in using Crypt::RandPasswd (::word() specifically), it doesnt seem at
all mod_perl safe. there definately seems to be something that loops
of and consumes all the web servers cpu.

can anyone confirm this? or some way to beat it into submission.
the first time i 'run' the page/script (aka go to it) it works,
but every consecutive call (be it in a loop or as a result of
reloading the page), results in the described infinite loop and
cpu consumption.

removing the

  my $password = Crypt::RandPasswd::word(12,16);

and replacing with

  my $password = "stub";

resolves the problem, (but obviously doesnt solve the issue)

for now im just living with "insert ... md5(now())" which is a
reasonable solution for initial generated passwords intended
to be changed. at least it works and doesnt consume a whole
cpu for the rest of time ;)

Dean

--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to