From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 34665138334 for ; Tue, 5 Feb 2019 12:46:27 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id E240EE0C8D; Tue, 5 Feb 2019 12:46:15 +0000 (UTC) Received: from mail-ot1-x335.google.com (mail-ot1-x335.google.com [IPv6:2607:f8b0:4864:20::335]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 65A4EE0C57 for ; Tue, 5 Feb 2019 12:46:15 +0000 (UTC) Received: by mail-ot1-x335.google.com with SMTP id n8so5404849otl.6 for ; Tue, 05 Feb 2019 04:46:15 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:from:openpgp:autocrypt:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding; bh=3p4xRz3Wt/R/pNlPHy+jnXuZN6anDYUACDRW/4XMMO4=; b=d2KX4vTGKyZ16p7+fCagKcHdWSTwTDKqQ7L4fwKck9xWcnEZaeCQJkJPDuc89lxwGV u8WaGBkY0wotvEthY0CQysdD+EEhZKWLQDXecQcRySV1UM4mv+xh6lDTaX3YhwV0VYv4 OjHHHGHK+tvVTtNusmL9jhar1BljJAS5gARivVUVahi0ystCzsU29WN3vyD5Znr+mzqD RqNzrjQ3Sr6Jx8Um29R78fJmQ4271tpEvhHuP7mbqcCe28zDSCHpjKP0ig6mZnHDOGnG uqJ2jlQleIDolNsr+Phd6fbpLvsDzpom6ch83KTIh9BjBObpy8rdgcQbmsl/xOTXZ+F9 hV5w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:openpgp:autocrypt :message-id:date:user-agent:mime-version:in-reply-to :content-transfer-encoding; bh=3p4xRz3Wt/R/pNlPHy+jnXuZN6anDYUACDRW/4XMMO4=; b=DyhDcPDoQ/34zRmshTGs+OjmwYNwB0bD18F7bpzSvRl1umdbW0+7B7FaXf+EyvW/0K R4WJ8nplJXxE8k6kbjXpk1EA4+XZknjfZ2ht2SH/TRvBmd/nnGgz0JRgZhI44WlpLssV tHO1l1PDujDU0vGopLwTtTpNuRTjeU1fdq8pOME0q2aT9Fy1Uo9zX62UZL00CHKrANQ9 ywkXc+2rqxRnVt6V9fXKFLMV0vW5Vidwk8SC1GKAuE8ICnNU7UfAlyPaHRRJw2hkmBgb D1Ryp/jsJVq7yA0akuIqoH/lOa/vA+kyjmlVS7uFlXkk7X8H+Y+SaSJ/8wIxNbbFHNFg cDGw== X-Gm-Message-State: AHQUAubietE81HovLkA1By53EPPbRq3QqdAsUrVy3Q3uEYnyY9EW+abp MgcRJOXlYao3XB2TvKxdP2s= X-Google-Smtp-Source: AHgI3IbA1+qLkhK5o5f2wNwvDP9U8vOXBCvfj2aXM90aB5G5CufvRKKp0jUgAHjI4EwiS9NskJsRKg== X-Received: by 2002:a9d:7ac6:: with SMTP id m6mr2565326otn.62.1549370774262; Tue, 05 Feb 2019 04:46:14 -0800 (PST) Received: from [192.168.2.5] (adsl-68-19-235-101.bna.bellsouth.net. [68.19.235.101]) by smtp.gmail.com with ESMTPSA id v1sm7799183otq.80.2019.02.05.04.46.12 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 05 Feb 2019 04:46:13 -0800 (PST) Subject: Re: [gentoo-user] Coming up with a password that is very strong. To: gentoo-user@lists.gentoo.org References: <8d027455-f210-c399-f5a7-bfb05692cc5f@gmail.com> <4357288.zjPoxG5Os4@dell_xps> <8290530.UAdKCf2tOQ@dell_xps> From: Dale Openpgp: preference=signencrypt Autocrypt: addr=rdalek1967@gmail.com; prefer-encrypt=mutual; keydata= mQINBFpEtdQBEADI51WaryP3FJlDfmCQx2aPQpSppEKxqWhCTA8KFEcOVFmIIfiFAeekqMMD mhUxgZTtlQh7dsNqha6ioaYDqGKTv7oeJlPJw4hmIMJX3WYVSOHlsJUNM2jpDIAFeEKfup/T