Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 25 Feb 2001 01:33:07 -0800 (PST)
From:      Matt Dillon <dillon@earth.backplane.com>
To:        Kris Kennaway <kris@obsecurity.org>
Cc:        Bruce Evans <bde@zeta.org.au>, Robert Watson <rwatson@FreeBSD.ORG>, Nick Sayer <nsayer@FreeBSD.ORG>, cvs-committers@FreeBSD.ORG, cvs-all@FreeBSD.ORG
Subject:   Re: cvs commit: ports/astro/xglobe/files patch-random
Message-ID:  <200102250933.f1P9X7a13051@earth.backplane.com>
References:  <Pine.BSF.4.21.0102251920150.6561-100000@besplex.bde.org> <200102250900.f1P90Qc12868@earth.backplane.com> <20010225012246.A30454@mollari.cthul.hu>

next in thread | previous in thread | raw e-mail | index | archive | help
:
:Matt, please read the subject line of the thread you're replying to,
:and the commit which started it.  rand() just isn't very good as it
:stands, from other standpoints that security.  Please also read my
:reply to -arch before responding further.
:
:Kris

    I went back and read it.  It hasn't changed anything.  The manual
    page for rand() is very specific on the API.  If you don't like
    the sequence returned you could simply fix rand() in libc to use
    srandom() without breaking the spec.  But putting a #warning in
    is not appropriate.  There is nothing fundamentally wrong with
    the API - in fact, it's almost exactly the same API that srandom()
    uses except srandom() provides for a larger range of options in
    regards to seeding.  Adding a #warning is adding a hack rather then
    adding a fix.  You may not like the fact that rand() can never be
    cryptographically secure, but that doesn't illegitimize rand().  As
    I said, there is a huge class of problems for which a fixed pseudo
    random sequence is perfectly acceptable.

					-Matt


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200102250933.f1P9X7a13051>