From owner-freebsd-stable Tue Jul 10 9:31:19 2001 Delivered-To: freebsd-stable@freebsd.org Received: from mercury.asuka.ne.jp (mercury.asuka.ne.jp [210.155.86.62]) by hub.freebsd.org (Postfix) with ESMTP id 00BD737B406 for ; Tue, 10 Jul 2001 09:31:13 -0700 (PDT) (envelope-from yasu@asuka.net) Received: from localhost (localhost [127.0.0.1]) by mercury.asuka.ne.jp (Postfix) with ESMTP id F179D5E5A; Wed, 11 Jul 2001 01:27:29 +0900 (JST) To: jandrese@mitre.org Cc: mike@sentex.net, stable@freebsd.org Subject: Re: Generating encrypted passwords From: HIRATA Yasuyuki In-Reply-To: <3B4B25A9.74D97085@mitre.org> References: <4.2.2.20010710081901.05a68008@192.168.0.12> <5.1.0.14.0.20010710102259.04255440@marble.sentex.ca> <3B4B25A9.74D97085@mitre.org> X-Face: 7%a.tv,8"?iT8?|]>3u{(,ER`DSn^tGI'OrJaMEv+UaeyiblNlS~N#;!9SaMa=(gI>IuKqsImWzoiTnu|9+xA1g}1==:UHtY-0vrJ&"g9sYUa56<""X)B.3X&r?iDz=K>%W@O(V~r K)`wq+:[`&^!wB[**-!][YRLXPvIn#L?fb1vm$AKQW1X?P1-%?uf@x`&`r>1B;aBjeS([x5yy0+b X-Mailer: Mew/1.94.2 XEmacs/21.5 (anise) (i386-unknown-freebsd4.3) Organization: Asuka.Net X-URL: http://yasu.asuka.net/ X-Moe: =?iso-2022-jp?B?GyRCPzlCdE0lGyhC?=, =?iso-2022-jp?B?GyRCP0BIeDRRTmsbKEI=?= (=?iso-2022-jp?B?OBskQjduGyhCNBskQkZ8MEo5XxsoQg==?=), =?iso-2022-jp?B?GyRCN241XCQiJGYbKEI=?= X-Moe-Info: See http://www.x-moe.org/ for detail. Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-Id: <20010711013543O.yasu@asuka.net> Date: Wed, 11 Jul 2001 01:35:43 +0900 (JST) X-Dispatcher: imput version 20000228(IM140) Lines: 34 Sender: owner-freebsd-stable@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG Hi, From: Jason Andresen To: Mike Tancsa Subject: Re: Generating encrypted passwords Date: Tue, 10 Jul 2001 11:56:26 -0400 Message-ID: <3B4B25A9.74D97085@mitre.org> > Doesn't the default seed just use /dev/urandom? I thought /dev/urandom > was good enough for seeding consumer type crypto stuff. Of course > if you don't have /dev/urandom is just uses it's process ID and the > system time, which is certainly not good enough for any kind of > crypto. random(4) manpage says: | As more and more random bytes are requested without giving time for | the entropy pool to recharge, this will result in lower quality | random numbers. I do not know weather it's enough or not. Do you think it is suitable for cryptographic purposes? > > srand (time ^ $$ ^ unpack "%L*", `ps axww | gzip`); > > At least the manpage isn't telling you to grab the first two bytes > off of a gzip output of ps axww, since that always returned the magic > number for gzip. npack "%L*" returns 32-bit checksum of the string, so you do not need to grab the first two. ---- HIRATA Yasuyuki http://yasu.asuka.net/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message