Date: Sat, 21 Jan 2017 01:21:42 +0000 From: Lu Tung-Pin <lutungpin@openmailbox.org> To: freebsd-current@freebsd.org Subject: Fix /etc/rc.d/random umask handling (/entropy permissions) Message-ID: <14f5a2fdf191c33e4ed1dc882b288e81@openmailbox.org>
next in thread | raw e-mail | index | archive | help
--=_4c8ece43f9a5623fa0f12896a365b95d
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset=US-ASCII;
format=flowed
A 2014 change broke the umask handling in /etc/rc.d/random,
leaving /entropy with ug+r permissions. Quick fix attached,
mirroring random_stop() behavior.
(Incidentally, /usr/libexec/save-entropy is still fine for
/var/db/entropy/*, as is /etc/rc.d/random for the new
/boot/entropy.)
--- /etc/rc.d/random.old 2017-01-21 11:48:30.975009000 +1100
+++ /etc/rc.d/random 2017-01-19 18:04:34.224632000 +1100
@@ -20,12 +20,15 @@
save_dev_random()
{
+ oumask=`umask`
+ umask 077
for f ; do
if :>>"$f" ; then
debug "saving entropy to $f"
dd if=/dev/random of="$f" bs=4096 count=1
2>/dev/null
fi
done
+ umask ${oumask}
}
feed_dev_random()
--=_4c8ece43f9a5623fa0f12896a365b95d
Content-Transfer-Encoding: base64
Content-Type: text/x-diff;
name=random.diff
Content-Disposition: attachment;
filename=random.diff;
size=371
LS0tIC9ldGMvcmMuZC9yYW5kb20ub2xkCTIwMTctMDEtMjEgMTE6NDg6MzAuOTc1MDA5MDAwICsx
MTAwCisrKyAvZXRjL3JjLmQvcmFuZG9tCTIwMTctMDEtMTkgMTg6MDQ6MzQuMjI0NjMyMDAwICsx
MTAwCkBAIC0yMCwxMiArMjAsMTUgQEAKIAogc2F2ZV9kZXZfcmFuZG9tKCkKIHsKKwlvdW1hc2s9
YHVtYXNrYAorCXVtYXNrIDA3NwogCWZvciBmIDsgZG8KIAkJaWYgOj4+IiRmIiA7IHRoZW4KIAkJ
CWRlYnVnICJzYXZpbmcgZW50cm9weSB0byAkZiIKIAkJCWRkIGlmPS9kZXYvcmFuZG9tIG9mPSIk
ZiIgYnM9NDA5NiBjb3VudD0xIDI+L2Rldi9udWxsCiAJCWZpCiAJZG9uZQorCXVtYXNrICR7b3Vt
YXNrfQogfQogCiBmZWVkX2Rldl9yYW5kb20oKQo=
--=_4c8ece43f9a5623fa0f12896a365b95d--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?14f5a2fdf191c33e4ed1dc882b288e81>
