> I guess it follows that it is not a good idea to generate keys or
> certificates on -CURRENT for a while (until entropy comes back to town)?

Correct if they rely on /dev/random for entropy.

> I don't know which applications depend on /dev/random providing entropy
> and which gather their own.

Right.

> If so, I think this needs an UPDATING entry, particularly since the
> symptoms could outlive the cause.  i.e. something to the effect of
> ``Keys and certificates generated on -CURRENT on or after m/d/y should
> not be used'' and updated again when the entropy is again available.

Agreed.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message

Reply via email to