Date: Mon, 24 Nov 2008 20:08:59 +0200 From: Aragon Gouveia <aragon@phat.za.net> To: freebsd-security@freebsd.org Subject: Re: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-08:11.arc4random Message-ID: <20081124180859.GA28462@phat.za.net> In-Reply-To: <200811241747.mAOHlDSE034716@freefall.freebsd.org> References: <200811241747.mAOHlDSE034716@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
| By FreeBSD Security Advisories <security-advisories@freebsd.org> | [ 2008-11-24 19:48 +0200 ] > III. Impact > > All security-related kernel subsystems that rely on a quality random > number generator are subject to a wide range of possible attacks for the > 300 seconds after boot or until 64k of random data is consumed. The list > includes: I suppose this would affect the quality of SSH host keys generated at boot time by RC? Thanks, Aragon
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20081124180859.GA28462>