Apologies in advance if this is too off-topic (pass phrases, not postfix).
On Mon, Feb 13, 2023 at 11:22:24PM +, Allen Coates
wrote:
> On 13/02/2023 22:43, raf wrote:
> > And for diceware style passphrases to be meaningful,
> > it's important that none of the words are "picked" by a
> > hum
Allen Coates wrote in
<4e60d85c-eec7-5e73-0b50-e7e652cb0...@cidercounty.org.uk>:
|On 13/02/2023 22:43, raf wrote:
|> And for diceware style passphrases to be meaningful,
|> it's important that none of the words are "picked" by a
|> human. They must be random. Then, it doesn't matter if
|> the
On 13/02/2023 22:43, raf wrote:
> And for diceware style passphrases to be meaningful,
> it's important that none of the words are "picked" by a
> human. They must be random. Then, it doesn't matter if
> they are common words or not.
A human can throw in a misspelt or foreign-language word. Pro
On Mon, Feb 13, 2023 at 04:07:33PM -0500, Phil Stracchino
wrote:
> On 2/13/23 15:18, Daniele Nicolodi wrote:
> > Isn't this estimate based on the assumption that the scheme used to
> > generate the password is known?
>
> Well, sort of. But what it means in practice is that after the common
> d
On 2/13/23 16:07, Phil Stracchino wrote:
On 2/13/23 15:18, Daniele Nicolodi wrote:
Isn't this estimate based on the assumption that the scheme used to
generate the password is known?
Well, sort of. But what it means in practice is that after the common
dictionary attack pass, you do a pass of
On 2/13/23 15:18, Daniele Nicolodi wrote:
Isn't this estimate based on the assumption that the scheme used to
generate the password is known?
Well, sort of. But what it means in practice is that after the common
dictionary attack pass, you do a pass of permuting 32-4 common
dictionary words.
On 13/02/23 21:14, Viktor Dukhovni wrote:
On Mon, Feb 13, 2023 at 02:44:24PM -0500, Phil Stracchino wrote:
On 2/13/23 13:30, Viktor Dukhovni wrote:
The apparent user name was "dnew...@networktest.com", and the password,
though partly mangled, was something like:
dialer-vinegar-agora-fast
On Mon, Feb 13, 2023 at 02:44:24PM -0500, Phil Stracchino wrote:
> On 2/13/23 13:30, Viktor Dukhovni wrote:
> > The apparent user name was "dnew...@networktest.com", and the password,
> > though partly mangled, was something like:
> >
> > dialer-vinegar-agora-fastness3
> > ??
>
>
Phil Stracchino:
> On 2/13/23 13:30, Viktor Dukhovni wrote:
> > The apparent user name was "dnew...@networktest.com", and the password,
> > though partly mangled, was something like:
> >
> > dialer-vinegar-agora-fastness3
> > ??
>
> That looks similar to the xkcd password generat
Using the MariaDB client to connect yields:
5.5.5-10.5.15-MariaDB-0+deb11u1.p'lnayaX...-...t`dTYAwX32D<.mysql_native_password.
..followed by encrypted data but it succeeds to connect.
David Koski
dko...@sutinen.com
On 2/13/23 11:21, David Koski wrote:
I have a working system wi
On 2/13/23 13:30, Viktor Dukhovni wrote:
The apparent user name was "dnew...@networktest.com", and the password,
though partly mangled, was something like:
dialer-vinegar-agora-fastness3
??
That looks similar to the xkcd password generation scheme ... which
sounds good if yo
I have a working system with Postfix 3.5.17+debian11u1 and MariaDB
10.5. After adding ssl certificates and configurations it stopped
authenticating. I don't know if it is Postfix or MariaDB. Using ngrep
to monitor the stream, I can see initial encrypted traffic followed by
clear text. It ap
On Sun, Feb 12, 2023 at 09:57:43PM -0800, David Newman wrote:
> On 2/12/23 7:11 PM, Viktor Dukhovni wrote:
>
> > On Sun, Feb 12, 2023 at 06:49:12PM -0800, David Newman wrote:
> >
> >> Postfix 3.5.17 on Debian 11
> >>
> >> Greetings. I could use some help understanding why postfix takes around
> >>
Hi,
I appreciate the reply. I was sure I tested every combination - well, I
guess I didn't. Change of ports did the trick. I haven't changed the
configuration settings.
Thank you!
Best regards,
Marko
-Original Message-
From: owner-postfix-us...@postfix.org On
Behalf Of Viktor Dukhovni
14 matches
Mail list logo