From owner-freebsd-security@FreeBSD.ORG Tue Sep 11 07:16:47 2012 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx2.freebsd.org (mx2.freebsd.org [69.147.83.53]) by hub.freebsd.org (Postfix) with ESMTP id A8745106566C; Tue, 11 Sep 2012 07:16:47 +0000 (UTC) (envelope-from dougb@FreeBSD.org) Received: from opti.dougb.net (hub.freebsd.org [IPv6:2001:4f8:fff6::36]) by mx2.freebsd.org (Postfix) with ESMTP id C8D9B1579CC; Tue, 11 Sep 2012 07:14:21 +0000 (UTC) Message-ID: <504EE4CD.80804@FreeBSD.org> Date: Tue, 11 Sep 2012 00:14:21 -0700 From: Doug Barton Organization: http://SupersetSolutions.com/ User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:15.0) Gecko/20120907 Thunderbird/15.0 MIME-Version: 1.0 To: obrien@freebsd.org References: <20120906224703.GD89120@x96.org> <20120907015157.GA29497@server.rulingia.com> <20120910135218.GA68128@dragon.NUXI.org> <504E343A.4020802@FreeBSD.org> <86pq5tu1zr.fsf@ds4.des.no> <504E3DAB.3090000@FreeBSD.org> <86fw6pu0l0.fsf@ds4.des.no> <504E4765.1020909@FreeBSD.org> <864nn5tyev.fsf@ds4.des.no> <504E4EAA.4060808@FreeBSD.org> <20120911071045.GC72584@dragon.NUXI.org> In-Reply-To: <20120911071045.GC72584@dragon.NUXI.org> X-Enigmail-Version: 1.4.4 OpenPGP: id=1A1ABC84 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: Arthur Mesh , freebsd-rc@freebsd.org, freebsd-security@freebsd.org, RW , =?ISO-8859-1?Q?Dag-Erling_Sm=F8rgrav?= , Xin Li Subject: Re: svn commit: r239569 - head/etc/rc.d X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 11 Sep 2012 07:16:47 -0000 On 09/11/2012 00:10, David O'Brien wrote: > On Mon, Sep 10, 2012 at 01:33:46PM -0700, Doug Barton wrote: >> Remember, the assertion that David and Arthur are making is that >> re-using the files in /var/db/entropy is harmful. > > It is not just David and Arthur, it is also the designer of the PRNG we > use. And once again, you're misapplying what you're reading by failing to take into account the differences between a theoretically perfect system, and one that may reboot before all the files have been replaced over time. > It is also other cryptographic-minded folks such as I found in a > few threads of Cryptography-Digest. I can't deal with "appeal to authority" without being able to at least read the relevant material. Do you have URLs for this? -- I am only one, but I am one. I cannot do everything, but I can do something. And I will not let what I cannot do interfere with what I can do. -- Edward Everett Hale, (1822 - 1909)