in using Crypt::RandPasswd (::word() specifically), it doesnt seem at all mod_perl safe. there definately seems to be something that loops of and consumes all the web servers cpu.
can anyone confirm this? or some way to beat it into submission. the first time i 'run' the page/script (aka go to it) it works, but every consecutive call (be it in a loop or as a result of reloading the page), results in the described infinite loop and cpu consumption. removing the my $password = Crypt::RandPasswd::word(12,16); and replacing with my $password = "stub"; resolves the problem, (but obviously doesnt solve the issue) for now im just living with "insert ... md5(now())" which is a reasonable solution for initial generated passwords intended to be changed. at least it works and doesnt consume a whole cpu for the rest of time ;) Dean -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html