Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 11 Sep 2012 22:27:30 +0100
From:      RW <rwmaillists@googlemail.com>
To:        d@delphij.net
Cc:        Arthur Mesh <arthurmesh@gmail.com>, Doug Barton <dougb@FreeBSD.org>, freebsd-rc@freebsd.org, freebsd-security@freebsd.org, Dag-Erling =?ISO-8859-1?Q?Sm=F8rgrav?= <des@des.no>, delphij@delphij.net
Subject:   Re: svn commit: r239569 - head/etc/rc.d
Message-ID:  <20120911222730.7f92325e@gumby.homeunix.com>
In-Reply-To: <504FA511.8050904@delphij.net>
References:  <50450F2A.10708@FreeBSD.org> <20120903203505.GN1464@x96.org> <50451D6E.30401@FreeBSD.org> <20120903214638.GO1464@x96.org> <50453686.9090100@FreeBSD.org> <20120904220754.GA3643@server.rulingia.com> <20120906174247.GB13179@dragon.NUXI.org> <20120906230157.5307a21f@gumby.homeunix.com> <20120906224703.GD89120@x96.org> <50493480.8060307@FreeBSD.org> <20120911061530.GA77399@dragon.NUXI.org> <504EDC67.9070700@FreeBSD.org> <86sjao7q8c.fsf@ds4.des.no> <20120911205302.27484fd6@gumby.homeunix.com> <504FA511.8050904@delphij.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 11 Sep 2012 13:54:41 -0700
Xin Li wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>=20
> On 09/11/12 12:53, RW wrote:
> > On Tue, 11 Sep 2012 13:28:51 +0200 Dag-Erling Sm=F8rgrav wrote:
> >=20
> >> Doug Barton <dougb@FreeBSD.org> writes:
> >>> 1. Pseudo-randomize the order in which we utilize the files in=20
> >>> /var/db/entropy
> >>=20
> >> There's no need for randomization if we make sure that *all* the
> >> data written to /dev/random is used, rather than just the first
> >> 4096 bytes; or that we reduce the amount of data to 4096 bytes
> >> before we write it so none of it is discarded.  My gut feeling is
> >> that compression is better than hashing for that purpose,
> >=20
> > It's analogous to a passphrase, have you ever heard of a passphrase
> > being compressed rather than hashed?
>=20
> Passphrase hashing is a completely different topic, as what we wanted
> is a one-way function that can not be easily reversed, even when part
> of the passphrase is known.

I was refering to the conversion of a passphrase to key material=20



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20120911222730.7f92325e>