[![Build Status](https://api.travis-ci.org/kolypto/py-password-strength.png?branch=master)](https://travis-ci.org/kolypto/py-password-strength)
[![Pythons](https://img.shields.io/badge/python-2.7%20%7C%203.4%E2%80%933.7%20%7C%20pypy-blue.svg)](.travis.yml)
Password Strength
=================
Password strength and validation.
Tutorial
========
### Uppercase, Numbers, Special Characters
You test your passwords using the Policy object that controls what kind of password is acceptable in your system.
First, create the Policy object and define the rules that apply to passwords in your system:
```python
from password_strength import PasswordPolicy
policy = PasswordPolicy.from_names(
length=8, # min length: 8
uppercase=2, # need min. 2 uppercase letters
numbers=2, # need min. 2 digits
special=2, # need min. 2 special characters
nonletters=2, # need min. 2 non-letter characters (digits, specials, anything)
)
```
Now, when you have the `PasswordPolicy` object, you can use it to test your passwords,
and it will tell you which tests have failed:
```python
policy.test('ABcd12!')
# -> [Length(8), Special(2)]
```
This tells us that 2 tests have failed: password is not long enough, and it does not have enough special characters.
You can use this information to tell the user what precisely is wrong with their password.
```python
policy.test('ABcd12!@')
# -> []
```
Empty list tells us that this password is alright.
This test, however, enabled uses to use passwords that have a lot of repetition.
### So-Called Entropy Bits
Here's a test that's even better. You don't really need to define complex rules with special characters and stuff.
All you actually need is a password that's long enough, complex enough, and easy to remember
(see [xkcd](https://xkcd.com/936/) and
[Article: Everything We've Been Told About Passwords Is Wrong](https://www.inc.com/thomas-koulopoulos/all-that-advice-about-passwords-turns-out-to-be-to.html)).
So, instead of defining all these rules, let's just require the password to be complex enough.
Entropy bits is something that defines how much variety does your password have. '01111010010011' is long enough,
but has only 2 entropy bits: that's how many bits you need to store its alphabet. However, a password that uses
plenty of characters has more entropy.
```python
policy = PasswordPolicy.from_names(
entropybits=30 # need a password that has minimum 30 entropy bits (the power of its alphabet)
)
print(policy.test('0123456789'))
# -> []
```
This password is not long enough, or secure enough, but has enough entropy: its vocabulary has 10 different characters.
Put this test together with other requirements to make sure there's no repetition in your passwords.
### Complexity
Entropy bits are important, but difficult to understand. An even better, more intuitive test, is to require
the password to be "complex enough".
Complexity is a number in the range of 0.00..0.99. Good, strong passwords start at 0.66.
Let's first see how different passwords score:
```python
from password_strength import PasswordStats
stats = PasswordStats('qwerty123')
print(stats.strength()) #-> Its strength is 0.316
stats = PasswordStats('G00dPassw0rd?!')
print(stats.strength()) #-> Its strength is 0.585
stats = PasswordStats('V3ryG00dPassw0rd?!')
print(stats.strength()) #-> Its strength is 0.767
```
So, 0.66 will be a very good indication of a good password.
Let's implement our policy:
```python
policy = PasswordPolicy.from_names(
strength=0.66 # need a password that scores at least 0.5 with its strength
)
print(policy.test('V3ryG00dPassw0rd?!'))
# -> [] -- empty list means a good password
```
One good thing about using strength is that it allows users to use national aplhabets with passwords,
which are most secure:
```python
tested_pass = policy.password('Mixed-汉堡包/漢堡包, 汉堡/漢堡')
print(tested_pass.strength()) # -> 0.812 -- very good!
print(tested_pass.test())
#-> [] - good password; it actually scored 0.812
```
Notice how in the last example we use a different approach: `policy.password()` analyzes the password, and then we can
both get its `.strength()`, and `.test()` it according to the current policy.
PasswordPolicy
==============
Perform tests on a password.
Init Policy
-----------
```python
PasswordPolicy(*tests)
```
Init password policy with a list of tests
Alternatively:
```python
PasswordPolicy.from_names(**tests)
```
Init password policy from a dictionary of test definitions.
A test definition is simply:
{ test-name: argument } or { test-name: [arguments] }
Test name is just a lowercased class name.
Example:
PasswordPolicy.from_names(
length=8,
strength=(0.33, 30),
)
Bundled Tests
-------------
These objects perform individual tests on a password, and report `True` of `False`.
#### tests.EntropyBits(bits)
Test whether the password has >= `bits` entropy bits.
