Date: Tue, 10 Jul 2001 23:52:06 +0900 (JST) From: HIRATA Yasuyuki <yasu@asuka.net> To: mike@sentex.net Cc: stable@FreeBSD.ORG Subject: Re: Generating encrypted passwords Message-ID: <20010710235206S.yasu@asuka.net> In-Reply-To: <5.1.0.14.0.20010710102259.04255440@marble.sentex.ca> References: <4.2.2.20010710081901.05a68008@192.168.0.12> <20010710220142V.yasu@asuka.net> <5.1.0.14.0.20010710102259.04255440@marble.sentex.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi, From: Mike Tancsa <mike@sentex.net> To: HIRATA Yasuyuki <yasu@asuka.net> Subject: Re: Generating encrypted passwords Date: Tue, 10 Jul 2001 10:24:55 -0400 Message-ID: <5.1.0.14.0.20010710102259.04255440@marble.sentex.ca> > > > What about a > > > srand (time ^ $$ ^ unpack "%L*", `ps -auxw | gzip`); > > > > > > at the start of your program > > > >If you use perl 5.005 or later, it's better to call srand without seed > >or not to call srand at all. See perldoc -f srand for detail. > > Hi, > but the same perldoc says, > > .... > Note that you need something much more random than the default seed for > cryptographic purposes. Checksumming the compressed output of one or more > rapidly changing operating system status programs is the usual method. For > example: > > srand (time ^ $$ ^ unpack "%L*", `ps axww | gzip`); Oh, I missed the purpose. In this case, checksumming the gzip's output seems better. Thanks. ---- HIRATA Yasuyuki http://yasu.asuka.net/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010710235206S.yasu>