Date: Sun, 24 Jul 2005 17:51:54 -0700 From: Doug Barton <dougb@FreeBSD.org> To: Colin Percival <cperciva@freebsd.org> Cc: Poul-Henning Kamp <phk@haven.freebsd.dk>, Pawel Jakub Dawidek <pjd@freebsd.org>, freebsd-security@freebsd.org Subject: Re: cvs commit: src/games/fortune/fortune fortune.c Message-ID: <42E437AA.1050307@FreeBSD.org> In-Reply-To: <42E3DF1E.9040405@freebsd.org> References: <20050724135738.GM46538@darkness.comp.waw.pl> <64009.1122213962@phk.freebsd.dk> <20050724181912.GO46538@darkness.comp.waw.pl> <42E3DF1E.9040405@freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Colin Percival wrote: > I think this would be more dangerous than valuable. "Most" failure modes of > modern PRNGs will result in output which is cryptographically predictable but > passes all known statistical tests. (To take a trivial example, the sequence > MD5(0), MD5(1), MD5(2) ... looks random, but obviously isn't.) > > If we want to determine if the PRNG has been seeded properly, we should be > querying the kernel, not trying to distinguish between "random" and "non-random" > just based on its output. I put the following in my /etc/rc.local file to try and do some detective work on the fortune issue: sysctl kern.random.sys.seeded >> ${TMPDIR:-/tmp}/sysctl.out If others are seeing apparent problems with randomness issues on startup this might be a useful diagnostic for them as well. FWIW, I cranked up the entropy save function on my laptop to the following values: entropy_save_sz="4096" # Size of the entropy cache files. entropy_save_num="17" # Number of entropy cache files to save. And haven't seen any problems with repetitive fortunes in the last 2 days. Since storage of these files is pretty painless, I'm tempted to crank this up in /etc/defaults/rc.conf. Opinions? Doug -- This .signature sanitized for your protection
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?42E437AA.1050307>