Date: Sat, 21 Jan 2017 01:21:42 +0000 From: Lu Tung-Pin <lutungpin@openmailbox.org> To: freebsd-current@freebsd.org Subject: Fix /etc/rc.d/random umask handling (/entropy permissions) Message-ID: <14f5a2fdf191c33e4ed1dc882b288e81@openmailbox.org>
next in thread | raw e-mail | index | archive | help
[-- Attachment #1 --]
A 2014 change broke the umask handling in /etc/rc.d/random,
leaving /entropy with ug+r permissions. Quick fix attached,
mirroring random_stop() behavior.
(Incidentally, /usr/libexec/save-entropy is still fine for
/var/db/entropy/*, as is /etc/rc.d/random for the new
/boot/entropy.)
--- /etc/rc.d/random.old 2017-01-21 11:48:30.975009000 +1100
+++ /etc/rc.d/random 2017-01-19 18:04:34.224632000 +1100
@@ -20,12 +20,15 @@
save_dev_random()
{
+ oumask=`umask`
+ umask 077
for f ; do
if :>>"$f" ; then
debug "saving entropy to $f"
dd if=/dev/random of="$f" bs=4096 count=1
2>/dev/null
fi
done
+ umask ${oumask}
}
feed_dev_random()
[-- Attachment #2 --]
--- /etc/rc.d/random.old 2017-01-21 11:48:30.975009000 +1100
+++ /etc/rc.d/random 2017-01-19 18:04:34.224632000 +1100
@@ -20,12 +20,15 @@
save_dev_random()
{
+ oumask=`umask`
+ umask 077
for f ; do
if :>>"$f" ; then
debug "saving entropy to $f"
dd if=/dev/random of="$f" bs=4096 count=1 2>/dev/null
fi
done
+ umask ${oumask}
}
feed_dev_random()
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?14f5a2fdf191c33e4ed1dc882b288e81>
