Re: password in recovery.conf [SOLVED]
| От | John R Pierce |
|---|---|
| Тема | Re: password in recovery.conf [SOLVED] |
| Дата | |
| Msg-id | 5425FD2D.7010208@hogranch.com обсуждение исходный текст |
| Ответ на | Re: password in recovery.conf [SOLVED] (John R Pierce <pierce@hogranch.com>) |
| Ответы |
Re: password in recovery.conf [SOLVED]
|
| Список | pgsql-general |
On 9/26/2014 4:40 PM, John R Pierce wrote: > I'd consider using `mkpasswd -l 15 -s 0` just to avoid any such > problems. 15 random alphanumerics is already plenty complex, 62^15th > possible combinations, without needing to mix in special characters. > > $ mkpasswd -l 15 -s 0 > eec1kj7ZsthlYmh btw, thats 768,909,700,000,000,000,000,000,000 possible passwords. 768 septillion, using the aamerican 'short scale' naming convention. if you could brute force try 10000/second, it would merely take 24,365,800,000,000 centuries (24 trillion). -- john r pierce 37N 122W somewhere on the middle of the left coast
В списке pgsql-general по дате отправления: