diff options
author | Tomas Mraz <tmraz@redhat.com> | 2012-05-23 21:20:30 +0200 |
---|---|---|
committer | Tomas Mraz <tmraz@redhat.com> | 2012-05-23 21:20:30 +0200 |
commit | 8ba936ed1743bbb16ccd095ecea9de00d6146f94 (patch) | |
tree | 15e83bf7b290da3e5a30dc1caec86100c4155bdc /doc | |
parent | cd4ef315fd0d282ed11bdde17e98fe33625e789c (diff) | |
download | libpwquality-8ba936ed1743bbb16ccd095ecea9de00d6146f94.tar.gz |
Add description of the score value.
Diffstat (limited to 'doc')
-rw-r--r-- | doc/man/pwscore.1 | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/doc/man/pwscore.1 b/doc/man/pwscore.1 index 3604304..4794f4e 100644 --- a/doc/man/pwscore.1 +++ b/doc/man/pwscore.1 @@ -18,6 +18,13 @@ It either reports an error if the password fails any of the checks, or it prints out the password quality score as an integer value between \fB0\fR and \fB100\fR. +The password quality score is relative to the \fBminlen\fR setting in the +configuration file. But in general values below 50 can be treated as moderate +quality and above it fairly strong quality. Any password that passes the quality +checks (especially the mandatory cracklib check) should withstand dictionary +attacks and scores above 50 with the default minlen setting even fast brute +force attacks. + .PD .SH OPTIONS The first and only optional argument is the user name that is used to check |