bionic (1) pwgen.1.gz

Provided by: pwgen_2.08-1_amd64 bug

NAME

       pwgen - generate pronounceable passwords

SYNOPSIS

       pwgen [ OPTION ] [ pw_length ] [ num_pw ]

DESCRIPTION

       The pwgen program generates passwords which are designed to be easily memorized by humans, while being as
       secure as possible.  Human-memorable passwords are never going to be as secure as  completely  completely
       random  passwords.   In particular, passwords generated by pwgen without the -s option should not be used
       in places where the password could be attacked via an off-line brute-force attack.   On the  other  hand,
       completely  randomly  generated   passwords  have a tendency to be written down, and are subject to being
       compromised in that fashion.

       The pwgen program is designed to be used both interactively, and in shell scripts.   Hence,  its  default
       behavior  differs  depending on whether the standard output is a tty device or a pipe to another program.
       Used interactively, pwgen will display a screenful of passwords, allowing  the  user  to  pick  a  single
       password,  and  then  quickly erase the screen.  This prevents someone from being able to "shoulder surf"
       the user's chosen password.

       When standard output (stdout) is not a tty, pwgen will only generate one password, as this  tends  to  be
       much  more  convenient  for  shell  scripts, and in order to be compatible with previous versions of this
       program.

OPTIONS

       -0, --no-numerals
              Don't include numbers in the generated passwords.

       -1     Print the generated passwords one per line.

       -A, --no-capitalize
              Don't bother to include any capital letters in the generated passwords.

       -a, --alt-phonics
              This option doesn't do anything special; it is present only for backwards compatibility.

       -B, --ambiguous
              Don't use characters that could be confused by the user when printed, such as 'l' and '1', or  '0'
              or  'O'.   This  reduces  the  number of possible passwords significantly, and as such reduces the
              quality of the passwords.  It may be useful for users who have bad vision, but in general  use  of
              this option is not recommended.

       -c, --capitalize
              Include  at  least one capital letter in the password.  This is the default if the standard output
              is a tty device.

       -C     Print the generated passwords in columns.  This is the default if the standard  output  is  a  tty
              device.

       -N, --num-passwords=num
              Generate num passwords.  This defaults to a screenful if passwords are printed by columns, and one
              password otherwise.

       -n, --numerals
              Include at least one number in the password.  This is the default if the standard output is a  tty
              device.

       -H, --sha1=/path/to/file[#seed]
              Will use the sha1's hash of given file and the optional seed to create password. It will allow you
              to compute the same password later, if you remember the file, seed, and pwgen's options used.  ie:
              pwgen  -H  ~/your_favorite.mp3#your@email.com  gives  a  list of possibles passwords for your pop3
              account, and you can ask this list again and again.

              WARNING: The passwords generated using this option are not very random.  If you use  this  option,
              make  sure  the  attacker can not obtain a copy of the file.  Also, note that the name of the file
              may be easily available from the ~/.history or ~/.bash_history file.

       -h, --help
              Print a help message.

       -r chars, --remove-chars=chars
              Don't use the specified characters in  password.   This  option  will  disable  the  phomeme-based
              generator and uses the random password generator.

       -s, --secure
              Generate  completely  random,  hard-to-memorize  passwords.  These should only be used for machine
              passwords, since otherwise it's almost guaranteed that users will simply write the password  on  a
              piece of paper taped to the monitor...

       -v, --no-vowels
              Generate random passwords that do not contain vowels or numbers that might be mistaken for vowels.
              It provides less secure passwords to allow system administrators to not have to worry with  random
              passwords accidentally contain offensive substrings.

       -y, --symbols
              Include at least one special character in the password.

AUTHOR

       This  version of pwgen was written by Theodore Ts'o <tytso@alum.mit.edu>.  It is modelled after a program
       originally written by Brandon S. Allbery, and then later extensively modified by Olaf Titz,   Jim  Lynch,
       and  others.  It was rewritten from scratch by Theodore Ts'o because the original program was somewhat of
       a hack, and thus hard to maintain, and because the licensing status of the program was unclear.

SEE ALSO

       passwd(1)