Re: password in recovery.conf [SOLVED]

From: Gavin Flower <GavinFlower(at)archidevsys(dot)co(dot)nz>
To: John R Pierce <pierce(at)hogranch(dot)com>, pgsql-general(at)postgresql(dot)org
Subject: Re: password in recovery.conf [SOLVED]
Date: 2014-09-27 00:27:20
Message-ID: 54260468.8070608@archidevsys.co.nz
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-general

On 27/09/14 11:56, John R Pierce wrote:
> On 9/26/2014 4:40 PM, John R Pierce wrote:
>> I'd consider using `mkpasswd -l 15 -s 0` just to avoid any such
>> problems. 15 random alphanumerics is already plenty complex,
>> 62^15th possible combinations, without needing to mix in special
>> characters.
>>
>> $ mkpasswd -l 15 -s 0
>> eec1kj7ZsthlYmh
>
> btw, thats 768,909,700,000,000,000,000,000,000 possible passwords. 768
> septillion, using the aamerican 'short scale' naming convention. if
> you could brute force try 10000/second, it would merely take
> 24,365,800,000,000 centuries (24 trillion).
>
So do you think a password like *Nxw7TnC2^}%(}tEz* is strong enough? :-)

I developed a Java program that generates 20 passwords (each of 16
characters) at a time, I've attached it for anyone who might be
interested. I have put it under the GPL version 3, but I might consider
releasing under other licences.

Cheers,
Gavin

Attachment Content-Type Size
AppPasswordGenerator.java text/x-java 4.5 KB

In response to

Browse pgsql-general by date

  From Date Subject
Next Message David G Johnston 2014-09-27 02:55:49 Window function with valued based range frames?
Previous Message John R Pierce 2014-09-26 23:56:29 Re: password in recovery.conf [SOLVED]