From owner-freebsd-rc@FreeBSD.ORG Thu Sep 6 23:40:48 2012 Return-Path: Delivered-To: freebsd-rc@freebsd.org Received: from mx2.freebsd.org (mx2.freebsd.org [IPv6:2001:4f8:fff6::35]) by hub.freebsd.org (Postfix) with ESMTP id D9577106566B; Thu, 6 Sep 2012 23:40:48 +0000 (UTC) (envelope-from dougb@FreeBSD.org) Received: from [127.0.0.1] (hub.freebsd.org [IPv6:2001:4f8:fff6::36]) by mx2.freebsd.org (Postfix) with ESMTP id 6F88914DEB8; Thu, 6 Sep 2012 23:40:48 +0000 (UTC) Message-ID: <50493480.8060307@FreeBSD.org> Date: Thu, 06 Sep 2012 16:40:48 -0700 From: Doug Barton Organization: http://www.FreeBSD.org/ User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:14.0) Gecko/20120713 Thunderbird/14.0 MIME-Version: 1.0 To: Arthur Mesh References: <5043DBAF.40506@FreeBSD.org> <20120903171538.GM1464@x96.org> <50450F2A.10708@FreeBSD.org> <20120903203505.GN1464@x96.org> <50451D6E.30401@FreeBSD.org> <20120903214638.GO1464@x96.org> <50453686.9090100@FreeBSD.org> <20120904220754.GA3643@server.rulingia.com> <20120906174247.GB13179@dragon.NUXI.org> <20120906230157.5307a21f@gumby.homeunix.com> <20120906224703.GD89120@x96.org> In-Reply-To: <20120906224703.GD89120@x96.org> X-Enigmail-Version: 1.4.3 OpenPGP: id=1A1ABC84 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: freebsd-rc@freebsd.org, freebsd-security@freebsd.org, RW , Peter Jeremy , obrien@freebsd.org Subject: Re: svn commit: r239569 - head/etc/rc.d X-BeenThere: freebsd-rc@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Discussion related to /etc/rc.d design and implementation." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 06 Sep 2012 23:40:48 -0000 On 9/6/2012 3:47 PM, Arthur Mesh wrote: > On Thu, Sep 06, 2012 at 11:01:57PM +0100, RW wrote: >> Reusing a secure entropy file is only a problem if the complete history >> of yarrow, from boot until some significant output, is exactly the same >> as on a previous boot. > > Not sure I agree. It's not the only problem. It's the worst problem; > in the situation you describe, you'll end up with identical output from > /dev/random. Arthur, I've asked you repeatedly to demonstrate the truth of this claim. You and David are speaking completely theoretically about a possible attack vector. I (and others) have repeatedly provided hard facts that demonstrate that what you're concerned about cannot happen, and yet you repeatedly claim it can. It is way past time that you either demonstrate that your claim has merit, or stop making it. Doug -- I am only one, but I am one. I cannot do everything, but I can do something. And I will not let what I cannot do interfere with what I can do. -- Edward Everett Hale, (1822 - 1909)