hi
afaik (pls fix if not) from OpenBSD 5.1 arandom replaces urandom, no?
why use arandom?
# uname -mrs
OpenBSD 6.0 amd64
# ls -lah /dev/*random
crw-r--r-- 1 root wheel 45, 3 Jan 15 12:28 /dev/arandom
crw-r--r-- 1 root wheel 45, 0 Jan 18 11:20 /dev/random
crw-r--r-- 1 root wheel 45, 1 Jan 15 12:28 /dev/srandom
crw-r--r-- 1 root wheel 45, 2 Jan 15 12:28 /dev/urandom
#
generating a 63 character long password with random stuff
tr -dc "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789
\!\"#$%&'()*+,-./:;<=>?@[\\\]^_\`{|}~"</dev/urandom|fold -w63 | head -1
the tr oneliner on pastebin, since it could be screwed in the mail:
https://pastebin.com/raw/4LtRXdTW
remove the unneeded chars
the only good password is a very long password :)
> Sent: Tuesday, January 17, 2017 at 11:35 PM
> From: "Christian Weisgerber" <[email protected]>
> To: [email protected]
> Subject: Re: A couple of password pointers to avoid failed login(1) via cu(1)
>
> On 2017-01-17, Jonathan Thornburg <[email protected]> wrote:
>
> > A much safer -- and easier -- approach is to take data
> > directly from /dev/arandom and encode it as alphanumerics:
>
> Yep.
>
> > This makes use of the following script 'alphanumeric.encode', which
> > should be somewhere in $PATH:
>
> Or simply:
> openssl rand -base64 <bytes>
>
> --
> Christian "naddy" Weisgerber [email protected]