Re: password in recovery.conf [SOLVED] - Mailing list pgsql-general

From Gavin Flower
Subject Re: password in recovery.conf [SOLVED]
Date
Msg-id 54260468.8070608@archidevsys.co.nz
Whole thread Raw
In response to Re: password in recovery.conf [SOLVED]  (John R Pierce <pierce@hogranch.com>)
List pgsql-general
On 27/09/14 11:56, John R Pierce wrote:
On 9/26/2014 4:40 PM, John R Pierce wrote:
I'd consider using `mkpasswd -l 15 -s 0`  just to avoid any such problems.   15 random alphanumerics is already plenty complex, 62^15th possible combinations, without needing to mix in special characters.

$ mkpasswd -l 15 -s 0
eec1kj7ZsthlYmh

btw, thats 768,909,700,000,000,000,000,000,000 possible passwords. 768 septillion, using the aamerican 'short scale' naming convention.  if you could brute force try 10000/second, it would merely take 24,365,800,000,000 centuries (24 trillion).

So do you think a password like Nxw7TnC2^}%(}tEz is strong enough?  :-)

I developed a Java program that generates 20 passwords (each of 16 characters) at a time, I've attached it for anyone who might be interested.  I have put it under the GPL version 3, but I might consider releasing under other licences.


Cheers,
Gavin
Attachment

pgsql-general by date:

Previous
From: John R Pierce
Date:
Subject: Re: password in recovery.conf [SOLVED]
Next
From: David G Johnston
Date:
Subject: Window function with valued based range frames?