zDzFpuU2Qtr/Y0ji35wHyOAZLRckeNk705oRvE9wqi6noTP15Gxmw/U6aMzEfvu+wGEfCjgs 9bERmu+CS75PZEaFAv8RnsXUv1UcvQ45jmk/8ni/ogxE2h53OIp6c/hOlgJkSVRQWPZZyKZw lDiSUKCtMXPMdZ9w0X6RltQxtIQXO0KxAKaAp+tnL8z+0piafF5uW4RIglhT922RXKxxdZyx SjRgtE4V1IPtUcwPAeqVUZw2P1b4pjfPv7tNtMoFsIiY0ZnT+ua4ps6KOUeocRPKAX14mZkL jt/sZM7aIKiwyoteshRgWNNkxh4OiSxGCRUKNQI8M42cRSidvJZ6SGZXM3WpV28RPyF7+0Ba 0stEQwBGNF8uxgytY9rOJ7obmIpEZKx1p3W1O1hadOjBo2110jMDirRXtktMDfBDvVKkOZ06 vLu16uZLb0O52euhl2dMcEI3ZoCAFTKtdwMITIDj1TcMBZar6+bcwOicSFFogOLHQLJZRO5q I5szOIYW7+c0yNqPRLT3Sq7HzDyuyTUjmPZSAcqOwzX8GwUFkwARAQABtBtEYWxlIDxyZGFs ZWsxOTY3QGdtYWlsLmNvbT6JAlQEEwEIAD4WIQSUDVlCt0m0Z/PsCaxgB5lCagHqugUCWkS1 1AIbIwUJCWYBgAULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAAKCRBgB5lCagHqurR7D/45/q20 vXdrJGxrkNphotmlBtTpNbVauu5A2NDv3E1Il6yqRBfh4Xw7xFuwhz9DqThuvByU6566vr0z 7oVCK33dxRm4WA7YaogRQZy4VVIbHdrksnh2f702CFllqtn5Y29M2JtXG5jiiL3aZNEhoyP9 eMtzLPGs56yZ3eMkz4U7DEmWCAUr8bbuXW+eq/A0V5djcFdHfmanuDZSxzg+cZTpVOLolS2b pmNsPTSMkJ2MDY2Kfdg3gPhSaawo2agQfgnf9E7vSm7z/rlk8bBUWcPAP/XTN9ndVwOO3x74 EQv/M4EiCTtNpw3yapVZI2NhA1wqW648D7RxIPD8Y3nkJVDS4x5g54xDe1IUFOtVUSDAh+vY wUJt7vgbCeRjyT8XbuGW9RokIos3ALNaPoq/FDNEqefbmop0CPRih6aLFHWT4YBA6xQjLJuP LSNvalNqE5mef0giCtnLxo/lkjnP9Sv+t/5VSHda5zkVuN0+2w46SbGvXIHRkSoSi6XH3ccq KayJC+oTqo4xf9J30c7CV4rEcYnJcnxMw0vcYmU3DwjGfKxuKcLHgPr9mDNWvhteroA5wNWw NzQ72yAj7rsZVUXCxZgiPldSH3SXZJ/Jo6E9JouzQgRb/I4Vy4jx0Yw8rJLDx/ha82fn+FVe cFbiodVV5UD0inw488IAAtJE+Zi0t7kCDQRaRLXUARAA38iHcF7M7GnkS73dazdLBgz2YJsu fpix/N/x4CvoHMqTuwi4ASz1WroYjl3KajeH0DSybyPdEQ7nffxIUt48deT3j/rwsJkPRvCF BpmcwxErd/Mbq0BgikYxXvO68aEAs4jBDR26YtONfjobEfd+Juhxci9UN9vTOCgSPhY+dxHs MZ0gHRzvMnpM3o3+oht/XRZr05RQx83DvTIqWnjDQlCseYYlbFp+rFTZi7ro71ULDThfCE0p +f+IQ3zX0cRKOcJGtNRvyWH6PxmN4td6Q7gPHfAsFPLsCpg7nZwOejtAktPejtSEXlN6QOKv bmRQxNtzgMtjzJNNJW2NtBz0DIW394+9stchQRKLqH8n8GnB6tlkfPg4vgf/kq14QQSZcb0F M36wk+i1Hk+TWYWbOBoUw9+X941Pw1JnglJ3tzpBh+36+pdG02Lbm2v6SaZ69zkDfzJ2Sfhb E+KQLibLkiCOhuSDLDWUgUeb0lJ/0qlo3vcQMTBuG5eiWiwBkp4C+ACb1f1Akq0mFvim+gCJ qJOTu0IDK9DjKLKglA3Z6sbeepnXq8fxB2Mo/SFSYEsGqUu4MLxgwnPg7zi+rKg7MhqdiBBE fqugmNguCEYZjJrGCCzwuqPXAZAcyzEYTGFKwI6NdEZ6v8Xc3om9MJomB3y1uzG6K7T9ue5H aw/2aqEAEQEAAYkCPAQYAQgAJhYhBJQNWUK3SbRn8+wJrGAHmUJqAeq6BQJaRLXUAhsMBQkJ ZgGAAAoJEGAHmUJqAeq6/ykP/ib6xEHednaXvzZvvj854PB5ffBqKkphbf51g6pxPvFBWMwY E7Bu/kq8e3hkp3rzX42BjqiUmfEe2OyfZCabXLybP8i/QRkHTzD5nLoIYLeL+62N/WQFW1NU VhqdfQbMhphNgP1mvG2Ib5R6S+Fb+vkw776oq6jLwUBP/o6PPpp62GyvFvFb9ekxV9+sE4yG V3DTqURBY+aXfc/MTzlCXp4u4QzFW9odfcb/kb9f1m/gZbWGihAqeMd1HViXQoMzTx6IuP13 eQAkKj4FlA2QMzbEOOKO6fliSt1JweJoh0OLCEAM/3q+LaflMvvjhl9ht00IUT/ySj3/dZdf EdTpuUAtnC3A3flwgK/aetkkOhrkx9hx4SKn6UHtAl+eCqP1Mae+nWzkisBL0/hBPEz713md 