<p>You actually make reasonable passwords for users? !?!<br>
I set their account for must change and passwd= imadumbdork<br>
They tend to not forget after a change or two<br>
Bofh rules!</p>
<div class="gmail_quote">On Oct 1, 2011 12:47 PM, "Michael B. Trausch" <<a href="mailto:mike@trausch.us">mike@trausch.us</a>> wrote:<br type="attribution">> Hey! Things are quiet! Im'ma stir 'em up! :-)<br>
> <br>> I put together a stupid little Python script to read bytes from<br>> /dev/urandom and chuck them out as PGP word lists. I thought there<br>> might be some people on the list that would be interested in it.<br>
> <br>> I'm not sure how to actually compute the entropy of the passwords that<br>> it generates, though; the rules of the PGP word list are kind of cool<br>> but strange. There is a word list of 512 words. 256 of them are used<br>
> in the "even" position, and 256 of them are used in the "odd"<br>> position. So, for each position there are 256 possibilities.<br>> Naďely, I'd say that there are thus 256^n possibilities for each<br>
> possible password attempt.<br>> <br>> *BUT* that's not quite the way it works, since there are two different<br>> symbol sets. If there were 512 possible symbols all the way through<br>> the password, it'd be 512^n. Of course, this ain't that, either.<br>
> <br>> I'd be inclined to say that it's probably something along the lines of<br>> 256^n * 2. But I don't know. Perhaps Mike W. can chip in to help me<br>> understand that.<br>> <br>> Anyway, I didn't actually make this *for* password generation, but<br>
> it'd be a lot better than the tool I am using for my users currently<br>> for setting initial passwords, so I'm going to start using it for<br>> that. :-)<br>> <br>> Script is attached.<br>> <br>
> --- Mike<br></div>