At Thu, 19 Jan 2006 14:48:00 +1100, Dean Hamstead wrote: > in using Crypt::RandPasswd (::word() specifically), it doesnt seem at > all mod_perl safe. there definately seems to be something that loops > of and consumes all the web servers cpu.
From a quick glance through the Crypt::RandPasswd code, I don't see anything that leaps out as being mod_perl unsafe. To get an idea of where a mod_perl script is spinning, try the process described here: http://perl.apache.org/docs/1.0/guide/debug.html#Using_the_Perl_Trace If you can't work it out from that, post the resulting stacktrace here and we can all have a bash at it. -- - Gus -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html