Peter: I did not try Mr. Ruusu's command line code. However, I am curious about something, are you arguing that the output was too few characters to be useful as strong pass phrase, or that you just didn't like the difficulty factor to remembering such output? Very Respectfully, Stuart Blake Tener, IT3, USNR-R, N3GWG VTU 1904G (Volunteer Training Unit) stuart@xxxxxxxxxxx west coast: (310)-358-0202 P.O. Box 16043, Beverly Hills, CA 90209-2043 east coast: (215)-338-6005 P.O. Box 45859, Philadelphia, PA 19149-5859 Telecopier: (419)-715-6073 fax to email gateway via www.efax.com (it's free!) JOIN THE US NAVY RESERVE, SERVE YOUR COUNTRY, AND BENEFIT FROM IT ALL. Monday, July 09, 2001 2:07 PM -----Original Message----- From: owner-linux-crypto@xxxxxxxxxxxx [mailto:owner-linux-crypto@xxxxxxxxxxxx]On Behalf Of peter k. Sent: Monday, July 09, 2001 12:28 PM To: Jari Ruusu Cc: linux-crypto@xxxxxxxxxxxx Subject: Re: Announce loop-AES-v1.3b file crypto package > > (2) maybe there should be a prog written which creates passwords for the > > user using /dev/random and it could be also included in loop-AES [and future > > international kernel patches] > > dd if=/dev/random bs=15 count=1 2>/dev/null | uuencode -m /dev/stdout | tail -2 | tac | tail -1 that outputs very bad stuff like "A+Y=" Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/ Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/