 "/$s$s/0s0o/3s3e/1s1l/4s4h",
140 "/$s$s/0s0o/3s3e/4s4a",
141 "/$s$s/0s0o/3s3e/4s4h",
142 "/$s$s/0s0o/3s3e/4s4a",
143 "/$s$s/0s0o/3s3e/4s4h",
145 "/$s$s/0s0o/5s5s/1s1i",
146 "/$s$s/0s0o/5s5s/1s1l",
147 "/$s$s/0s0o/5s5s/1s1i/4s4a",
148 "/$s$s/0s0o/5s5s/1s1i/4s4h",
149 "/$s$s/0s0o/5s5s/1s1l/4s4a",
150 "/$s$s/0s0o/5s5s/1s1l/4s4h",
151 "/$s$s/0s0o/5s5s/4s4a",
152 "/$s$s/0s0o/5s5s/4s4h",
153 "/$s$s/0s0o/5s5s/4s4a",
154 "/$s$s/0s0o/5s5s/4s4h",
157 "/$s$s/0s0o/1s1i/4s4a",
158 "/$s$s/0s0o/1s1i/4s4h",
159 "/$s$s/0s0o/1s1l/4s4a",
160 "/$s$s/0s0o/1s1l/4s4h",
167 "/$s$s/2s2a/3s3e/5s5s",
168 "/$s$s/2s2a/3s3e/5s5s/1s1i",
169 "/$s$s/2s2a/3s3e/5s5s/1s1l",
170 "/$s$s/2s2a/3s3e/5s5s/1s1i/4s4a",
171 "/$s$s/2s2a/3s3e/5s5s/1s1i/4s4h",
172 "/$s$s/2s2a/3s3e/5s5s/1s1l/4s4a",
173 "/$s$s/2s2a/3s3e/5s5s/1s1l/4s4h",
174 "/$s$s/2s2a/3s3e/5s5s/4s4a",
175 "/$s$s/2s2a/3s3e/5s5s/4s4h",
176 "/$s$s/2s2a/3s3e/5s5s/4s4a",
177 "/$s$s/2s2a/3s3e/5s5s/4s4h",
178 "/$s$s/2s2a/3s3e/1s1i",
179 "/$s$s/2s2a/3s3e/1s1l",
180 "/$s$s/2s2a/3s3e/1s1i/4s4a",
181 "/$s$s/2s2a/3s3e/1s1i/4s4h",
182 "/$s$s/2s2a/3s3e/1s1l/4s4a",
183 "/$s$s/2s2a/3s3e/1s1l/4s4h",
184 "/$s$s/2s2a/3s3e/4s4a",
185 "/$s$s/2s2a/3s3e/4s4h",
186 "/$s$s/2s2a/3s3e/4s4a",
187 "/$s$s/2s2a/3s3e/4s4h",
189 "/$s$s/2s2a/5s5s/1s1i",
190 "/$s$s/2s2a/5s5s/1s1l",
191 "/$s$s/2s2a/5s5s/1s1i/4s4a",
192 "/$s$s/2s2a/5s5s/1s1i/4s4h",
193 "/$s$s/2s2a/5s5s/1s1l/4s4a",
194 "/$s$s/2s2a/5s5s/1s1l/4s4h",
195 "/$s$s/2s2a/5s5s/4s4a",
196 "/$s$s/2s2a/5s5s/4s4h",
197 "/$s$s/2s2a/5s5s/4s4a",
198 "/$s$s/2s2a/5s5s/4s4h",
201 "/$s$s/2s2a/1s1i/4s4a",
202 "/$s$s/2s2a/1s1i/4s4h",
203 "/$s$s/2s2a/1s1l/4s4a",
204 "/$s$s/2s2a/1s1l/4s4h",
211 "/$s$s/3s3e/5s5s/1s1i",
212 "/$s$s/3s3e/5s5s/1s1l",
213 "/$s$s/3s3e/5s5s/1s1i/4s4a",
214 "/$s$s/3s3e/5s5s/1s1i/4s4h",
215 "/$s$s/3s3e/5s5s/1s1l/4s4a",
216 "/$s$s/3s3e/5s5s/1s1l/4s4h",
217 "/$s$s/3s3e/5s5s/4s4a",
218 "/$s$s/3s3e/5s5s/4s4h",
219 "/$s$s/3s3e/5s5s/4s4a",
220 "/$s$s/3s3e/5s5s/4s4h",
223 "/$s$s/3s3e/1s1i/4s4a",
224 "/$s$s/3s3e/1s1i/4s4h",
225 "/$s$s/3s3e/1s1l/4s4a",
226 "/$s$s/3s3e/1s1l/4s4h",
234 "/$s$s/5s5s/1s1i/4s4a",
235 "/$s$s/5s5s/1s1i/4s4h",
236 "/$s$s/5s5s/1s1l/4s4a",
237 "/$s$s/5s5s/1s1l/4s4h",
255 "/0s0o/2s2a/3s3e/5s5s",
256 "/0s0o/2s2a/3s3e/5s5s/1s1i",
257 "/0s0o/2s2a/3s3e/5s5s/1s1l",
258 "/0s0o/2s2a/3s3e/5s5s/1s1i/4s4a",
259 "/0s0o/2s2a/3s3e/5s5s/1s1i/4s4h",
260 "/0s0o/2s2a/3s3e/5s5s/1s1l/4s4a",
261 "/0s0o/2s2a/3s3e/5s5s/1s1l/4s4h",
262 "/0s0o/2s2a/3s3e/5s5s/4s4a",
263 "/0s0o/2s2a/3s3e/5s5s/4s4h",
264 "/0s0o/2s2a/3s3e/5s5s/4s4a",
265 "/0s0o/2s2a/3s3e/5s5s/4s4h",
266 "/0s0o/2s2a/3s3e/1s1i",
267 "/0s0o/2s2a/3s3e/1s1l",
268 "/0s0o/2s2a/3s3e/1s1i/4s4a",
269 "/0s0o/2s2a/3s3e/1s1i/4s4h",
