From owner-freebsd-security Thu Jun 12 16:35:20 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id QAA27526 for security-outgoing; Thu, 12 Jun 1997 16:35:20 -0700 (PDT) Received: from lsd.relcom.eu.net (lsd.relcom.eu.net [193.124.23.23]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id QAA27485; Thu, 12 Jun 1997 16:34:52 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by lsd.relcom.eu.net (8.8.5/8.8.5) with SMTP id DAA07113; Fri, 13 Jun 1997 03:34:48 +0400 (MSD) Date: Fri, 13 Jun 1997 03:34:47 +0400 (MSD) From: =?KOI8-R?B?4c7E0sXKIP7F0s7P1w==?= X-Sender: ache@lsd.relcom.eu.net cc: security@FreeBSD.ORG, peter@FreeBSD.ORG Subject: Re: Our DNS severs are vulnerable (fwd) In-Reply-To: <199706122211.CAA29505@dux.ru> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk > + > + #ifndef __OpenBSD__ > + /* > + * No solid source of strong random in the system. Sigh. Fake it. > + */ > + u_long > + arc4random() > + { We can use srandomdev() here. I plan to apply this patches in near days if nobody objects. -- Andrey A. Chernov http://www.nagual.pp.ru/~ache/