hi

afaik (pls fix if not) from OpenBSD 5.1 arandom replaces urandom, no?

why use arandom? 

# uname -mrs
OpenBSD 6.0 amd64
# ls -lah /dev/*random 
crw-r--r--  1 root  wheel   45,   3 Jan 15 12:28 /dev/arandom
crw-r--r--  1 root  wheel   45,   0 Jan 18 11:20 /dev/random
crw-r--r--  1 root  wheel   45,   1 Jan 15 12:28 /dev/srandom
crw-r--r--  1 root  wheel   45,   2 Jan 15 12:28 /dev/urandom
# 

generating a 63 character long password with random stuff

tr -dc "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789 
\!\"#$%&'()*+,-./:;<=>?@[\\\]^_\`{|}~"</dev/urandom|fold -w63 | head -1

the tr oneliner on pastebin, since it could be screwed in the mail:
https://pastebin.com/raw/4LtRXdTW

remove the unneeded chars

the only good password is a very long password :)



> Sent: Tuesday, January 17, 2017 at 11:35 PM
> From: "Christian Weisgerber" <[email protected]>
> To: [email protected]
> Subject: Re: A couple of password pointers to avoid failed login(1) via cu(1)
>
> On 2017-01-17, Jonathan Thornburg <[email protected]> wrote:
> 
> > A much safer -- and easier -- approach is to take data
> > directly from /dev/arandom and encode it as alphanumerics:
> 
> Yep.
> 
> > This makes use of the following script 'alphanumeric.encode', which 
> > should be somewhere in $PATH:
> 
> Or simply:
> openssl rand -base64 <bytes>
> 
> -- 
> Christian "naddy" Weisgerber                          [email protected]

Reply via email to