270 "/0s0o/2s2a/3s3e/1s1l/4s4a",
271 "/0s0o/2s2a/3s3e/1s1l/4s4h",
272 "/0s0o/2s2a/3s3e/4s4a",
273 "/0s0o/2s2a/3s3e/4s4h",
274 "/0s0o/2s2a/3s3e/4s4a",
275 "/0s0o/2s2a/3s3e/4s4h",
277 "/0s0o/2s2a/5s5s/1s1i",
278 "/0s0o/2s2a/5s5s/1s1l",
279 "/0s0o/2s2a/5s5s/1s1i/4s4a",
280 "/0s0o/2s2a/5s5s/1s1i/4s4h",
281 "/0s0o/2s2a/5s5s/1s1l/4s4a",
282 "/0s0o/2s2a/5s5s/1s1l/4s4h",
283 "/0s0o/2s2a/5s5s/4s4a",
284 "/0s0o/2s2a/5s5s/4s4h",
285 "/0s0o/2s2a/5s5s/4s4a",
286 "/0s0o/2s2a/5s5s/4s4h",
289 "/0s0o/2s2a/1s1i/4s4a",
290 "/0s0o/2s2a/1s1i/4s4h",
291 "/0s0o/2s2a/1s1l/4s4a",
292 "/0s0o/2s2a/1s1l/4s4h",
299 "/0s0o/3s3e/5s5s/1s1i",
300 "/0s0o/3s3e/5s5s/1s1l",
301 "/0s0o/3s3e/5s5s/1s1i/4s4a",
302 "/0s0o/3s3e/5s5s/1s1i/4s4h",
303 "/0s0o/3s3e/5s5s/1s1l/4s4a",
304 "/0s0o/3s3e/5s5s/1s1l/4s4h",
305 "/0s0o/3s3e/5s5s/4s4a",
306 "/0s0o/3s3e/5s5s/4s4h",
307 "/0s0o/3s3e/5s5s/4s4a",
308 "/0s0o/3s3e/5s5s/4s4h",
311 "/0s0o/3s3e/1s1i/4s4a",
312 "/0s0o/3s3e/1s1i/4s4h",
313 "/0s0o/3s3e/1s1l/4s4a",
314 "/0s0o/3s3e/1s1l/4s4h",
322 "/0s0o/5s5s/1s1i/4s4a",
323 "/0s0o/5s5s/1s1i/4s4h",
324 "/0s0o/5s5s/1s1l/4s4a",
325 "/0s0o/5s5s/1s1l/4s4h",
343 "/2s2a/3s3e/5s5s/1s1i",
344 "/2s2a/3s3e/5s5s/1s1l",
345 "/2s2a/3s3e/5s5s/1s1i/4s4a",
346 "/2s2a/3s3e/5s5s/1s1i/4s4h",
347 "/2s2a/3s3e/5s5s/1s1l/4s4a",
348 "/2s2a/3s3e/5s5s/1s1l/4s4h",
349 "/2s2a/3s3e/5s5s/4s4a",
350 "/2s2a/3s3e/5s5s/4s4h",
351 "/2s2a/3s3e/5s5s/4s4a",
352 "/2s2a/3s3e/5s5s/4s4h",
355 "/2s2a/3s3e/1s1i/4s4a",
356 "/2s2a/3s3e/1s1i/4s4h",
357 "/2s2a/3s3e/1s1l/4s4a",
358 "/2s2a/3s3e/1s1l/4s4h",
366 "/2s2a/5s5s/1s1i/4s4a",
367 "/2s2a/5s5s/1s1i/4s4h",
368 "/2s2a/5s5s/1s1l/4s4a",
369 "/2s2a/5s5s/1s1l/4s4h",
388 "/3s3e/5s5s/1s1i/4s4a",
389 "/3s3e/5s5s/1s1i/4s4h",
390 "/3s3e/5s5s/1s1l/4s4a",
391 "/3s3e/5s5s/1s1l/4s4h",
433 FascistLook(PWDICT *pwp, const char *instring)
436 unsigned int mindiff;
439 char junk[STRINGSIZE];
441 char rpassword[STRINGSIZE];
442 char reverse[STRINGSIZE];
445 notfound = PW_WORDS(pwp);
446 /* already truncated if from FascistCheck() */
447 /* but pretend it wasn't ... */
448 strncpy(rpassword, instring, TRUNCSTRINGSIZE);
449 rpassword[TRUNCSTRINGSIZE - 1] = '\0';
450 password = rpassword;
452 pw_len = strlen(password);
455 return ("it's WAY too short");
460 return ("it is too short");
466 for (i = 0; i < STRINGSIZE && password[i]; i++)
468 if (!strchr(junk, password[i]))
470 *(jptr++) = password[i];
476 * mindiff is the number of different characters the password has to
477 * contain. The original CrackLib always requires five different
478 * characters. This increases that number up to 8 for passwords longer
479 * than nine characters.
481 if (pw_len < 2 * MINDIFF)
