public:strong_passwords

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
public:strong_passwords [2017-04-20 06:38] – [Choosing Hard to Guess Passwords] gritpublic:strong_passwords [2017-04-21 11:12] (current) – [Diceware] grit
Line 39: Line 39:
   * Avoid using information that the user's colleagues and/or acquaintances might know to be associated with the user.   * Avoid using information that the user's colleagues and/or acquaintances might know to be associated with the user.
   * Do not use passwords which consist wholly of any simple combination of the aforementioned weak components.   * Do not use passwords which consist wholly of any simple combination of the aforementioned weak components.
 +
 +==== Diceware ====
 +
 +We also recommend Diceware for generating strong passphrases; easier to remember, easier to type (especially on mobile keyboards) and generally stronger than 8-random-character passwords. It is very important that the words are selected randomly, not taken out of a book or something. We prefer six- or seven-word passphrases. Users are now using ssh keys, and Diceware is great at generating long passphrases that get typed once upon starting up a keyring/session manager. [[diceware_faq|More about DiceWare]]
  
 ==== Writing Down Passwords ==== ==== Writing Down Passwords ====
  • Last modified: 2017-04-20 06:38
  • by grit