Entropy bits is the number of bits that is required to store the alphabet that's used in a password.
It's a measure of how long is the alphabet.
#### tests.Length(length)
Tests whether password length >= `length`
#### tests.NonLetters(count)
Test whether the password has >= `count` non-letter characters
#### tests.NonLettersLc(count)
Test whether the password has >= `count` non-lowercase characters
#### tests.Numbers(count)
Test whether the password has >= `count` numeric characters
#### tests.Special(count)
Test whether the password has >= `count` special characters
#### tests.Strength(strength, weak_bits=30)
Test whether the password has >= `strength` strength.
A password is evaluated to the strength of 0.333 when it has `weak_bits` entropy bits,
which is considered to be a weak password. Strong passwords start at 0.666.
#### tests.Uppercase(count)
Test whether the password has >= `count` uppercase characters
Testing
-------
After the `PasswordPolicy` is initialized, there are two methods to test:
### PasswordPolicy.password
```python
password(password)
```
Get password stats bound to the tests declared in this policy.
If in addition to tests you need to get statistics (e.g. strength) -- use this object to double calculations.
See [`PasswordStats`](#passwordstats) for more details.
### PasswordPolicy.test
```python
test(password)
```
Perform tests on a password.
Shortcut for: `PasswordPolicy.password(password).test()`.
Custom Tests
------------
ATest is a base class for password tests.
To create a custom test, just subclass it and implement the following methods:
* __init__() that takes configuration arguments
* test(ps) that tests a password, where `ps` is a `PasswordStats` object.
PasswordStats
-------------
PasswordStats allows to calculate statistics on a password.
It considers a password as a unicode string, and all statistics are unicode-based.
Constructor:
```python
from password_strength import PasswordStats
PasswordStats(password)
```
#### PasswordStats.alphabet
Get alphabet: set of used characters
#### PasswordStats.alphabet_cardinality
Get alphabet cardinality: alphabet length
#### PasswordStats.char_categories
Character count per top-level category
The following top-level categories are defined:
- L: letter
- M: Mark
- N: Number
- P: Punctuation
- S: Symbol
- Z: Separator
- C: Other
#### PasswordStats.char_categories_detailed
Character count per unicode category, detailed format.
See: http://www.unicode.org/reports/tr44/#GC_Values_Table
#### PasswordStats.combinations
The number of possible combinations with the current alphabet
#### PasswordStats.count(*categories)
Count characters of the specified classes only
#### PasswordStats.count_except(*categories)
Count characters of all classes except the specified ones
#### PasswordStats.entropy_bits
Get information entropy bits: log2 of the number of possible passwords
https://en.wikipedia.org/wiki/Password_strength
#### PasswordStats.entropy_density
Get information entropy density factor, ranged {0 .. 1}.
This is ratio of entropy_bits() to max bits a password of this length could have.
E.g. if all characters are unique -- then it's 1.0.
If half of the characters are reused once -- then it's 0.5.
#### PasswordStats.length
Get password length
#### PasswordStats.letters
Count all letters
#### PasswordStats.letters_lowercase
Count lowercase letters
#### PasswordStats.letters_uppercase
Count uppercase letters
#### PasswordStats.numbers
Count numbers
#### PasswordStats.repeated_patterns_length
Detect and return the length of repeated patterns.
You will probably be comparing it with the length of the password itself and ban if it's longer than 10%
#### PasswordStats.sequences_length
Detect and return the length of used sequences:
- Alphabet letters: abcd...
- Keyboard letters: qwerty, etc
- Keyboard special characters in the top row: ~!@#$%^&*()_+
- Numbers: 0123456
#### PasswordStats.special_characters
Count special characters
Special characters is everything that's not a letter or a number
#### PasswordStats.strength(weak_bits=30)
Get password strength as a number normalized to range {0 .. 1}.
Normalization is done in the following fashion:
1. If entropy_bits <= weak_bits -- linear in range{0.0 .. 0.33} (weak)
2. If entropy_bits <= weak_bits*2 -- almost linear in range{0.33 .. 0.66} (medium)
3. If entropy_bits > weak_bits*3 -- asymptotic towards 1.0 (strong)
#### PasswordStats.test(tests)
Test the password against a list of tests
#### PasswordStats.weakness_factor
Get weakness factor as a float in range {0 .. 1}
This detects the portion of the string that contains:
* repeated patterns
* sequences
E.g. a value of 1.0 means the whole string is weak, and 0.5 means half of the string is weak.
