Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 10 Jul 2001 23:52:06 +0900 (JST)
From:      HIRATA Yasuyuki <yasu@asuka.net>
To:        mike@sentex.net
Cc:        stable@FreeBSD.ORG
Subject:   Re: Generating encrypted passwords
Message-ID:  <20010710235206S.yasu@asuka.net>
In-Reply-To: <5.1.0.14.0.20010710102259.04255440@marble.sentex.ca>
References:  <4.2.2.20010710081901.05a68008@192.168.0.12> <20010710220142V.yasu@asuka.net> <5.1.0.14.0.20010710102259.04255440@marble.sentex.ca>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi,

From: Mike Tancsa <mike@sentex.net>
To: HIRATA Yasuyuki <yasu@asuka.net>
Subject: Re: Generating encrypted passwords
Date: Tue, 10 Jul 2001 10:24:55 -0400
Message-ID: <5.1.0.14.0.20010710102259.04255440@marble.sentex.ca>

> > > What about a
> > > srand (time ^ $$ ^ unpack "%L*", `ps -auxw | gzip`);
> > >
> > > at the start of your program
> >
> >If you use perl 5.005 or later, it's better to call srand without seed
> >or not to call srand at all.  See perldoc -f srand for detail.
> 
> Hi,
> but the same perldoc says,
> 
> ....
> Note that you need something much more random than the default seed for
> cryptographic purposes.  Checksumming the compressed output of one or more
> rapidly changing operating system status programs is the usual method.  For
> example:
> 
>      srand (time ^ $$ ^ unpack "%L*", `ps axww | gzip`);

Oh, I missed the purpose.  In this case, checksumming the gzip's
output seems better.

Thanks.

----
HIRATA Yasuyuki  http://yasu.asuka.net/

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-stable" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010710235206S.yasu>