>       I stated this same objection until I actually attended Mark's
> presentation at the 'con. The yarrow algorithm uses an encrypted hash for
> the entropy on the way in, and encrypts the output on the way out. This
> would make it extremely difficult to guess the state at reboot, even if we
> weren't picking up new entropy sources during the boot process. 

There is an angle; an attacker can attack by replaying, but this requires
strong privelige.

>       Pending Mark's approval, I'd like to suggest we add a cron job to
> dump X k of data from /dev/random to a file (/boot/.periodic_entropy
> maybe?) and use that, AND ${entropy_file:/var/db/entropy} to reseed at
> boot, and only do the "long, annoying" failover process if neither file
> exists. The only remaining questions would be how many k of data to dump
> how often.

I like that, but I'd like to see more than one file. This avoids the race
where fsck may blat an incompletely written file after a (in)convenient
crash.

We are really headed towards saving state in the first swap partition
(if there is one).

On a related note, I'd like to see mergemaster rebuild /dev if it is not
DEVFS (obviously taking into account user preferences in MAKEDEV.local).

I believe that users are shootin their feet by not tracking /dev properly.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message
  • ... Андрей Чернов
  • ... Doug Barton
  • ... Ed Hall
  • ... Matt Dillon
  • ... Андрей Чернов
  • ... Jim Bryant
  • ... David O'Brien
  • ... Rod Taylor
  • ... John Baldwin
  • ... Doug Barton
  • ... Mark Murray
  • ... Matt Dillon
  • ... Mark Murray
  • ... Matt Dillon
  • ... David O'Brien
  • ... Doug Barton
  • ... Terry Lambert
  • ... Doug Barton
  • ... Mark Murray
  • ... Ed Hall
  • ... Ed Hall

Reply via email to