Typical usage:
password_strength = (1 - weakness_factor) * strength
Raw data
{
"_id": null,
"home_page": "https://github.com/kolypto/py-password-strength",
"name": "password-strength",
"maintainer": "",
"docs_url": null,
"requires_python": "",
"maintainer_email": "",
"keywords": "password,strength,policy,security",
"author": "Mark Vartanyan",
"author_email": "kolypto@gmail.com",
"download_url": "https://files.pythonhosted.org/packages/db/f1/6165ebcca27fca3f1d63f8c3a45805c2ed8568be4d09219a2aa45e792c14/password_strength-0.0.3.post2.tar.gz",
"platform": "any",
"description": "[![Build Status](https://api.travis-ci.org/kolypto/py-password-strength.png?branch=master)](https://travis-ci.org/kolypto/py-password-strength)\n[![Pythons](https://img.shields.io/badge/python-2.7%20%7C%203.4%E2%80%933.7%20%7C%20pypy-blue.svg)](.travis.yml)\n\n\nPassword Strength\n=================\n\nPassword strength and validation.\n\n\nTutorial\n========\n\n\n### Uppercase, Numbers, Special Characters\n\nYou test your passwords using the Policy object that controls what kind of password is acceptable in your system.\n\nFirst, create the Policy object and define the rules that apply to passwords in your system:\n\n```python\nfrom password_strength import PasswordPolicy\n\npolicy = PasswordPolicy.from_names(\n length=8, # min length: 8\n uppercase=2, # need min. 2 uppercase letters\n numbers=2, # need min. 2 digits\n special=2, # need min. 2 special characters\n nonletters=2, # need min. 2 non-letter characters (digits, specials, anything)\n)\n```\n\nNow, when you have the `PasswordPolicy` object, you can use it to test your passwords,\nand it will tell you which tests have failed:\n\n```python\npolicy.test('ABcd12!')\n# -> [Length(8), Special(2)]\n```\n\nThis tells us that 2 tests have failed: password is not long enough, and it does not have enough special characters.\nYou can use this information to tell the user what precisely is wrong with their password.\n\n```python\npolicy.test('ABcd12!@')\n# -> []\n```\n\nEmpty list tells us that this password is alright.\n\nThis test, however, enabled uses to use passwords that have a lot of repetition.\n\n### So-Called Entropy Bits\n\nHere's a test that's even better. You don't really need to define complex rules with special characters and stuff.\nAll you actually need is a password that's long enough, complex enough, and easy to remember\n(see [xkcd](https://xkcd.com/936/) and\n[Article: Everything We've Been Told About Passwords Is Wrong](https://www.inc.com/thomas-koulopoulos/all-that-advice-about-passwords-turns-out-to-be-to.html)).\n\nSo, instead of defining all these rules, let's just require the password to be complex enough.\nEntropy bits is something that defines how much variety does your password have. '01111010010011' is long enough,\nbut has only 2 entropy bits: that's how many bits you need to store its alphabet. However, a password that uses\nplenty of characters has more entropy.\n\n```python\npolicy = PasswordPolicy.from_names(\n entropybits=30 # need a password that has minimum 30 entropy bits (the power of its alphabet)\n)\n\nprint(policy.test('0123456789'))\n# -> []\n```\n\nThis password is not long enough, or secure enough, but has enough entropy: its vocabulary has 10 different characters.\nPut this test together with other requirements to make sure there's no repetition in your passwords.\n\n### Complexity\n\nEntropy bits are important, but difficult to understand. An even better, more intuitive test, is to require\nthe password to be \"complex enough\".\nComplexity is a number in the range of 0.00..0.99. Good, strong passwords start at 0.66.\n\nLet's first see how different passwords score:\n\n```python\nfrom password_strength import PasswordStats\n\nstats = PasswordStats('qwerty123')\nprint(stats.strength()) #-> Its strength is 0.316\n\nstats = PasswordStats('G00dPassw0rd?!')\nprint(stats.strength()) #-> Its strength is 0.585\n\nstats = PasswordStats('V3ryG00dPassw0rd?!')\nprint(stats.strength()) #-> Its strength is 0.767\n```\n\nSo, 0.66 will be a very good indication of a good password.\nLet's implement our policy:\n\n```python\npolicy = PasswordPolicy.from_names(\n strength=0.66 # need a password that scores at least 0.5 with its strength\n)\n\nprint(policy.test('V3ryG00dPassw0rd?!'))