Date: Fri, 18 Jul 2014 22:57:39 +0100 From: Ben Laurie <benl@freebsd.org> To: Steven Chamberlain <steven@pyro.eu.org> Cc: "freebsd-security@freebsd.org security" <freebsd-security@freebsd.org> Subject: Re: Speed and security of /dev/urandom Message-ID: <CAG5KPzxVaTEmDq9F9BFGQGWTGGWKZ7kZhgkPQTZ3c2-iWmcZzw@mail.gmail.com> In-Reply-To: <53C85F42.1000704@pyro.eu.org> References: <53C85F42.1000704@pyro.eu.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On 18 July 2014 00:41, Steven Chamberlain <steven@pyro.eu.org> wrote: > So I wonder, could a simplified arc4random for FreeBSD use Yarrow > directly, to avoid making any of these sorts of mistakes we've seen? Discovering that its OK to use this mechanism seems as vulnerable to mistakes as the mistakes we've seen. I don't have good suggestions on how to fix this.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAG5KPzxVaTEmDq9F9BFGQGWTGGWKZ7kZhgkPQTZ3c2-iWmcZzw>