Package: cryptcat
Version: 20031202-4
Severity: wishlist
Tags: upstream

Dear Maintainer,

To generate it's 128bit Key cryptcat uses the generateKey twofish2.cc this
function use only 4 Bit of every Character. If the password is to short
cryptcat cycle the pw. If it has more then 32 Characters it throws the rest
away.

This isn't a problem if you use a random 32 characters long random password.
But if the pw is short (short means up to around 16 random ISO-8859 characters)
it's breakable. Since you can find a simple one which decrypts the traffic too.
Same problem is if you use a really long password with low entropy. (which
could be secure.)

This should be at least mentioned in the man page. You can use cryptcat -k
$(echo "[PASSWD]" | md5sum) … what would solve the problem. So cryptcat can
be a useful tool, but you can misuse it really simple and you can only learn
how to use it if you look at the source.

I described the problem here with a vew examples: viewtopic.php?f=37&t=143408
(It's german but there are some tools which can trnslates this ;-)).

greetings,
wanne



-- System Information:
Debian Release: 7.1
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages cryptcat depends on:
ii  libc6       2.13-38
ii  libgcc1     1:4.7.2-5
ii  libstdc++6  4.7.2-5

cryptcat recommends no packages.

cryptcat suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to