![]() gpw (focuses heavily on pronounceability, not recommended).otp (meant for one-time pads, not recommended).Again in Debian: apt-cache show $DESIRED_PACKAGE Using password generat instead broadens the search.īefore installing the package it can be useful to view its description. It does do an exact (though case-insensitive) search. In Debian this is: apt-cache search password generator You can find them using the search function from your distribution. I just happen to know pwgen, there are other tools out there. pwgen -sĪre the generated passwords too long? Too short? Just append the desired length: pwgen 9 To disable that and create more secure passwords, use the -secure or -s flag. It attempts to make passwords that are easy to remember. Apart from coreutils, that version also requires a dictionary file, here the one for British English. (this one works only on a 64-bit host will you notice why ?). Arguably, this split into small sequences may help reading.įor a much longer line and a quite distinct kind of password, try this: for i in do head -$(expr $(head -c7 /dev/urandom | od -An -t dL) % $(wc -l < /usr/share/dict/british-english)) /usr/share/dict/british-english | tail -1 done This displays eight sequences of four hexadecimal digits. Yet another one: od -An -x /dev/urandom | head -1 The characters are letters (uppercase and lowercase) and digits since 62 22 is greater than 2 128, the 22 characters are sufficient. This one generates a 22-character password, using /dev/urandom as internal source of randomness (I checked in the source code, and a strace call confirms). Still limiting yourself to commands from coreutils, you can do this: mktemp -u XXXXXXXXXXXXXXXXXXXXXX the "newline" character, is 2 -128, hence this line still gets 128 bits of entropy.) (Probability of getting all first 16 random bytes as 0x0A, i.e. If you want to type one less characters, try this: head -16 /dev/urandom | md5sum ![]() This variant produces passwords with only lowercase letters, from 'a' to 'p' (this is what you will want if you have to "type" the password on a smartphone): head -c16 /dev/urandom | md5sum | tr 0-9 g-p If you want to use only hexadecimal characters, you will need 32 of them to reach 128 bits of entropy this line will work (using only commands from the coreutils package): head -c16 /dev/urandom | md5sum It depends on what you mean by "readable".
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |