diff options
author | B. Watson <yalhcru@gmail.com> | 2020-11-27 20:42:07 +0000 |
---|---|---|
committer | Willy Sudiarto Raharjo <willysr@slackbuilds.org> | 2020-11-29 01:02:53 +0700 |
commit | 0248f7f6f82b37957196e21a34b2de922473604b (patch) | |
tree | d01f5df6244bb700b2c9256ccaf0985ee8dfbe92 /system/apg/README | |
parent | ddbdf980c402840d5dc675da290e9c073c6dcb5b (diff) | |
download | slackbuilds-0248f7f6f82b37957196e21a34b2de922473604b.tar.gz |
system/apg: Added (automated password generator)
Signed-off-by: Dave Woodfall <dave@slackbuilds.org>
Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
Diffstat (limited to 'system/apg/README')
-rw-r--r-- | system/apg/README | 18 |
1 files changed, 18 insertions, 0 deletions
diff --git a/system/apg/README b/system/apg/README new file mode 100644 index 0000000000..5185c1ddd4 --- /dev/null +++ b/system/apg/README @@ -0,0 +1,18 @@ +apg (automated password generator) + +apg generates random passwords according to several algorithms. The +default algorithm is pronounceable password generation algorithm +designed by Morrie Gasser and described in 'A Random Word Generator +For Pronounceable Passwords (National Technical Information Service +(NTIS) AD-A-017676)'. + +This SlackBuild by default patches apg to use /dev/urandom rather than +/dev/random for generating random seeds, to avoid apg blocking while +waiting for the kernel to gather more entropy. If you're worried about +this being possibly insecure, first read: + +http://web.archive.org/web/20201109034537/https://www.2uo.de/myths-about-urandom/ + +Then, if you remain unconvinced, you can run this script with +URANDOM=no in the environment to use /dev/random. Remember, apg is +only using this to generate *seeds* for its own built-in PRNG! |