Date: Thu, 29 Sep 2005 12:58:17 -0700 From: Doug Barton <dougb@FreeBSD.org> To: Brian Reichert <reichert@numachi.com> Cc: freebsd-hackers@freebsd.org, Kris Kennaway <kris@obsecurity.org> Subject: Re: anyone using security/dropbear? Message-ID: <433C4759.7010000@FreeBSD.org> In-Reply-To: <20050929181623.GG74605@numachi.com> References: <20050929181055.GF74605@numachi.com> <20050929181413.GA87227@xor.obsecurity.org> <20050929181623.GG74605@numachi.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Brian Reichert wrote: > On Thu, Sep 29, 2005 at 02:14:13PM -0400, Kris Kennaway wrote: > >>Check the source.. is it using /dev/urandom (which never blocks), or >>/dev/random (which I still don't think blocks, but may return short >>reads). Either way, it sounds like some level of application bug...it >>probably should be using the former source, but even if it's not, it >>shouldn't be blocking. > > > ktrace shows /dev/random, and indeed, very short reads. > > Let me try another maunal build, pushing it to /dev/urandom. Depending on why that program needs random bits, that could be a very bad idea. Take a look at the following page and see if it helps: http://people.freebsd.org/~dougb/randomness.html -- This .signature sanitized for your protection
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?433C4759.7010000>