Skip site navigation (1)Skip section navigation (2)
Date:      10 Nov 1998 21:39:19 -0600
From:      Dave Marquardt <marquard@zilker.net>
To:        freebsd-bugs@FreeBSD.ORG
Subject:   Re: kern/8570: patch for randomised process id allocation
Message-ID:  <85af1yhp94.fsf@localhost.zilker.net>
In-Reply-To: root@diginix.net's message of "Tue, 3 Nov 1998 23:26:00 -0600 (CST)"
References:  <199811040526.XAA15378@diginix.net>

next in thread | previous in thread | raw e-mail | index | archive | help
root@diginix.net writes:
> 	The incremental nature of current process id allocation can lend
> 	itself to a number of potentially serious security problems. This
> 	patch allocates a pid using the kernels random() function in
> 	libkern. It is nearly the same as OpenBSD's equivalent, only
> 	difference being that obsd uses the arc4random() PRNG.

Wow!  How much pathlength does this patch add to fork()?  Sounds like
a lot to me.  I agree with David Greenman--justify this in a big way
before you add all this extra pathlength to fork().

-Dave

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?85af1yhp94.fsf>