Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 19 Sep 2003 13:58:12 -0700
From:      Michael Sierchio <kudzu@tenebras.com>
To:        freebsd-security@freebsd.org
Subject:   Re: [Fwd: Re: FreeBSD Security Advisory FreeBSD-SA-03:12.openssh]
Message-ID:  <3F6B6DE4.5020003@tenebras.com>
In-Reply-To: <20030919195025.GB3815@saboteur.dek.spc.org>
References:  <200309190802.h8J82bfq006549@grimreaper.grondar.org> <3F6B1950.8090304@tenebras.com> <20030919195025.GB3815@saboteur.dek.spc.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Bruce M Simpson wrote:

>>Question, since I haven't looked at the code -- does it honor the
>>/dev/crypto interface?  Since, if a HW RBG is included in a crypto
>>device, it should be used to help stir the pot.
> 
> Stacy Millions had a driver in the works to support the Intel i8xx FWH
> HW RNG. As far as I know it hasn't been committed, I'd certainly like
> to see this code updated.

Good.  On linux, where /dev/random comes from, there is no (or was no)
rndcontrol.  The standard sources of entropy were keyboard and mouse.
Very funny for a rackmount server, you can run out of random bits in
a hurry.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3F6B6DE4.5020003>