Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 30 Aug 2011 11:40:34 -0700
From:      merlyn@stonehenge.com (Randal L. Schwartz)
To:        Michael Sierchio <kudzu@tenebras.com>
Cc:        Michael <mlmichael70@gmail.com>, "freebsd-questions@freebsd.org" <freebsd-questions@freebsd.org>
Subject:   Re: random generated password
Message-ID:  <86mxeqoi8t.fsf@red.stonehenge.com>
In-Reply-To: <CAHu1Y71DmKEatXcx5yMLDEUwE2SpBNEgr=vZ-9DysPWEK4QDCQ@mail.gmail.com> (Michael Sierchio's message of "Tue, 30 Aug 2011 11:34:39 -0700")
References:  <4E5D28E0.5050700@gmail.com> <CAHu1Y72RGC5K2FPYk2Fq28zNkypAfg8YJrL=AQ6ht2S6wzf_nA@mail.gmail.com> <CAHu1Y71DmKEatXcx5yMLDEUwE2SpBNEgr=vZ-9DysPWEK4QDCQ@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
>>>>> "Michael" == Michael Sierchio <kudzu@tenebras.com> writes:

Michael> dd if=/dev/random count=1 | tr -c "[:alnum:]"
Michael> '0-9A-Za-z0-9A-Za-z0-9A-Za-a-z0-9A-Za-z'

Michael> will give you the right kind of characters to use, for example.

I prefer "openssl rand -base64 6" to get an 8-char password from a
fairly large set of sensible characters.  Each multiple of 3 results in 4
characters in the output.

-- 
Randal L. Schwartz - Stonehenge Consulting Services, Inc. - +1 503 777 0095
<merlyn@stonehenge.com> <URL:http://www.stonehenge.com/merlyn/>;
Smalltalk/Perl/Unix consulting, Technical writing, Comedy, etc. etc.
See http://methodsandmessages.posterous.com/ for Smalltalk discussion



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86mxeqoi8t.fsf>