1 |
Hi Dale, |
2 |
|
3 |
On Sun, Feb 03, 2019 at 11:47:35PM -0600 , Dale wrote: |
4 |
> How do you, especially those who admin systems that are always being |
5 |
> hacked at, generate strong passwords that meet the above? |
6 |
|
7 |
I have a script for generating passwords the way I like (basically diceware on bash). |
8 |
|
9 |
Something like: |
10 |
FACTOR=$[ 2**(4*8)/$(cat "$WORDLIST"|wc -l) ] |
11 |
cat "$WORDLIST" | head -n "$[ $(od -vAn -N4 -tu4 < /dev/random ) / $FACTOR ]" | tail -1 |
12 |
|
13 |
I use this in conjunction with |
14 |
https://github.com/dwyl/english-words/blob/master/words.txt |
15 |
|
16 |
As far as I understand, if you have about 96 bits of entropy you are |
17 |
golden. 256 bits is unbruteforceable (at least within the realms of |
18 |
physics apparently). |
19 |
5 words = 94 bits (which is good enough for me) |
20 |
14 words = 256 bits (which seems like a lot of typing) |
21 |
|
22 |
I also have a messy spreadsheet for checking passwords. |
23 |
https://github.com/rjhwelsh/gpg-tutorial/blob/master/password_checker.ods |
24 |
|
25 |
I provide no warranty for my working. ;) |
26 |
|
27 |
-- |
28 |
|
29 |
Roger Welsh |
30 |
fpr: 2FCB 9E31 EA77 CDEC A3AE 5DD7 D54C C777 553A 180D |