Date: 10 Nov 1998 21:39:19 -0600 From: Dave Marquardt <marquard@zilker.net> To: freebsd-bugs@FreeBSD.ORG Subject: Re: kern/8570: patch for randomised process id allocation Message-ID: <85af1yhp94.fsf@localhost.zilker.net> In-Reply-To: root@diginix.net's message of "Tue, 3 Nov 1998 23:26:00 -0600 (CST)" References: <199811040526.XAA15378@diginix.net>
next in thread | previous in thread | raw e-mail | index | archive | help
root@diginix.net writes: > The incremental nature of current process id allocation can lend > itself to a number of potentially serious security problems. This > patch allocates a pid using the kernels random() function in > libkern. It is nearly the same as OpenBSD's equivalent, only > difference being that obsd uses the arc4random() PRNG. Wow! How much pathlength does this patch add to fork()? Sounds like a lot to me. I agree with David Greenman--justify this in a big way before you add all this extra pathlength to fork(). -Dave To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?85af1yhp94.fsf>