5I+4Y4QjIokRiz/5l/TFwpGu26zmDfDUkZmxZR/iNCW0VAmZE2YdyRm3PYcFcVXuZ1f/ff0D us9xGsO8V6F5EIwx/9Y6AWQdW7PoKHA21ri93PoRgjv+QoOifXEkhJwTKg5k5b1Tr7h9eRU/ Se2XigPVODjrN9FRfkx/JxlJcCs/igGJS05BmiZNIIRDKBGdXy/Fj5HQB2q5v5DfvrLMNTwK Aa8pn/em1SKC/l9aV9ygpN+cQPKoQjGxPPaId/rwX+GVxKl2vakjHLPLQmm3 Message-ID: <6788df8f-bb27-9e51-ae06-6137b4b4ee88@gmail.com> Date: Tue, 5 Feb 2019 06:46:10 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0 SeaMonkey/2.49.9.1 Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply MIME-Version: 1.0 In-Reply-To: <8290530.UAdKCf2tOQ@dell_xps> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Archives-Salt: 341a920f-c2d0-4f57-8115-67fd6a7e55d8 X-Archives-Hash: 4ab46a43c7012c435d5c3af7950b901a Mick wrote: > On Tuesday, 5 February 2019 10:13:44 GMT Dale wrote: > >> After seeing your reply, I realize I just type the command and it >> prompts me for a password. I ctrl c to exit. Well, ain't that >> something? You can stop laughing now. ;-) >> >> It seems to think helloworld and reallysecurepassword is OK. I have to >> question just how good this tool is at this point. > Quite! > > I think the cracklib acceptance parameters are not as strict as they could > have been for modern computing, but I don't know how to tweak them. With > johntheripper you have many options to tweak the characters tested, length, > etc. when checking a password. > > PS. I wasn't laughing at you, I was laughing at the passwords cracklib > thought were OK. I'm emerging john* or at least it's thinking on it.  I was talking about you laughing at my comment about the idiot in the chair who was using the command wrong.  I have to admit, I was laughing at myself over here.  lol  I might add, I did try to get a man page or -h to help but it didn't.  I've got my password down to something I can remember and isn't to bad to type.  The password strength meter thingys, while not perfect either, do say it is a strong one.  My looking at it says it is strong too.  I just can't imagine anyone guessing it.  It's so random and such that I think it would be very difficult to crack.  Even if one could, it would take a fairly long time even with some pretty fast puters.  It may not be NSA proof either but I suspect it would take even them a while.  Still, I'd like to test this thing really well if I can find a tool that can really do it properly.  We already know the meter sites aren't trustworthy.  It seems cracklib isn't quite there either.  Moving on.  Thanks for the help.  By the time I get around to using this thing, it may be easy to crack with some laser type puter or something.  Dale :-)  :-)