Apologies in advance if this is too off-topic (pass phrases, not postfix).
On Mon, Feb 13, 2023 at 11:22:24PM +, Allen Coates
wrote:
> On 13/02/2023 22:43, raf wrote:
> > And for diceware style passphrases to be meaningful,
> > it's important that none of the words are "picked" by a
> > hum
Allen Coates wrote in
<4e60d85c-eec7-5e73-0b50-e7e652cb0...@cidercounty.org.uk>:
|On 13/02/2023 22:43, raf wrote:
|> And for diceware style passphrases to be meaningful,
|> it's important that none of the words are "picked" by a
|> human. They must be random. Then, it doesn't matter if
|> the
On 13/02/2023 22:43, raf wrote:
> And for diceware style passphrases to be meaningful,
> it's important that none of the words are "picked" by a
> human. They must be random. Then, it doesn't matter if
> they are common words or not.
A human can throw in a misspelt or foreign-language word. Pro
On Mon, Feb 13, 2023 at 04:07:33PM -0500, Phil Stracchino
wrote:
> On 2/13/23 15:18, Daniele Nicolodi wrote:
> > Isn't this estimate based on the assumption that the scheme used to
> > generate the password is known?
>
> Well, sort of. But what it means in practice is that after the common
> d
On 2/13/23 16:07, Phil Stracchino wrote:
On 2/13/23 15:18, Daniele Nicolodi wrote:
Isn't this estimate based on the assumption that the scheme used to
generate the password is known?
Well, sort of. But what it means in practice is that after the common
dictionary attack pass, you do a pass of
On 2/13/23 15:18, Daniele Nicolodi wrote:
Isn't this estimate based on the assumption that the scheme used to
generate the password is known?
Well, sort of. But what it means in practice is that after the common
dictionary attack pass, you do a pass of permuting 32-4 common
dictionary words.
On 13/02/23 21:14, Viktor Dukhovni wrote:
On Mon, Feb 13, 2023 at 02:44:24PM -0500, Phil Stracchino wrote:
On 2/13/23 13:30, Viktor Dukhovni wrote:
The apparent user name was "dnew...@networktest.com", and the password,
though partly mangled, was something like:
dialer-vinegar-agora-fast
On Mon, Feb 13, 2023 at 02:44:24PM -0500, Phil Stracchino wrote:
> On 2/13/23 13:30, Viktor Dukhovni wrote:
> > The apparent user name was "dnew...@networktest.com", and the password,
> > though partly mangled, was something like:
> >
> > dialer-vinegar-agora-fastness3
> > ??
>
>
Phil Stracchino:
> On 2/13/23 13:30, Viktor Dukhovni wrote:
> > The apparent user name was "dnew...@networktest.com", and the password,
> > though partly mangled, was something like:
> >
> > dialer-vinegar-agora-fastness3
> > ??
>
> That looks similar to the xkcd password generat
On 2/13/23 13:30, Viktor Dukhovni wrote:
The apparent user name was "dnew...@networktest.com", and the password,
though partly mangled, was something like:
dialer-vinegar-agora-fastness3
??
That looks similar to the xkcd password generation scheme ... which
sounds good if yo
On Sun, Feb 12, 2023 at 09:57:43PM -0800, David Newman wrote:
> On 2/12/23 7:11 PM, Viktor Dukhovni wrote:
>
> > On Sun, Feb 12, 2023 at 06:49:12PM -0800, David Newman wrote:
> >
> >> Postfix 3.5.17 on Debian 11
> >>
> >> Greetings. I could use some help understanding why postfix takes around
> >>
On 2/12/23 7:11 PM, Viktor Dukhovni wrote:
On Sun, Feb 12, 2023 at 06:49:12PM -0800, David Newman wrote:
Postfix 3.5.17 on Debian 11
Greetings. I could use some help understanding why postfix takes around
60 seconds to accept and forward messages received using submission.
Feb 12 18:02:23
On Sun, Feb 12, 2023 at 06:49:12PM -0800, David Newman wrote:
> Postfix 3.5.17 on Debian 11
>
> Greetings. I could use some help understanding why postfix takes around
> 60 seconds to accept and forward messages received using submission.
To a small degree because you have unnecessary verbose l
Postfix 3.5.17 on Debian 11
Greetings. I could use some help understanding why postfix takes around
60 seconds to accept and forward messages received using submission.
This is on a new server I recently stood up. An almost identically
configured old server did not have this problem. DNS work
14 matches
Mail list logo