From owner-cvs-src@FreeBSD.ORG Mon Jul 25 22:37:06 2005 Return-Path: X-Original-To: cvs-src@FreeBSD.org Delivered-To: cvs-src@FreeBSD.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 5746B16A41F; Mon, 25 Jul 2005 22:37:06 +0000 (GMT) (envelope-from nate@root.org) Received: from www.cryptography.com (li-22.members.linode.com [64.5.53.22]) by mx1.FreeBSD.org (Postfix) with ESMTP id EBEBB43D45; Mon, 25 Jul 2005 22:37:05 +0000 (GMT) (envelope-from nate@root.org) Received: from [10.0.0.33] (adsl-67-119-74-222.dsl.sntc01.pacbell.net [67.119.74.222]) by www.cryptography.com (8.12.8/8.12.8) with ESMTP id j6PMb4o5005645 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Mon, 25 Jul 2005 15:37:05 -0700 Message-ID: <42E5698E.80501@root.org> Date: Mon, 25 Jul 2005 15:37:02 -0700 From: Nate Lawson User-Agent: Mozilla Thunderbird 1.0.6 (Windows/20050716) X-Accept-Language: en-us, en MIME-Version: 1.0 To: "Matthew D. Fuller" References: <20050724135738.GM46538@darkness.comp.waw.pl> <64009.1122213962@phk.freebsd.dk> <20050725202519.GG32805@over-yonder.net> In-Reply-To: <20050725202519.GG32805@over-yonder.net> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: Poul-Henning Kamp , src-committers@FreeBSD.org, "Andrey A. Chernov" , cvs-src@FreeBSD.org, cvs-all@FreeBSD.org, Colin Percival , Pawel Jakub Dawidek Subject: Re: cvs commit: src/games/fortune/fortune fortune.c X-BeenThere: cvs-src@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: CVS commit messages for the src tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 25 Jul 2005 22:37:06 -0000 Matthew D. Fuller wrote: > On Sun, Jul 24, 2005 at 04:06:02PM +0200 I heard the voice of > Poul-Henning Kamp, and lo! it spake thus: > >>Anyway, back in this universe: We should not stick a lot of stuff >>into our boot-time scripts, they are slow enough already. > > > If it doesn't consume to much in its testing, it seems a logical > candidate for one of the nightly or weekly runs. Unfortunately, it won't actually buy us anything on the security front. The entropy stored in / used to seed the PRNG has already been run through SHA-1. And the output of the PRNG is obviously already run through SHA-1 also. So any automatic test will not be able to distinguish the quality of the entropy from that of a simple counter. -- Nate