From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id B25A5138334 for ; Mon, 4 Feb 2019 10:37:17 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 4468FE0985; Mon, 4 Feb 2019 10:37:11 +0000 (UTC) Received: from smarthost03d.mail.zen.net.uk (smarthost03d.mail.zen.net.uk [212.23.1.23]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id D6C40E092E for ; Mon, 4 Feb 2019 10:37:10 +0000 (UTC) Received: from [82.69.83.178] (helo=mail.digimed.co.uk) by smarthost03d.mail.zen.net.uk with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1gqbcj-0006mC-G9 for gentoo-user@lists.gentoo.org; Mon, 04 Feb 2019 10:37:09 +0000 Received: from digimed.co.uk (fenchurch.digimed.co.uk [192.168.1.6]) by mail.digimed.co.uk (Postfix) with ESMTPA id 081CA656C2 for ; Mon, 4 Feb 2019 10:37:09 +0000 (GMT) Date: Mon, 4 Feb 2019 10:37:03 +0000 From: Neil Bothwick To: gentoo-user@lists.gentoo.org Subject: Re: [gentoo-user] Coming up with a password that is very strong. Message-ID: <20190204103703.184d5001@digimed.co.uk> In-Reply-To: <2593531.BapclQZ6Rp@peak> References: <8d027455-f210-c399-f5a7-bfb05692cc5f@gmail.com> <2593531.BapclQZ6Rp@peak> Organization: Digital Media Production X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) X-GPG-Fingerprint: 7260 0F33 97EC 2F1E 7667 FE37 BA6E 1A97 4375 1903 Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; boundary="Sig_/yI+u+Ng=hWgiGB.uY9oF7aT"; protocol="application/pgp-signature" X-Originating-smarthost03d-IP: [82.69.83.178] Feedback-ID: 82.69.83.178 X-Archives-Salt: 4eabfb4a-36e4-42d9-a885-a805c273b8d7 X-Archives-Hash: 9eb59c9f7a0722f61b0188aaefe44ae7 --Sig_/yI+u+Ng=hWgiGB.uY9oF7aT Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable On Mon, 04 Feb 2019 10:24:27 +0000, Peter Humphrey wrote: > > How do you, especially those who admin systems that are always being > > hacked at, generate strong passwords that meet the above? I've > > googled and found some ideas but if I use the same method, well, how > > many others are using that same method, if you know what I > > mean. ;-) Just looking for ideas. =20 >=20 > You could use a password generator to keep creating random passwords > until it comes up with something you like the look of, then learn it by > rote. I did that some time ago - it must be about time I did it again > to make another one. https://xkcd.com/936/ --=20 Neil Bothwick There's too much blood in my caffeine system. --Sig_/yI+u+Ng=hWgiGB.uY9oF7aT Content-Type: application/pgp-signature Content-Description: OpenPGP digital signature -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEGfLZTV7dXdQXh/dDdCdyyQfftocFAlxYFc8ACgkQdCdyyQff toefrhAAiTSPNPyjFd7cpUamm1LD92iFEorjEPvDYJO0eNpR8vnDLlhy7cpsqrQ2 RdJ5/AbuE0zssNMZCLJHH4ljaegwU7qaDjfjBigghKMkp4rQFt9clZ8L17QEAXal hSmmSS9H1eUk8IL6CBnwF2RhUD2sKNpX7RcmROLjCPfXTLdq7Rfjk8wqq971fEwZ /yoifmrLPINrd2VslTbdSs8TekMVeM/EwmhUwed8HxLofP8qDSUWqNooSjGic97U kSIJuIdzE+QatUs5susfPtGUCrkIgkNFlBG8wQporAI+EHVM+k3H9f2heyIQcDDp ag7olUTBY49rGS68ZUFwQWooZcl0QNYLoP1MvaJS7eMi56feXvvRRPSd8zs9AONP eGBcm0A8zRG8h+2UD8iBrw2+d8Anp+pucatdT1VFURY3gJL8VLN2K8JrGjw8DFap d5wZ//X11mDwMWdXV/OZXkyh+9SQH3aYeN+TOvctgj7IfeqCc0y4GB8byPsVGEbP HmsNp07eUTooiiKq5I1pcU41nXXQmDLMG4kXVreB51blnMzH0UL12hVvQie1bDOR F8h4dnnC34Ftn0MDJ5t9cxilZJdcPIVqFfgzJl2qg4HgtpGX+W91sQGf6DGpq+XJ 47TYUxQ3AklhDG7zAIbA9Hwy6SrTQ16/44MHxTHYNYy1q3+HhRk= =hG/H -----END PGP SIGNATURE----- --Sig_/yI+u+Ng=hWgiGB.uY9oF7aT--