From owner-freebsd-questions@FreeBSD.ORG Mon Jan 8 12:54:53 2007 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 1DB9216A40F for ; Mon, 8 Jan 2007 12:54:53 +0000 (UTC) (envelope-from kirk@strauser.com) Received: from kanga.honeypot.net (kanga.honeypot.net [208.162.254.122]) by mx1.freebsd.org (Postfix) with ESMTP id CFD3913C457 for ; Mon, 8 Jan 2007 12:54:50 +0000 (UTC) (envelope-from kirk@strauser.com) Received: from localhost (localhost [127.0.0.1]) by kanga.honeypot.net (Postfix) with ESMTP id 30FB2209C15 for ; Mon, 8 Jan 2007 06:54:50 -0600 (CST) X-Virus-Scanned: amavisd-new at honeypot.net Received: from kanga.honeypot.net ([127.0.0.1]) by localhost (kanga.honeypot.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G7ZT+Vannn-C for ; Mon, 8 Jan 2007 06:54:47 -0600 (CST) Received: from janus.daycos.com (janus.daycos.com [10.45.12.2]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by kanga.honeypot.net (Postfix) with ESMTP id 645B2206215 for ; Mon, 8 Jan 2007 06:54:47 -0600 (CST) From: Kirk Strauser To: freebsd-questions@freebsd.org Date: Mon, 8 Jan 2007 06:54:45 -0600 User-Agent: KMail/1.9.5 References: <45A22099.3060208@esiee.fr> In-Reply-To: X-Face: T+/_{qmjgbosI0J/e83I~w[&VF'w)!((xEpj///^bA/6?jHHS?nq+T8_+`nh"WnEWCWG, \}]Y2$)) =?utf-8?q?vLVz4ACChrEcb=7DCO=5EtYmMG=5C=0A=09ts=2Em=3F=5B7=5B6OwE*dAJ*9f+m?= =?utf-8?q?X=2E7R32qeN=5EDJ=5C?=(k@evW?IRQCy.^ MIME-Version: 1.0 Content-Type: multipart/signed; boundary="nextPart1549858.aULDDBLNkL"; protocol="application/pgp-signature"; micalg=pgp-sha1 Content-Transfer-Encoding: 7bit Message-Id: <200701080654.45757.kirk@strauser.com> Subject: Re: Adduser utility to generate "random" passwds ? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 08 Jan 2007 12:54:53 -0000 --nextPart1549858.aULDDBLNkL Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline On Monday 08 January 2007 5:26 am, Ivan Voras wrote: > Here's an idea: > > $ head -c 64 /dev/random | md5 | head -c 10 Hugely bad idea. Since md5 outputs hex, you're only getting 4 bits of=20 entropy per character. Much better to use something like sysutils/pwgen to= =20 generate good random passwords. =2D-=20 Kirk Strauser --nextPart1549858.aULDDBLNkL Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- iD8DBQBFoj8V5sRg+Y0CpvERAvZ6AJ0W4LKIjks9pV/cc1zLFtShBMvxBACfRjmZ HJeLqUXtoGCm9KMBSX5YqU8= =I5mg -----END PGP SIGNATURE----- --nextPart1549858.aULDDBLNkL--