Date: Fri, 19 Sep 2003 13:58:12 -0700 From: Michael Sierchio <kudzu@tenebras.com> To: freebsd-security@freebsd.org Subject: Re: [Fwd: Re: FreeBSD Security Advisory FreeBSD-SA-03:12.openssh] Message-ID: <3F6B6DE4.5020003@tenebras.com> In-Reply-To: <20030919195025.GB3815@saboteur.dek.spc.org> References: <200309190802.h8J82bfq006549@grimreaper.grondar.org> <3F6B1950.8090304@tenebras.com> <20030919195025.GB3815@saboteur.dek.spc.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Bruce M Simpson wrote: >>Question, since I haven't looked at the code -- does it honor the >>/dev/crypto interface? Since, if a HW RBG is included in a crypto >>device, it should be used to help stir the pot. > > Stacy Millions had a driver in the works to support the Intel i8xx FWH > HW RNG. As far as I know it hasn't been committed, I'd certainly like > to see this code updated. Good. On linux, where /dev/random comes from, there is no (or was no) rndcontrol. The standard sources of entropy were keyboard and mouse. Very funny for a rackmount server, you can run out of random bits in a hurry.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3F6B6DE4.5020003>