Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 29 Sep 2005 12:58:17 -0700
From:      Doug Barton <dougb@FreeBSD.org>
To:        Brian Reichert <reichert@numachi.com>
Cc:        freebsd-hackers@freebsd.org, Kris Kennaway <kris@obsecurity.org>
Subject:   Re: anyone using security/dropbear?
Message-ID:  <433C4759.7010000@FreeBSD.org>
In-Reply-To: <20050929181623.GG74605@numachi.com>
References:  <20050929181055.GF74605@numachi.com>	<20050929181413.GA87227@xor.obsecurity.org> <20050929181623.GG74605@numachi.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Brian Reichert wrote:
> On Thu, Sep 29, 2005 at 02:14:13PM -0400, Kris Kennaway wrote:
> 
>>Check the source.. is it using /dev/urandom (which never blocks), or
>>/dev/random (which I still don't think blocks, but may return short
>>reads).  Either way, it sounds like some level of application bug...it
>>probably should be using the former source, but even if it's not, it
>>shouldn't be blocking.
> 
> 
> ktrace shows /dev/random, and indeed, very short reads.
> 
> Let me try another maunal build, pushing it to /dev/urandom.

Depending on why that program needs random bits, that could be a very bad 
idea. Take a look at the following page and see if it helps:

http://people.freebsd.org/~dougb/randomness.html


-- 

     This .signature sanitized for your protection




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?433C4759.7010000>