Date: Tue, 30 Aug 2011 11:40:34 -0700 From: merlyn@stonehenge.com (Randal L. Schwartz) To: Michael Sierchio <kudzu@tenebras.com> Cc: Michael <mlmichael70@gmail.com>, "freebsd-questions@freebsd.org" <freebsd-questions@freebsd.org> Subject: Re: random generated password Message-ID: <86mxeqoi8t.fsf@red.stonehenge.com> In-Reply-To: <CAHu1Y71DmKEatXcx5yMLDEUwE2SpBNEgr=vZ-9DysPWEK4QDCQ@mail.gmail.com> (Michael Sierchio's message of "Tue, 30 Aug 2011 11:34:39 -0700") References: <4E5D28E0.5050700@gmail.com> <CAHu1Y72RGC5K2FPYk2Fq28zNkypAfg8YJrL=AQ6ht2S6wzf_nA@mail.gmail.com> <CAHu1Y71DmKEatXcx5yMLDEUwE2SpBNEgr=vZ-9DysPWEK4QDCQ@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
>>>>> "Michael" == Michael Sierchio <kudzu@tenebras.com> writes: Michael> dd if=/dev/random count=1 | tr -c "[:alnum:]" Michael> '0-9A-Za-z0-9A-Za-z0-9A-Za-a-z0-9A-Za-z' Michael> will give you the right kind of characters to use, for example. I prefer "openssl rand -base64 6" to get an 8-char password from a fairly large set of sensible characters. Each multiple of 3 results in 4 characters in the output. -- Randal L. Schwartz - Stonehenge Consulting Services, Inc. - +1 503 777 0095 <merlyn@stonehenge.com> <URL:http://www.stonehenge.com/merlyn/> Smalltalk/Perl/Unix consulting, Technical writing, Comedy, etc. etc. See http://methodsandmessages.posterous.com/ for Smalltalk discussion
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86mxeqoi8t.fsf>