write 6 random bits of base64-encoded data. This will produce an eight character string making a good unix (crypt based) password:
$ openssl rand -base64 6
$RcqcGq4h
This is an example used to generate a 16 character password
$ openssl rand -base64 12
$IEoOfT/LKimAf/sd
When random data goes through the base encoding process the string output is always a multiple of 4 possibly padded on the end with one or more '=' characters. So if you want a password that is not a multiple of 4 you need to artifically chop it where you want it.
An example used to generate a 37 character password:
with cut:
$ openssl rand -base64 37 cut -c1-37
$X/UhqF1I9qO57Uz8hPufpvbOLYCeuuvqnerUM
or sed:
$ openssl rand -base64 37 sed -e 's/^\(.\{37\}\).*/\1/g' $sAPpFoGnbXnJrQc8Cl/QqrNwn0QK3hHrgANt1
or awk:
$ openssl rand -base64 37 awk 'BEGIN{FS=""} {for (i=1;i<=37;i++) printf("%s",$i);} {printf "\n"}'
$WhGWSCp8Y2uilxWfOfAyQXa4QqlE78uJeH3sn
Popular Posts
-
Linux admin interview questions How do you take a single line of input from the user in a shell script? Write a script to convert all DO...
-
Network-Attached Storage 1. Introduction 2. What is a NAS Device? 3. What is a Filer? 4. Network-Attached Storage Versus Sto...
-
Tried Gusty Gibbon Ubuntu 6.10 on Compaq f733AU works fine without any major problems. some tweaking required in udev/rules/70-persistent-ne...
-
All the commands are fired from (% - user) prompt not (# - root) so do not confuse with the #es there with root prompt. They are the command...
-
UNIX Questions and Answers Most answers refer to Solaris 2.x systems Hardware Issues How can I configure new devices without rebooting? What...
-
Password Aging While it's clearly possible to use the /etc/passwd and /etc/shadow files in Solaris and other Unix systems without mak...
-
The Basics. Network Storage - The Basics Are you new to network storage? If so then this series of articles is for you! Over the next few...
-
Sometimes, unprivileged users must be able to accomplish tasks that require privileges. An example is the passwd program, which allows you...
-
Search Files on their file permissions. World readable Normal users should not have access to configuration files or passwords. An attack...
-
First thing to know is that this stuff is in the kernel and there is a good doc in your kernel source tree under Documentation/networking/bo...
Post a Comment