dhx1 | I officially found the worst password generation routine: https://github.com/symphonycms/symphony-2/blob/master/symphony/lib/toolkit/class.general.php#L273 | 00:18 |
---|---|---|
dhx1 | (looking at the project because it uses XSL/XML) | 00:18 |
*** Joins: giallu (~giallu@fedora/giallu) | 03:08 | |
*** Quits: giallu (~giallu@fedora/giallu) (Quit: Leaving) | 04:07 | |
*** Joins: giallu (~giallu@88.149.241.186) | 04:36 | |
*** Quits: giallu (~giallu@88.149.241.186) (Changing host) | 04:36 | |
*** Joins: giallu (~giallu@fedora/giallu) | 04:36 | |
jreese | dhx1: wow, that's an amazing combination of 13*10*12=1560 possible passwords.... | 07:52 |
dhx1 | jreese: hah | 08:18 |
jreese | I'll personally stick with `openssl rand -hex 10` :P | 08:19 |
dhx1 | but it doesn't contain at least symbol and doesn't have mixed case? </sarcasm> | 08:47 |
jreese | fine, s/hex/base64/ ;) | 09:19 |
dhx1 | :) | 09:27 |
*** Quits: dhx1 (~anonymous@60-242-108-164.static.tpgi.com.au) (Ping timeout: 248 seconds) | 11:10 | |
*** Joins: dregad__ (~damien@147-176.76-83.cust.bluewin.ch) | 16:15 | |
*** Quits: dregad (~dregad@wwwgate1.merck.de) (Disconnected by services) | 16:20 | |
*** dregad__ is now known as dregad | 16:20 | |
*** Joins: dregad_ (~dregad@wwwgate1.merck.de) | 16:21 | |
*** Quits: dregad (~damien@147-176.76-83.cust.bluewin.ch) (Quit: Ex-Chat) | 16:21 | |
*** Quits: giallu (~giallu@fedora/giallu) (Ping timeout: 260 seconds) | 19:48 | |
*** Quits: sdfjkljkdfsljkl (~sdfjkljkd@static.96.23.63.178.clients.your-server.de) (Remote host closed the connection) | 20:00 | |
*** Joins: sdfjkljkdfsljkl (~sdfjkljkd@static.96.23.63.178.clients.your-server.de) | 20:00 | |
*** Joins: dhx1 (~anonymous@60-242-108-164.static.tpgi.com.au) | 20:38 |
Generated by irclog2html.py 2.10.0 by Marius Gedminas - find it at mg.pov.lt!