-
-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Option to show pattern info when generating a token #18
Comments
This is an interesting feature request, and one that is easy to implement. I'll have to think a bit about what information to include, because besides the length and entropy, I could also say if it contains letters/numbers/specials/etc., but also what it's suitable for (authentication/short-term-encryption/archival/etc.). About the tweaking, note that the Also note that the |
Yeah, it might be just me, but once you pick a pattern and generate a auth-token, it's only then you wonder how making it shorter/longer will impact entropy estimation and overall ease of typing. Opening "patterns" again for that is definitely an option, but changing number in last command seem to be a lot easier with a typical shell/terminal interface, at least for me, and first thing I reached out was adding -h to see if there was some kind of verbosity toggle listed at the top or bottom of option list.
It wasn't immediately obvious for me that it is a usable example, and not e.g. a hardcoded one.
I'd reached for But again, might be just me thinking this particular way.
Yeah, I noticed that, iirc from some example usage, but then when noticed that option exists, started adding it, with the logic going something like this: "idk how argument works, it doesn't seem to be documented, and option is there, so better use it, in case argument does something similar but different". |
OK, after a long time, I've implemented this like so:
If one wants less verbose output, the @mk-fg is this output suitable for your use-case? |
Yes, it looks awesome, thanks! That's indeed what I'd always want to use manually, with couple patters that I remember and/or have in shell history, to remind me what those were for, if nothing else. Maybe also worth adding actual target values to "usable for" categories like "cryptography", so that one somewhat familiar with those, can sanity-check if they're up-to-date and up to their definitions of these use-cases at a glance, for example:
I'd also worry about "bruteforce time" section having not enough context:
And afaik bruteforcing credentials is a bit of a cottage-industry craft too, with other less obvious variables in there, but idk, also easy to ignore of course, just a bit worrying that it might be quite misleading, especially couple years down the line. EDIT: it's not "no context" as I initially wrote, somehow forgetting the actual output while writing the comment, but I think still not quite enough of it to understand those values for me. |
Also, a note on the list of bruteforce times for common password-storage algorithms above:
Maybe those are also worth adding there? Though guess at some point maybe such list of algos (esp. with diff parameters) would be way too long to display, not sure if it kinda is already. |
It's a good idea, I'll try to tackle these when I have some more time. (BTW, one could deduce at the moment the target bits, by adding the reported entropy bits and the remaining bits of margin.) With regard to bruteforce, I've started a discussion thread at #24. |
Hi,
When manually generating a token according to some selected pattern in the shell, I find that it's tempting to try tweaking the pattern to see how it'd change from e.g. adding one more word or removing it.
Problem though, is that z-tokens does not display such information about the pattern when generating the token.
Maybe adding some
-v/--verbose
option to "generate" command would help with that?I.e. so that manual tinkering like this:
Can look something like this instead:
Don't think I'll make a PR for it myself, unfortunately.
Thanks.
The text was updated successfully, but these errors were encountered: