Date: Fri, 15 Aug 2003 20:54:54 +0100 From: Mark Murray <mark@grondar.org> To: Sam Leffler <sam@errno.com> Cc: cvs-all@FreeBSD.org Subject: Re: cvs commit: src/sys/libkern arc4random.c Message-ID: <200308151954.h7FJstOI004259@grimreaper.grondar.org> In-Reply-To: Your message of "Fri, 15 Aug 2003 12:17:46 PDT." <88549156.1060949866@melange.errno.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Sam Leffler writes: > > Having a /dev/random which is sometimes (chroot/jail) means that > > applications running under those circumstances are incredible fragile > > to spoofing by creating a fake "/dev/random" in some way. > > openbsd defined a sysctl to get data from arc4random. They use this as a > fallback if /dev/random or similar is not available. Applications that > wanted to be paranoid about spoofing could use this directly. I have not > compared the goodness of the data from /dev/random and arc4random. I am working on an openbsd-compatible sysctl. M -- Mark Murray iumop ap!sdn w,I idlaH
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200308151954.h7FJstOI004259>