486 if ((pw_len % 2) == 0)
488 mindiff = (pw_len + 1) / 2;
491 mindiff = pw_len / 2;
494 if (mindiff > MAXMINDIFF)
496 mindiff = MAXMINDIFF;
500 if (strlen(junk) < mindiff)
502 return ("it does not contain enough DIFFERENT characters");
505 strcpy(password, Lowercase(password));
509 while (*password && isspace(*password))
516 return ("it is all whitespace");
521 while (ptr[0] && ptr[1])
523 if ((ptr[1] == (ptr[0] + 1)) || (ptr[1] == (ptr[0] - 1)))
532 return ("it is too simplistic/systematic");
535 if (PMatch("aadddddda", password)) /* smirk */
537 return ("it looks like a National Insurance number.");
540 /* This is pretty useless for a server. */
541 #ifdef HAVE_GECOS_AVAILABLE
542 if (ptr = FascistGecos(password, getuid()))
548 /* it should be safe to use Mangle with its reliance on STRINGSIZE
549 since password cannot be longer than TRUNCSTRINGSIZE;
550 nonetheless this is not an elegant solution */
552 for (i = 0; r_destructors[i]; i++)
556 if (!(a = Mangle(password, r_destructors[i])))
562 printf("%-16s (dict)\n", a);
565 if (FindPW(pwp, a) != notfound)
567 return ("it is based on a dictionary word");
571 strcpy(reverse, Reverse(password));
573 for (i = 0; r_destructors[i]; i++)
577 if (!(a = Mangle(reverse, r_destructors[i])))
582 printf("%-16s (reversed dict)\n", a);
584 if (FindPW(pwp, a) != notfound)
586 return ("it is based on a (reversed) dictionary word");
590 /* Check for a duplicated word. */
592 if ((pw_len % 2) == 0)
594 if (strncmp(password, password + (pw_len / 2), pw_len / 2) == 0)
596 password[pw_len / 2] = '\0';
597 for (i = 0; r_destructors[i]; i++)
601 if (!(a = Mangle(password, r_destructors[i])))
606 printf("%-16s (duplicated dict)\n", a);
608 if (FindPW(pwp, a) != notfound)
610 return ("it is based on a (duplicated) dictionary word");
620 FascistCheck(const char *password, const char *path)
622 static char lastpath[STRINGSIZE];
624 char pwtrunced[STRINGSIZE];
626 /* security problem: assume we may have been given a really long
627 password (buffer attack) and so truncate it to a workable size;
628 try to define workable size as something from which we cannot
629 extend a buffer beyond its limits in the rest of the code */
631 strncpy(pwtrunced, password, TRUNCSTRINGSIZE);
632 pwtrunced[TRUNCSTRINGSIZE - 1] = '\0'; /* enforce */
634 /* perhaps someone should put something here to check if password
635 is really long and syslog() a message denoting buffer attacks? */
637 if (pwp && strncmp(lastpath, path, STRINGSIZE))
645 if (!(pwp = PWOpen(path, "r")))
648 return "Cannot check password: dictionary unavailable";
650 strncpy(lastpath, path, STRINGSIZE);
653 return (FascistLook(pwp, pwtrunced));