\n# -> [] -- empty list means a good password\n```\n\nOne good thing about using strength is that it allows users to use national aplhabets with passwords,\nwhich are most secure:\n\n```python\ntested_pass = policy.password('Mixed-\u6c49\u5821\u5305/\u6f22\u5821\u5305, \u6c49\u5821/\u6f22\u5821')\nprint(tested_pass.strength()) # -> 0.812 -- very good!\nprint(tested_pass.test())\n#-> [] - good password; it actually scored 0.812\n```\n\nNotice how in the last example we use a different approach: `policy.password()` analyzes the password, and then we can\nboth get its `.strength()`, and `.test()` it according to the current policy.\n\nPasswordPolicy\n==============\n\nPerform tests on a password.\n\nInit Policy\n-----------\n\n```python\nPasswordPolicy(*tests)\n```\n\nInit password policy with a list of tests\n\nAlternatively:\n\n```python\nPasswordPolicy.from_names(**tests)\n```\n\nInit password policy from a dictionary of test definitions.\n\nA test definition is simply:\n\n { test-name: argument } or { test-name: [arguments] }\n\nTest name is just a lowercased class name.\n\nExample:\n\n PasswordPolicy.from_names(\n length=8,\n strength=(0.33, 30),\n )\n\n\nBundled Tests\n-------------\n\nThese objects perform individual tests on a password, and report `True` of `False`.\n\n\n#### tests.EntropyBits(bits)\nTest whether the password has >= `bits` entropy bits.\n\nEntropy bits is the number of bits that is required to store the alphabet that's used in a password.\nIt's a measure of how long is the alphabet.\n\n#### tests.Length(length)\nTests whether password length >= `length`\n\n#### tests.NonLetters(count)\nTest whether the password has >= `count` non-letter characters\n\n#### tests.NonLettersLc(count)\nTest whether the password has >= `count` non-lowercase characters\n\n#### tests.Numbers(count)\nTest whether the password has >= `count` numeric characters\n\n#### tests.Special(count)\nTest whether the password has >= `count` special characters\n\n#### tests.Strength(strength, weak_bits=30)\nTest whether the password has >= `strength` strength.\n\nA password is evaluated to the strength of 0.333 when it has `weak_bits` entropy bits,\nwhich is considered to be a weak password. Strong passwords start at 0.666.\n\n#### tests.Uppercase(count)\nTest whether the password has >= `count` uppercase characters\n\n\nTesting\n-------\n\nAfter the `PasswordPolicy` is initialized, there are two methods to test:\n\n### PasswordPolicy.password\n```python\npassword(password)\n```\nGet password stats bound to the tests declared in this policy.\n\nIf in addition to tests you need to get statistics (e.g. strength) -- use this object to double calculations.\n\nSee [`PasswordStats`](#passwordstats) for more details.\n\n### PasswordPolicy.test\n```python\ntest(password)\n```\nPerform tests on a password.\n\nShortcut for: `PasswordPolicy.password(password).test()`.\n\n\nCustom Tests\n------------\n\nATest is a base class for password tests.\n\nTo create a custom test, just subclass it and implement the following methods:\n\n* __init__() that takes configuration arguments\n* test(ps) that tests a password, where `ps` is a `PasswordStats` object.\n\n\nPasswordStats\n-------------\n\nPasswordStats allows to calculate statistics on a password.\n\nIt considers a password as a unicode string, and all statistics are unicode-based.\n\nConstructor:\n\n```python\nfrom password_strength import PasswordStats\nPasswordStats(password)\n```\n\n\n#### PasswordStats.alphabet\nGet alphabet: set of used characters\n\n#### PasswordStats.alphabet_cardinality\nGet alphabet cardinality: alphabet length\n\n#### PasswordStats.char_categories\nCharacter count per top-level category\n\nThe following top-level categories are defined:\n\n- L: letter\n- M: Mark\n- N: Number\n- P: Punctuation\n- S: Symbol\n- Z: Separator\n- C: Other\n\n#### PasswordStats.char_categories_detailed\nCharacter count per unicode category, detailed format.