Date: Thu, 26 Oct 2000 18:08:15 -0400 (EDT) From: Wesley Morgan <morganw@chemicals.tacorp.com> To: Poul-Henning Kamp <phk@critter.freebsd.dk> Cc: Doug Barton <DougB@gorean.org>, Ed Hall <edhall@weirdnoise.com>, current@FreeBSD.ORG Subject: Re: entropy reseeding is totally broken Message-ID: <Pine.BSF.4.21.0010261757580.6460-100000@volatile.chemicals.tacorp.com> In-Reply-To: <5033.972597123@critter>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 26 Oct 2000, Poul-Henning Kamp wrote: > I don't really care that much how good my random bits are right after > boot, but I do care about my machine coming up quickly. I don't know about that, look at your boot logs: Oct 26 17:32:19 catalyst /boot/kernel/kernel: Copyright (c) 1992-2000 The FreeBSD Project. Oct 26 17:32:19 catalyst /boot/kernel/kernel: Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994 Oct 26 17:32:23 catalyst sshd[193]: Generating 768 bit RSA key. Oct 26 17:32:23 catalyst sshd[193]: RSA key generation complete. Those times aren't correct I'm sure, but if I can't get enough entropy for a 768 bit key _very soon_ after boot, we could have a problem. Somehow, I think everyone should care about that. > > Add a /etc/rc.conf knob which says > > wait_until_entropy_collected=YES Why not be secure by default and have i_dont_care_about_entropy=NO -- _ __ ___ ____ ___ ___ ___ Wesley N Morgan _ __ ___ | _ ) __| \ morganw@chemicals.tacorp.com _ __ | _ \._ \ |) | FreeBSD: The Power To Serve _ |___/___/___/ 6bone: 3ffe:1ce3:7::b4ff:fe53:c297 Hi! I'm a .signature virus! Copy me into your ~/.signature to help me spread! To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0010261757580.6460-100000>