From owner-freebsd-security@FreeBSD.ORG Mon Nov 24 18:28:08 2008 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 151F4106564A for ; Mon, 24 Nov 2008 18:28:08 +0000 (UTC) (envelope-from aragon@phat.za.net) Received: from mail.geek.sh (decoder.geek.sh [196.36.198.81]) by mx1.freebsd.org (Postfix) with ESMTP id AE6848FC0A for ; Mon, 24 Nov 2008 18:28:06 +0000 (UTC) (envelope-from aragon@phat.za.net) Received: by mail.geek.sh (Postfix, from userid 1000) id 7ECC724D22; Mon, 24 Nov 2008 20:08:59 +0200 (SAST) Date: Mon, 24 Nov 2008 20:08:59 +0200 From: Aragon Gouveia To: freebsd-security@freebsd.org Message-ID: <20081124180859.GA28462@phat.za.net> Mail-Followup-To: freebsd-security@freebsd.org References: <200811241747.mAOHlDSE034716@freefall.freebsd.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <200811241747.mAOHlDSE034716@freefall.freebsd.org> User-Agent: Mutt/1.4i X-Operating-System: FreeBSD 4.10-RELEASE-p2 i386 Subject: Re: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-08:11.arc4random X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 24 Nov 2008 18:28:08 -0000 | By FreeBSD Security Advisories | [ 2008-11-24 19:48 +0200 ] > III. Impact > > All security-related kernel subsystems that rely on a quality random > number generator are subject to a wide range of possible attacks for the > 300 seconds after boot or until 64k of random data is consumed. The list > includes: I suppose this would affect the quality of SSH host keys generated at boot time by RC? Thanks, Aragon