\n\nSee: http://www.unicode.org/reports/tr44/#GC_Values_Table\n\n#### PasswordStats.combinations\nThe number of possible combinations with the current alphabet\n\n#### PasswordStats.count(*categories)\nCount characters of the specified classes only\n\n#### PasswordStats.count_except(*categories)\nCount characters of all classes except the specified ones\n\n#### PasswordStats.entropy_bits\nGet information entropy bits: log2 of the number of possible passwords\n\nhttps://en.wikipedia.org/wiki/Password_strength\n\n#### PasswordStats.entropy_density\nGet information entropy density factor, ranged {0 .. 1}.\n\nThis is ratio of entropy_bits() to max bits a password of this length could have.\nE.g. if all characters are unique -- then it's 1.0.\nIf half of the characters are reused once -- then it's 0.5.\n\n#### PasswordStats.length\nGet password length\n\n#### PasswordStats.letters\nCount all letters\n\n#### PasswordStats.letters_lowercase\nCount lowercase letters\n\n#### PasswordStats.letters_uppercase\nCount uppercase letters\n\n#### PasswordStats.numbers\nCount numbers\n\n#### PasswordStats.repeated_patterns_length\nDetect and return the length of repeated patterns.\n\nYou will probably be comparing it with the length of the password itself and ban if it's longer than 10%\n\n#### PasswordStats.sequences_length\nDetect and return the length of used sequences:\n\n- Alphabet letters: abcd...\n- Keyboard letters: qwerty, etc\n- Keyboard special characters in the top row: ~!@#$%^&*()_+\n- Numbers: 0123456\n\n#### PasswordStats.special_characters\nCount special characters\n\nSpecial characters is everything that's not a letter or a number\n\n#### PasswordStats.strength(weak_bits=30)\nGet password strength as a number normalized to range {0 .. 1}.\n\nNormalization is done in the following fashion:\n\n1. If entropy_bits <= weak_bits -- linear in range{0.0 .. 0.33} (weak)\n2. If entropy_bits <= weak_bits*2 -- almost linear in range{0.33 .. 0.66} (medium)\n3. If entropy_bits > weak_bits*3 -- asymptotic towards 1.0 (strong)\n\n#### PasswordStats.test(tests)\nTest the password against a list of tests\n\n#### PasswordStats.weakness_factor\nGet weakness factor as a float in range {0 .. 1}\n\nThis detects the portion of the string that contains:\n* repeated patterns\n* sequences\n\nE.g. a value of 1.0 means the whole string is weak, and 0.5 means half of the string is weak.\n\nTypical usage:\n\npassword_strength = (1 - weakness_factor) * strength\n\n\n\n",
"bugtrack_url": null,
"license": "BSD",
"summary": "Password strength and validation",
"version": "0.0.3.post2",
"project_urls": {
"Homepage": "https://github.com/kolypto/py-password-strength"
},
"split_keywords": [
"password",
"strength",
"policy",
"security"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "1cd608fd888c980589e4e27c2a4177e972481e8881600138e63afb785fe52630",
"md5": "a263f73a27448b421e2f61b501dbf1d3",
"sha256": "6739357c2863d707b7c7f247ff7c6882a70904a18d12c9aaf98f8b95da176fb9"
},
"downloads": -1,
"filename": "password_strength-0.0.3.post2-py2.py3-none-any.whl",
"has_sig": false,
"md5_digest": "a263f73a27448b421e2f61b501dbf1d3",
"packagetype": "bdist_wheel",
"python_version": "py2.py3",
"requires_python": null,
"size": 12167,
"upload_time": "2019-01-04T13:41:27",
"upload_time_iso_8601": "2019-01-04T13:41:27.497860Z",
"url": "https://files.pythonhosted.org/packages/1c/d6/08fd888c980589e4e27c2a4177e972481e8881600138e63afb785fe52630/password_strength-0.0.3.post2-py2.py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "dbf16165ebcca27fca3f1d63f8c3a45805c2ed8568be4d09219a2aa45e792c14",
"md5": "cb3ccecfc2682d3a6abe7f2d9a1da192",
"sha256": "bf4df10a58fcd3abfa182367307b4fd7b1cec518121dd83bf80c1c42ba796762"
},
"downloads": -1,
"filename": "password_strength-0.0.3.post2.tar.gz",
"has_sig": false,
"md5_digest": "cb3ccecfc2682d3a6abe7f2d9a1da192",
"packagetype": "sdist",
"python_version": "source",
"requires_python": null,
"size": 12857,
"upload_time": "2019-01-04T13:41:29",
"upload_time_iso_8601": "2019-01-04T13:41:29.711071Z",
"url": "https://files.pythonhosted.org/packages/db/f1/6165ebcca27fca3f1d63f8c3a45805c2ed8568be4d09219a2aa45e792c14/password_strength-0.0.3.post2.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2019-01-04 13:41:29",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "kolypto",
"github_project": "py-password-strength",
"travis_ci": true,
"coveralls": false,
"github_actions": false,
"tox": true,
"lcname": "password-strength"
}