From owner-freebsd-current@FreeBSD.ORG Tue Apr 13 08:55:13 2004 Return-Path: Delivered-To: freebsd-current@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 0AC9116A4D0 for ; Tue, 13 Apr 2004 08:55:13 -0700 (PDT) Received: from storm.FreeBSD.org.uk (storm.FreeBSD.org.uk [194.242.157.42]) by mx1.FreeBSD.org (Postfix) with ESMTP id BE83843D1F for ; Tue, 13 Apr 2004 08:55:09 -0700 (PDT) (envelope-from mark@grondar.org) Received: from storm.FreeBSD.org.uk (Ugrondar@localhost [127.0.0.1]) i3DFt8Ae079622; Tue, 13 Apr 2004 16:55:08 +0100 (BST) (envelope-from mark@grondar.org) Received: (from Ugrondar@localhost)i3DFt7vT079621; Tue, 13 Apr 2004 16:55:07 +0100 (BST) (envelope-from mark@grondar.org) X-Authentication-Warning: storm.FreeBSD.org.uk: Ugrondar set sender to mark@grondar.org using -f Received: from grondar.org (localhost [127.0.0.1])i3DFocIn099231; Tue, 13 Apr 2004 16:50:38 +0100 (BST) (envelope-from mark@grondar.org) Message-Id: <200404131550.i3DFocIn099231@grimreaper.grondar.org> To: Andrew Thompson From: Mark Murray In-Reply-To: Your message of "Mon, 12 Apr 2004 22:33:33 +1200." <20040412103333.GA47211@kate.fud.org.nz> Date: Tue, 13 Apr 2004 16:50:38 +0100 Sender: mark@grondar.org X-Spam-Score: 3 (***) MSGID_FROM_MTA_SHORT X-Scanned-By: MIMEDefang 2.39 cc: freebsd-current@FreeBSD.ORG Subject: Re: dev/random X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Apr 2004 15:55:13 -0000 Andrew Thompson writes: > With the latest dev/random commits I have been unable to installworld > in single-user mode. mktemp blocks when trying to read the random > device, I have confirmed this by doing 'hexdump /dev/random' which > produces no output. > > after running '/etc/rc.d/random start' everything is working fine. Can > anyone else confirm this? This is a feature. For now, kickstart the device with # ${SOME_COMMAND} > /dev/random SOME_COMMAND should have output entropy proportional to the seriousness of your threat model. For messing around at home, 'ls -alR /etc /var' is probably OK. Something like 'echo foo' will work, but will start your RNG in a known insecure state. M -- Mark Murray iumop ap!sdn w,I idlaH